{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:14:41Z","timestamp":1740140081748,"version":"3.37.3"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T00:00:00Z","timestamp":1614816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T00:00:00Z","timestamp":1614816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10257-021-00518-3","type":"journal-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T21:02:38Z","timestamp":1614891758000},"page":"597-619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Viral diffusion of technology products: a comprehensive stage framework"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5693-4062","authenticated-orcid":false,"given":"Daphne M.","family":"Simmonds","sequence":"first","affiliation":[]},{"given":"Katia","family":"Campbell","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Hasley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ajzen I (1985) From intentions to actions: a theory of planned behavior. In: Action control, pp 11\u201339 Springer","key":"518_CR1","DOI":"10.1007\/978-3-642-69746-3_2"},{"issue":"2","key":"518_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179\u2013211","journal-title":"Organ Behav Hum Decis Process"},{"issue":"3","key":"518_CR3","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/00028533.1992.11951539","volume":"28","author":"M Allen","year":"1992","unstructured":"Allen M, Burrell N (1992) Evaluating the believability of sequential arguments. Argum Advocacy 28(3):135\u2013144","journal-title":"Argum Advocacy"},{"issue":"1","key":"518_CR4","first-page":"15","volume":"26","author":"A Amalanathan","year":"2017","unstructured":"Amalanathan A, Anouncia SM (2017) Influence of human emotion expressed through social networks in viral marketing. Int J Bus Inf Syst 26(1):15\u201332","journal-title":"Int J Bus Inf Syst"},{"key":"518_CR5","volume-title":"Age of propaganda. The everyday use and abuse of persuasion","author":"E Aronson","year":"1991","unstructured":"Aronson E, Pratkanis A (1991) Age of propaganda. The everyday use and abuse of persuasion. W. H. Freeman and Company, New York"},{"issue":"3","key":"518_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1287\/isre.1070.0152","volume":"19","author":"M Bampo","year":"2008","unstructured":"Bampo M, Ewing MT, Mather DR, Stewart D, Wallace M (2008) The effects of the social structure of digital networks on viral marketing performance. Inf Syst Res 19(3):273\u2013290","journal-title":"Inf Syst Res"},{"doi-asserted-by":"crossref","unstructured":"Bass FM (1993) The future of research in marketing: marketing science. SAGE Publications Sage CA: Los Angeles, CA","key":"518_CR345","DOI":"10.2307\/3172509"},{"doi-asserted-by":"crossref","unstructured":"Bass FM (1995) Empirical generalizations and marketing science: a personal view. Mark Sci 14 (3_supplement):G6\u2013G19","key":"518_CR346","DOI":"10.1287\/mksc.14.3.G6"},{"unstructured":"Berger J, Milkman K (2010) Social transmission, emotion, and the virality of online content. Wharton Res Paper 106:1\u201352","key":"518_CR7"},{"doi-asserted-by":"crossref","unstructured":"Brehm JW, Cohen AR (1962) Explorations in cognitive dissonance. Wiley, New York","key":"518_CR8","DOI":"10.1037\/11622-000"},{"issue":"2","key":"518_CR9","first-page":"163","volume":"12","author":"MP Bunker","year":"2013","unstructured":"Bunker MP, Rajendran K, Corbin SB, Pearce C (2013) Understanding \u2018likers\u2019 on Facebook: differences between customer and non-customer situations. Int J Bus Inf Syst 12(2):163\u2013176","journal-title":"Int J Bus Inf Syst"},{"key":"518_CR10","volume-title":"Rhetoric of motive","author":"K Burke","year":"1950","unstructured":"Burke K (1950) Rhetoric of motive. University of California Press, Berkeley"},{"key":"518_CR11","doi-asserted-by":"publisher","DOI":"10.1525\/9780520340664","volume-title":"Language as symbolic action: Essays on life, literature and method","author":"K Burke","year":"1966","unstructured":"Burke K (1966) Language as symbolic action: Essays on life, literature and method. University of California Press, Berkeley"},{"key":"518_CR12","doi-asserted-by":"crossref","DOI":"10.1525\/9780520353237","volume-title":"A rhetoric of motives","author":"K Burke","year":"1969","unstructured":"Burke K (1969) A rhetoric of motives. University of California Press, Berkeley"},{"unstructured":"Cao J, Knotts T, Xu J, Chau M (2009) Word of mouth marketing through online social networks","key":"518_CR13"},{"unstructured":"Chen A (2008, 2008-03-06). Facebook viral marketing: when and why do apps \u201cjump the shark?