{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T10:36:04Z","timestamp":1773743764823,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T00:00:00Z","timestamp":1657929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T00:00:00Z","timestamp":1657929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019 CDJSK 02 XK 12"],"award-info":[{"award-number":["2019 CDJSK 02 XK 12"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72110107002"],"award-info":[{"award-number":["72110107002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71974021"],"award-info":[{"award-number":["71974021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s10660-022-09580-6","type":"journal-article","created":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T03:24:31Z","timestamp":1657941871000},"page":"205-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["What influences users\u2019 continuance intention of internet wealth management services? A perspective from network externalities and herding"],"prefix":"10.1007","volume":"24","author":[{"given":"Weiyao","family":"Kang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4881-3364","authenticated-orcid":false,"given":"Bingjia","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Hongquan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,16]]},"reference":[{"issue":"1","key":"9580_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.2021.0997","volume":"32","author":"T Hendershott","year":"2021","unstructured":"Hendershott, T., Zhang, X., Zhao, J. L., & Zheng, Z. (2021). FinTech as a game changer: overview of research frontiers. Information Systems Research, 32(1), 1\u201317.","journal-title":"Information Systems Research"},{"key":"9580_CR2","doi-asserted-by":"publisher","first-page":"106184","DOI":"10.1016\/j.jbankfin.2021.106184","volume":"133","author":"E Feyen","year":"2021","unstructured":"Feyen, E., Alonso Gispert, T., Kliatskova, T., & Mare, D. S. (2021). Financial sector policy response to COVID-19 in emerging markets and developing economies. Journal of Banking & Finance, 133, 106184.","journal-title":"Journal of Banking & Finance"},{"issue":"4","key":"9580_CR3","doi-asserted-by":"publisher","first-page":"100833","DOI":"10.1016\/j.elerap.2019.100833","volume":"34","author":"EZ Milian","year":"2019","unstructured":"Milian, E. Z., Spinola, M., & d. M., & Carvalho, M. M. d. (2019). Fintechs: A literature review and research agenda. Electronic Commerce Research and Applications, 34(4), 100833.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"3","key":"9580_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1057\/s41260-020-00163-4","volume":"21","author":"MB Imerman","year":"2020","unstructured":"Imerman, M. B., & Fabozzi, F. J. (2020). Cashing in on innovation: A taxonomy of fintech. Journal of Asset Management, 21(3), 167\u2013177.","journal-title":"Journal of Asset Management"},{"issue":"4","key":"9580_CR5","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s10287-019-00351-7","volume":"17","author":"SR Das","year":"2020","unstructured":"Das, S. R., Ostrov, D., Radhakrishnan, A., & Srivastav, D. (2020). Dynamic portfolio allocation in goals-based wealth management. Computational Management Science, 17(4), 613\u2013640.","journal-title":"Computational Management Science"},{"issue":"4","key":"9580_CR6","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s10660-020-09400-9","volume":"21","author":"X Chen","year":"2020","unstructured":"Chen, X., Hu, X., & Ben, S. (2020). How do reputation, structure design and FinTech ecosystem affect the net cash inflow of P2P lending platforms? Evidence from China. Electronic Commerce Research, 21(4), 1055\u20131082.","journal-title":"Evidence from China. Electronic Commerce Research"},{"issue":"9","key":"9580_CR7","doi-asserted-by":"publisher","first-page":"1659","DOI":"10.1108\/IMDS-02-2020-0069","volume":"120","author":"W-L Shiau","year":"2020","unstructured":"Shiau, W.-L., Yuan, Y., Pu, X., Ray, S., & Chen, C. C. (2020). Understanding fintech continuance: perspectives from self-efficacy and ECT-IS theories. Industrial Management & Data Systems, 120(9), 1659\u20131689.","journal-title":"Industrial Management & Data Systems"},{"issue":"1","key":"9580_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.4018\/IJBIR.20210101.oa3","volume":"12","author":"FS Rasiwala","year":"2021","unstructured":"Rasiwala, F. S., & Kohl, B. (2021). Artificial intelligence in fintech: understanding stakeholders perception on innovation, disruption, and transformation in finance. International Journal of Business Intelligence Research, 12(1), 48\u201365.","journal-title":"International Journal of Business Intelligence Research"},{"key":"9580_CR9","unstructured":"iiMedia Research. (2021). Development status of China\u2019s Internet Securities industry in 2020. https:\/\/www.iimedia.cn\/c1061\/77873.html. Accessed 22 August 2021."},{"key":"9580_CR10","unstructured":"EqualOcean. (2021). Next 50 in Global Tech: Fintech. https:\/\/www.iyiou.com\/research\/20201212791 Accessed 15 July 2021."},{"issue":"9","key":"9580_CR11","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.jretconser.2019.01.007","volume":"48","author":"J Lee","year":"2019","unstructured":"Lee, J., Ryu, M. H., & Lee, D. (2019). A study on the reciprocal relationship between user perception and retailer perception on platform-based mobile payment service. Journal of Retailing and Consumer Services, 48(9), 7\u201315.","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"2","key":"9580_CR12","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.chb.2016.03.030","volume":"61","author":"T Oliveira","year":"2016","unstructured":"Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61(2), 404\u2013414.","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"9580_CR13","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s10796-015-9598-6","volume":"18","author":"H Qasim","year":"2016","unstructured":"Qasim, H., & Abu-Shanab, E. (2016). Drivers of mobile payment acceptance: the impact of network externalities. Information Systems Frontiers, 18(5), 1021\u20131034.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"9580_CR14","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1016\/j.jretconser.2013.07.005","volume":"20","author":"R Ladhari","year":"2013","unstructured":"Ladhari, R., & Leclerc, A. (2013). Building loyalty with online financial services customers: is there a gender difference? Journal of Retailing and Consumer Services, 20(6), 560\u2013569.","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"1","key":"9580_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.bushor.2017.09.003","volume":"61","author":"I Lee","year":"2018","unstructured":"Lee, I., & Shin, Y. J. (2018). Fintech: Ecosystem, business models, investment decisions, and challenges. Business Horizons, 61(1), 35\u201346.","journal-title":"Business Horizons"},{"issue":"5","key":"9580_CR16","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.17705\/1jais.00634","volume":"21","author":"Y Jin","year":"2020","unstructured":"Jin, Y., Ding, C., Duan, Y., & Cheng, H. K. (2020). Click to success? The temporal effects of facebook likes on crowdfunding. Journal of the Association for Information Systems, 21(5), 1191\u20131213.","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"9580_CR17","doi-asserted-by":"publisher","first-page":"428","DOI":"10.17705\/1jais.00607","volume":"21","author":"A Vedadi","year":"2020","unstructured":"Vedadi, A., & Warkentin, M. (2020). Can Secure Behaviors Be Contagious?: A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions. Journal of the Association for Information Systems, 21(2), 428\u2013459.","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"9580_CR18","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.25300\/MISQ\/2013\/37.4.02","volume":"37","author":"H Sun","year":"2013","unstructured":"Sun, H. (2013). A longitudinal study of herd behavior in the adoption and continued use of technology. MIS Quarterly: Management Information Systems, 37(4), 1013\u20131041.","journal-title":"MIS Quarterly: Management Information Systems"},{"issue":"3","key":"9580_CR19","doi-asserted-by":"publisher","first-page":"797","DOI":"10.2307\/2118364","volume":"107","author":"AV Banerjee","year":"1992","unstructured":"Banerjee, A. V. (1992). A simple model of heed behavior. Quarterly Journal of Economics, 107(3), 797\u2013817.","journal-title":"Quarterly Journal of Economics"},{"issue":"2","key":"9580_CR20","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1287\/isre.2016.0680","volume":"28","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, Y., & Rao, H. R. (2017). Coping responses in phishing detection: an investigation of antecedents and consequences. Information Systems Research, 28(2), 378\u2013396.","journal-title":"Information Systems Research"},{"issue":"8","key":"9580_CR21","doi-asserted-by":"publisher","first-page":"103370","DOI":"10.1016\/j.im.2020.103370","volume":"57","author":"J Mattke","year":"2020","unstructured":"Mattke, J., Maier, C., Reis, L., & Weitzel, T. (2020). Herd behavior in social media: the role of facebook likes, strength of ties, and expertise. Information & Management, 57(8), 103370.","journal-title":"Information & Management"},{"issue":"1","key":"9580_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.elerap.2017.04.001","volume":"23","author":"K Zhang","year":"2017","unstructured":"Zhang, K., & Chen, X. (2017). Herding in a P2P lending market: Rational inference OR irrational trust? Electronic Commerce Research and Applications, 23(1), 45\u201353.