\u201d. Retrieved from https:\/\/andrewchen.co\/facebook-viral-marketing-when-and-why-do-apps-jump-the-shark\/. Accessed from 3 June 2008","key":"518_CR14"},{"issue":"3","key":"518_CR15","first-page":"315","volume":"6","author":"T Daim","year":"2010","unstructured":"Daim T, Basoglu N, Tanoglu I (2010) A critical assessment of information technology adoption: technical, organisational and personal perspectives. Int J Bus Inf Syst 6(3):315\u2013335","journal-title":"Int J Bus Inf Syst"},{"doi-asserted-by":"crossref","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q","key":"518_CR348","DOI":"10.2307\/249008"},{"doi-asserted-by":"crossref","unstructured":"Davis FD, Richard PB, Paul RW (1989) User acceptance of computer technology: a comparison of two theoretical models. Manage Sci 35(8):982\u20131003","key":"518_CR347","DOI":"10.1287\/mnsc.35.8.982"},{"doi-asserted-by":"crossref","unstructured":"Deza A, Parikh D (2015) Understanding image virality. Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition","key":"518_CR17","DOI":"10.1109\/CVPR.2015.7298791"},{"issue":"2","key":"518_CR18","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.bushor.2004.10.011","volume":"48","author":"A Dobele","year":"2005","unstructured":"Dobele A, Toleman D, Beverland M (2005) Controlled infection! Spreading the brand message through viral marketing. Bus Horiz 48(2):143\u2013149","journal-title":"Bus Horiz"},{"issue":"1","key":"518_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MIS.2005.16","volume":"20","author":"P Domingos","year":"2005","unstructured":"Domingos P (2005) Mining social networks for viral marketing. IEEE Intell Syst 20(1):80\u201382","journal-title":"IEEE Intell Syst"},{"unstructured":"Domingos P (2005) Mining social networks for viral marketing","key":"518_CR20"},{"issue":"3","key":"518_CR21","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1108\/07363760810870671","volume":"25","author":"R Ferguson","year":"2008","unstructured":"Ferguson R (2008) Word of mouth and viral marketing: taking the temperature of the hottest trends in marketing. J Consum Market 25(3):179\u2013182","journal-title":"J Consum Market"},{"key":"518_CR22","first-page":"105","volume":"105127","author":"RG Fichman","year":"2000","unstructured":"Fichman RG (2000) The diffusion and assimilation of information technology innovations. Framing domains IT Manag Project Future through Past 105127:105\u2013128","journal-title":"Framing domains IT Manag Project Future through Past"},{"key":"518_CR23","volume-title":"Intention and behavior: an introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Intention and behavior: an introduction to theory and research. Addison-Wesley, MA"},{"doi-asserted-by":"crossref","unstructured":"Gefen D, Kai RL (2017) Controlling for lexical closeness in survey research: a demonstration on the technology acceptance model. J Assoc Inf Syst","key":"518_CR349","DOI":"10.17705\/1jais.00469"},{"unstructured":"Guerini M, Strapparava C, Ozbal G (2011) Exploring text virality in social networks. https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/index. doi:https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/paper\/view\/2820. Accessed 2011","key":"518_CR24"},{"issue":"3","key":"518_CR26","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1080\/10196780050177053","volume":"10","author":"S Helm","year":"2000","unstructured":"Helm S (2000) Viral marketing-establishing customer