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"1\u20132","key":"9580_CR23","doi-asserted-by":"publisher","first-page":"113466","DOI":"10.1016\/j.dss.2020.113466","volume":"142","author":"M Fei","year":"2021","unstructured":"Fei, M., Tan, H., Peng, X., Wang, Q., & Wang, L. (2021). Promoting or attenuating? An eye-tracking study on the role of social cues in e-commerce livestreaming. Decision Support Systems, 142(1\u20132), 113466.","journal-title":"Decision Support Systems"},{"issue":"3","key":"9580_CR24","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1080\/07421222.2016.1243967","volume":"33","author":"F Thies","year":"2016","unstructured":"Thies, F., Wessel, M., & Benlian, A. (2016). Effects of social interaction dynamics on platforms. Journal of Management Information Systems, 33(3), 843\u2013873.","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"9580_CR25","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.emj.2020.12.001","volume":"39","author":"PC Andreou","year":"2020","unstructured":"Andreou, P. C., & Anyfantaki, S. (2020). Financial literacy and its influence on internet banking behavior. European Management Journal, 39(5), 658\u2013674.","journal-title":"European Management Journal"},{"issue":"1","key":"9580_CR26","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1111\/j.1759-3441.2003.tb00337.x","volume":"22","author":"DJ Beal","year":"2003","unstructured":"Beal, D. J., & Delpachitra, S. B. (2003). Financial literacy among australian university students. Economic Papers, 22(1), 65\u201378.","journal-title":"Economic Papers"},{"issue":"1","key":"9580_CR27","first-page":"286","volume":"20","author":"MF Sabri","year":"2019","unstructured":"Sabri, M. F., & Aw, E.C.-X. (2019). Financial literacy and related outcomes: the role of financial information sources. International Journal of Business and Society, 20(1), 286\u2013298.","journal-title":"International Journal of Business and Society"},{"issue":"2","key":"9580_CR28","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1108\/JEIM-02-2019-0050","volume":"33","author":"Y Cen","year":"2019","unstructured":"Cen, Y., & Li, L. (2019). Effects of network externalities on user loyalty to online B2B platforms: an empirical study. Journal of Enterprise Information Management, 33(2), 309\u2013334.","journal-title":"Journal of Enterprise Information Management"},{"issue":"2","key":"9580_CR29","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/j.chb.2016.04.023","volume":"62","author":"C-L Hsu","year":"2016","unstructured":"Hsu, C.-L., & Lin, J.C.-C. (2016). An empirical examination of consumer adoption of internet of things services: network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62(2), 516\u2013527.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"9580_CR30","first-page":"238","volume":"13","author":"H-P Lu","year":"2012","unstructured":"Lu, H.-P., & Lin, K.-Y. (2012). Factors influencing online auction sellers\u2019 intention to pay: An empirical study integrating network externalities with perceived value. Journal of Electronic Commerce Research, 13(3), 238\u2013254.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"1","key":"9580_CR31","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.chb.2016.11.069","volume":"69","author":"C-B Zhang","year":"2017","unstructured":"Zhang, C.-B., Li, Y.-N., Wu, B., & Li, D.-J. (2017). How WeChat can retain users: Roles of network externalities, social interaction ties, and perceived values in building continuance intention. Computers in Human Behavior, 69(1), 284\u2013293.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"9580_CR32","first-page":"424","volume":"75","author":"ML Katz","year":"1985","unstructured":"Katz, M. L., & Shapiro, C. (1985). Network externalities, competition, and compatibility. American Economic Review, 75(3), 424\u2013440.","journal-title":"American Economic Review"},{"issue":"4","key":"9580_CR33","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/s11628-018-0370-0","volume":"12","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Fu, B., & Liu, W. (2018). Understanding consumer repurchase intention on O2O platforms: an integrated model of network externalities and trust transfer theory. Service Business, 12(4), 731\u2013756.","journal-title":"Service Business"},{"issue":"3","key":"9580_CR34","doi-asserted-by":"publisher","first-page":"108184","DOI":"10.1016\/j.ijpe.2021.108184","volume":"239","author":"X Tian","year":"2021","unstructured":"Tian, X., Song, Y., Luo, C., Zhou, X., & Lev, B. (2021). Herding behavior in supplier innovation crowdfunding: evidence from kickstarter. International Journal of Production Economics, 239(3), 108184.","journal-title":"International Journal of Production Economics"},{"issue":"8","key":"9580_CR35","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1108\/IMDS-01-2019-0011","volume":"119","author":"Z Wang","year":"2019","unstructured":"Wang, Z., & GUAN, Z., Hou, F., Li, B., & Zhou, W. (2019). What determines customers\u2019 continuance intention of fintech?: evidence from yuebao. Industrial Management & Data Systems, 119(8), 1625\u20131637.","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"9580_CR36","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1108\/IMDS-07-2017-0325","volume":"118","author":"H-S Ryu","year":"2018","unstructured":"Ryu, H.-S. (2018). What makes users willing or hesitant to use Fintech?: The moderating effect of user type. Industrial Management & Data Systems, 118(3), 541\u2013569.","journal-title":"Industrial Management & Data Systems"},{"issue":"5","key":"9580_CR37","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.3390\/jtaer16050106","volume":"16","author":"J Xie","year":"2021","unstructured":"Xie, J., Ye, L., Huang, W., & Ye, M. (2021). understanding fintech platform adoption: impacts of perceived value and perceived risk. Journal of Theoretical and Applied Electronic Commerce Research, 16(5), 1893\u20131911.","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"issue":"15","key":"9580_CR38","doi-asserted-by":"publisher","first-page":"8375","DOI":"10.3390\/su13158375","volume":"13","author":"Y Hwang","year":"2021","unstructured":"Hwang, Y., Park, S., & Shin, N. (2021). sustainable development of a mobile payment security environment using fintech solutions. Sustainability, 13(15), 8375.","journal-title":"Sustainability"},{"issue":"2","key":"9580_CR39","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.dss.2012.10.034","volume":"54","author":"T Zhou","year":"2013","unstructured":"Zhou, T. (2013). An empirical examination of continuance intention of mobile payment services. Decision Support Systems, 54(2), 1085\u20131091.","journal-title":"Decision Support Systems"},{"issue":"1\/2","key":"9580_CR40","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.techfore.2018.09.018","volume":"146","author":"IR de Luna","year":"2019","unstructured":"de Luna, I. R., Li\u00e9bana-Cabanillas, F., S\u00e1nchez-Fern\u00e1ndez, J., & Mu\u00f1oz-Leiva, F. (2019). Mobile payment is not all the same: The adoption of mobile payment systems depending on the technology applied. Technological Forecasting and Social Change, 146(1\/2), 931\u2013944.","journal-title":"Technological Forecasting and Social Change"},{"issue":"4","key":"9580_CR41","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.chb.2018.04.028","volume":"85","author":"B Li","year":"2018","unstructured":"Li, B., Wang, X., & Tan, S. C. (2018). What makes MOOC users persist in completing MOOCs?: a perspective from network externalities and human factors. Computers in Human Behavior, 85(4), 385\u2013395.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"9580_CR42","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1108\/ITP-03-2018-0132","volume":"33","author":"X Gong","year":"2019","unstructured":"Gong, X., Zhang, K. Z. K., Chen, C., Cheung, C. M. K., & Lee, M. K. O. (2019). What drives self-disclosure in mobile payment applications? The effect of privacy assurance approaches, network externality, and technology complementarity. Information Technology & People, 33(4), 1174\u20131213.","journal-title":"Information Technology & People"},{"key":"9580_CR43","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.chb.2016.08.017","volume":"65","author":"Y-S Yen","year":"2016","unstructured":"Yen, Y.-S., & Wu, F.-S. (2016). Predicting the adoption of mobile financial services: the impacts of perceived mobility and personal habit. Computers in Human Behavior, 65, 31\u201342.","journal-title":"Computers in Human Behavior"},{"key":"9580_CR44","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.chb.2015.03.070","volume":"50","author":"N Luo","year":"2015","unstructured":"Luo, N., Guo, X., Zhang, J., Chen, G., & Zhang, N. (2015). Understanding the continued use of intra-organizational blogs: an adaptive habituation model. Computers in Human Behavior, 50, 57\u201365.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"9580_CR45","doi-asserted-by":"publisher","first-page":"85","DOI":"10.2753\/JEC1086-4415130103","volume":"13","author":"C-P Lin","year":"2008","unstructured":"Lin, C.-P., & Bhattacherjee, A. (2008). Elucidating individual intention to use interactive information technologies: the role of network externalities. International Journal of Electronic Commerce, 13(1), 85\u2013108.","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"9580_CR46","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.ijinfomgt.2013.01.007","volume":"33","author":"C-M Chiu","year":"2013","unstructured":"Chiu, C.