relationships by\u2019word-of-mouse\u2019. Electron Market 10(3):158\u2013161","journal-title":"Electron Market"},{"unstructured":"Hildebrand C, Hofstetter R, Herrmann A (2012) Modeling viral marketing dynamics in social networks\u2013findings from computational experiments with agent-based simulation models","key":"518_CR27"},{"doi-asserted-by":"crossref","unstructured":"Ho J, Dempsey M (2010) Viral marketing: motivations to forward online content","key":"518_CR28","DOI":"10.1016\/j.jbusres.2008.08.010"},{"doi-asserted-by":"crossref","unstructured":"Hoang T-A, Ee-Peng L (2012) Virality and susceptibility in information diffusions. In: Proceedings of the international AAAI conference on web and social media, vol 6, no 1","key":"518_CR29","DOI":"10.1609\/icwsm.v6i1.14245"},{"doi-asserted-by":"crossref","unstructured":"Jain P, Manweiler J, Acharya A, Choudhury RR (2014) Scalable social analytics for live viral event prediction. Paper presented at the eighth international AAAI conference on weblogs and social media","key":"518_CR30","DOI":"10.1609\/icwsm.v8i1.14504"},{"doi-asserted-by":"crossref","unstructured":"Jamali M, Ester M (2010). A matrix factorization technique with trust propagation for recommendation in social networks. Paper presented at the proceedings of the fourth ACM conference on recommender systems","key":"518_CR31","DOI":"10.1145\/1864708.1864736"},{"unstructured":"Jarvis, A. (2017a, 2017-11-03). How to model viral growth at your startup. https:\/\/www.alexanderjarvis.com\/2017\/11\/03\/model-viral-growth-startup\/. Accessed from 11 Mar 2017","key":"518_CR32"},{"unstructured":"Jarvis A (2017b) How to model viral growth at your startup - @adjblog. https:\/\/www.alexanderjarvis.com\/2017\/11\/03\/model-viral-growth-startup\/","key":"518_CR33"},{"doi-asserted-by":"crossref","unstructured":"Jurvetson S Tim D (1997) Viral marketing. Netscape M-Files 1","key":"518_CR34","DOI":"10.1300\/J136v01n03_16"},{"doi-asserted-by":"crossref","unstructured":"Kaplan A, Haenlein M (2011) Two hearts in three-quarter time: how to waltz the social media\/viral marketing dance","key":"518_CR35","DOI":"10.1016\/j.bushor.2011.01.006"},{"issue":"3","key":"518_CR36","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.bushor.2011.01.006","volume":"54","author":"AM Kaplan","year":"2011","unstructured":"Kaplan AM, Haenlein M (2011) Two hearts in three-quarter time: how to waltz the social media\/viral marketing dance. Bus Horiz 54(3):253\u2013263","journal-title":"Bus Horiz"},{"issue":"4","key":"518_CR37","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1037\/0003-066X.36.4.343","volume":"36","author":"B Latan\u00e9","year":"1981","unstructured":"Latan\u00e9 B (1981) The psychology of social impact. Am Psychol 36(4):343","journal-title":"Am Psychol"},{"doi-asserted-by":"crossref","unstructured":"Liu-Thompkins, Y (2012) Seeding viral content: the role of message and network factors. J Adver Res 52(4): 465\u2013478","key":"518_CR38","DOI":"10.2501\/JAR-52-4-465-478"},{"key":"518_CR39","doi-asserted-by":"publisher","first-page":"350","DOI":"10.2307\/2786181","volume":"30","author":"G Marwell","year":"1967","unstructured":"Marwell G, Schmitt DR (1967) Dimensions of compliance-gaining behavior: an empirical analysis. Sociometry 30:350\u2013364","journal-title":"Sociometry"},{"issue":"3","key":"518_CR40","doi-asserted-by":"publisher","first-page":"546","DOI":"10.5465\/amr.1978.4305755","volume":"3","author":"RE Miles","year":"1978","unstructured":"Miles RE, Snow CC, Meyer AD, Coleman HJ Jr (1978) Organizational strategy, structure, and process. Acad Manag Rev 3(3):546\u2013562","journal-title":"Acad Manag Rev"},{"unstructured":"Mochalova A, Nanopoulos A (2015) Non-intrusive viral marketing based on percolation centrality. Paper presented at the ECIS","key":"518_CR41"},{"unstructured":"Palka W, Pousttchi K (2008) Understanding the determinants of mobile viral effects-towards a grounded theory of mobile viral marketing. In: 2008 7th International conference on mobile business, IEEE, pp 323\u2013333","key":"518_CR42"},{"doi-asserted-by":"crossref","unstructured":"Palka W, Pousttchi K, Wiedemann DG (2009) Mobile word-of-mouth-A grounded theory of mobile viral marketing. J Inf Technol 24(2):172\u2013185","key":"518_CR48","DOI":"10.1057\/jit.2008.37"},{"issue":"4","key":"518_CR43","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1287\/isre.9.4.362","volume":"9","author":"M Parthasarathy","year":"1998","unstructured":"Parthasarathy M, Bhattacherjee A (1998) Understanding post-adoption behavior in the context of online services. Inf Syst Research 9(4):362\u2013379","journal-title":"Inf Syst Research"},{"doi-asserted-by":"crossref","unstructured":"Payne R (2013) Virality 2.0: Networked promiscuity and the sharing subject","key":"518_CR44","DOI":"10.1080\/09502386.2012.707219"},{"key":"518_CR45","volume-title":"The elaboration likelihood model of persuasion. In communication and persuasio","author":"RE Petty","year":"1986","unstructured":"Petty RE, Cacioppo JT (1986) The elaboration likelihood model of persuasion. In communication and persuasio. Springer, New York"},{"issue":"4","key":"518_CR46","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1017\/S0021849904040371","volume":"44","author":"JE Phelps","year":"2004","unstructured":"Phelps JE, Lewis R, Mobilio L, Perry D, Raman N (2004) Viral marketing or electronic word-of-mouth advertising: examining consumer responses and motivations to pass along email. J Advert Res 44(4):333\u2013348","journal-title":"J Advert Res"},{"doi-asserted-by":"crossref","unstructured":"Pousttchi K, Wiedemann D (2007) Success factors in mobile viral marketing: a multi-case study approach. In: International conference on the","key":"#cr-split#-518_CR47.1","DOI":"10.1109\/ICMB.2007.61"},{"unstructured":"management of mobile business (ICMB 2007), IEEE, pp 34-34","key":"#cr-split#-518_CR47.2"},{"key":"518_CR49","volume-title":"Diffusion of innovations","author":"EM Rogers","year":"2010","unstructured":"Rogers EM (2010) Diffusion of innovations. Simon and Schuster, Noida"},{"issue":"11","key":"518_CR50","doi-asserted-by":"publisher","first-page":"2881","DOI":"10.1073\/pnas.1615259114","volume":"114","author":"C Scholz","year":"2017","unstructured":"Scholz C, Baek EC, O\u2019Donnell MB, Kim HS, Cappella JN, Falk EB (2017) A neural model of valuation and information virality. Proc Natl Acad Sci 114(11):2881\u20132886","journal-title":"Proc Natl Acad Sci"},{"key":"518_CR51","volume-title":"Predicting virality: a diffusion model","author":"D Simmonds","year":"2019","unstructured":"Simmonds D, McDonald K (2019) Predicting virality: a diffusion model. Paper presented at the Communication and Media Studies, Bonn, Germany"},{"issue":"12","key":"518_CR52","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/953460.953514","volume":"46","author":"MR Subramani","year":"2003","unstructured":"Subramani MR, Rajagopalan B (2003) Knowledge-sharing and influence in online social networks via viral marketing. Commun ACM 46(12):300\u2013307","journal-title":"Commun ACM"},{"unstructured":"Skok D (2009) Lessons learned \u2013 viral marketing. Retrieved from https:\/\/www.forentrepreneurs.com\/lessons-learnt-viral-marketing\/. Accessed from 12 June 20029","key":"518_CR53"},{"issue":"02","key":"518_CR54","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1142\/S0219622010003786","volume":"9","author":"I Tanoglu","year":"2010","unstructured":"Tanoglu I, Basoglu N, Daim T (2010) Exploring technology diffusion: case of information technologies. Int J Inf Technol Decis Mak 9(02):195\u2013222","journal-title":"Int J Inf Technol Decis Mak"},{"issue":"5","key":"518_CR55","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1509\/jmkg.73.5.90","volume":"73","author":"M Trusov","year":"2009","unstructured":"Trusov M, Bucklin RE, Pauwels K (2009) Estimating the dynamic effects of online word-of-mouth on member growth of a social network site. J Market 73(5):90\u2013102","journal-title":"J Market"},{"issue":"3","key":"518_CR56","first-page":"247","volume":"7","author":"K Vaidya","year":"2011","unstructured":"Vaidya K, Hyde M (2011) Inter-organisational information systems assimilation: an empirical evaluation in light of the diffusion of innovation theory. Int J Bus Inf Syst 7(3):247\u2013268","journal-title":"Int J Bus Inf Syst"},{"doi-asserted-by":"crossref","unstructured":"Venkatesh V, Michael GM, Gordon BD, Fred DD (2003) User acceptance of information technology: toward a unified view. MIS Q","key":"518_CR350","DOI":"10.2307\/30036540"},{"issue":"4","key":"518_CR57","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1086\/518527","volume":"34","author":"DJ Watts","year":"2007","unstructured":"Watts DJ, Dodds PS (2007) Influentials, networks, and public opinion formation. J Consum Res 34(4):441\u2013458","journal-title":"J Consum Res"},{"key":"518_CR58","volume-title":"Viral marketing for the real world","author":"DJ Watts","year":"2007","unstructured":"Watts DJ, Peretti J, Frumin M (2007) Viral marketing for the real world. Harvard Business School Pub, Boston"},{"key":"518_CR59","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1038\/srep02522","volume":"3","author":"L Weng","year":"2013","unstructured":"Weng L, Menczer F, Ahn Y-Y (2013) Virality prediction and community structure in social networks. Sci Rep 3:2522","journal-title":"Sci Rep"},{"unstructured":"Wiedemann DG (2007) Exploring the concept of mobile viral marketing through case study research. In MMS 2007: Mobilit\u00e4t und mobile informationssysteme\u20132nd conference of GI-Fachgruppe MMS. Gesellschaft f\u00fcr Informatik","key":"518_CR60"},{"doi-asserted-by":"crossref","unstructured":"Wiedemann D, Palka W (2008) Understanding the determinants of mobile viral effects-towards a grounded theory of mobile viral marketing","key":"518_CR61","DOI":"10.1109\/ICMB.2008.42"},{"doi-asserted-by":"crossref","unstructured":"Wiedemann DG, Palka W, Pousttchi K (2008a) Understanding the determinants of mobile viral effects-towards a grounded theory of mobile viral marketing. Paper presented at the 2008 7th international conference on mobile business","key":"518_CR62","DOI":"10.1109\/ICMB.2008.42"},{"doi-asserted-by":"crossref","unstructured":"Wiedemann DG, Haunstetter T, Pousttchi K (2008b) Analyzing the basic elements of mobile viral marketing-an empirical study. In: 2008 7th International conference on mobile business. IEEE, pp 75\u201385","key":"518_CR25","DOI":"10.1109\/ICMB.2008.41"},{"issue":"1","key":"518_CR63","first-page":"232","volume":"70","author":"RF Wilson","year":"2000","unstructured":"Wilson RF (2000) The six simple principles of viral marketing. Web Market Today 70(1):232","journal-title":"Web Market Today"},{"unstructured":"Yu L, Li Q, Xun L (2012) Research on viral marketing propagating oriented to marketing context","key":"518_CR64"},{"unstructured":"Yu L, Wang N (2014) Predicting viral marketing propagating efficiency within given deadline. Paper presented at the PACIS","key":"518_CR65"},{"unstructured":"Zhu J, Tan B (2007). Effectiveness of blog advertising: impact of communicator expertise, advertising intent, and product involvement. ICIS 2007 proceedings. p 121","key":"518_CR66"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-021-00518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10257-021-00518-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-021-00518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T10:59:22Z","timestamp":1724583562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10257-021-00518-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,4]]},"references-count":72,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["518"],"URL":"https:\/\/doi.org\/10.1007\/s10257-021-00518-3","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"type":"print","value":"1617-9846"},{"type":"electronic","value":"1617-9854"}],"subject":[],"published":{"date-parts":[[2021,3,4]]},"assertion":[{"value":"25 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}