-M., Cheng, H.-L., Huang, H.-Y., & Chen, C.-F. (2013). Exploring individuals\u2019 subjective well-being and loyalty towards social network sites from the perspective of network externalities: The Facebook case. International Journal of Information Management, 33(3), 539\u2013552.","journal-title":"International Journal of Information Management"},{"issue":"2","key":"9580_CR47","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.chb.2010.11.013","volume":"27","author":"T Zhou","year":"2011","unstructured":"Zhou, T., & Lu, Y. (2011). Examining mobile instant messaging user loyalty from the perspectives of network externalities and flow experience. Computers in Human Behavior, 27(2), 883\u2013889.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"9580_CR48","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1108\/10662240710737013","volume":"17","author":"S Yong Chun","year":"2007","unstructured":"Yong Chun, S., & Hahn, M. (2007). Network externality and future usage of Internet services. Internet Research, 17(2), 156\u2013168.","journal-title":"Internet Research"},{"issue":"6","key":"9580_CR49","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter, M. S. (1973). The Strength of Weak Ties. American Journal of Sociology, 78(6), 1360\u20131380.","journal-title":"American Journal of Sociology"},{"issue":"1","key":"9580_CR50","doi-asserted-by":"publisher","first-page":"82","DOI":"10.2307\/2667032","volume":"44","author":"MT Hansen","year":"1999","unstructured":"Hansen, M. T. (1999). The search-transfer problem: the role of weak ties in sharing knowledge across organization subunits. Administrative Science Quarterly, 44(1), 82\u2013111.","journal-title":"Administrative Science Quarterly"},{"issue":"3","key":"9580_CR51","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1257\/jep.12.3.151","volume":"12","author":"S Bikhchandani","year":"1998","unstructured":"Bikhchandani, S., Hirshleifer, D., & Welch, I. (1998). Learning from the behavior of others: conformity, fads, and informational cascades. Journal of Economic Perspectives, 12(3), 151\u2013170.","journal-title":"Journal of Economic Perspectives"},{"issue":"6146","key":"9580_CR52","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1126\/science.1240466","volume":"341","author":"L Muchnik","year":"2013","unstructured":"Muchnik, L., Aral, S., & Taylor, S. J. (2013). Social influence bias: A randomized experiment. Science, 341(6146), 647\u2013651.","journal-title":"Science"},{"issue":"1","key":"9580_CR53","doi-asserted-by":"publisher","first-page":"23","DOI":"10.2307\/20650277","volume":"33","author":"W Duan","year":"2009","unstructured":"Duan, W., Gu, B., & Whinston, A. B. (2009). Informational cascades and software adoption on the Internet: An empirical investigation. MIS Quarterly: Management Information Systems, 33(1), 23\u201348.","journal-title":"MIS Quarterly: Management Information Systems"},{"issue":"3","key":"9580_CR54","doi-asserted-by":"publisher","first-page":"182","DOI":"10.4018\/JGIM.2019070110","volume":"27","author":"IB Hong","year":"2019","unstructured":"Hong, I. B. (2019). Understanding and predicting behavioral intention to adopt mobile banking: The Korean experience. Journal of Global Information Management, 27(3), 182\u2013202.","journal-title":"Journal of Global Information Management"},{"issue":"1","key":"9580_CR55","first-page":"18","volume":"18","author":"H Hong","year":"2017","unstructured":"Hong, H., Cao, M., & Wang, G. A. (2017). The effects of network externalities and herding on user satisfaction with mobile social apps. Journal of Electronic Commerce Research, 18(1), 18\u201331.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"8","key":"9580_CR56","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1287\/mnsc.1100.1178","volume":"56","author":"Y Ak\u00e7ay","year":"2010","unstructured":"Ak\u00e7ay, Y., Natarajan, H. P., & Xu, S. H. (2010). Joint dynamic pricing of multiple perishable products under consumer choice. Management Science, 56(8), 1345\u20131361.","journal-title":"Management Science"},{"issue":"1","key":"9580_CR57","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.techfore.2010.04.015","volume":"78","author":"C-P Lin","year":"2011","unstructured":"Lin, C.-P., Tsai, Y. H., Wang, Y.-J., & Chiu, C.-K. (2011). Modeling IT relationship quality and its determinants: a potential perspective of network externalities in e-service. Technological Forecasting and Social Change, 78(1), 171\u2013184.","journal-title":"Technological Forecasting and Social Change"},{"issue":"4","key":"9580_CR58","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1016\/j.dss.2012.05.019","volume":"53","author":"L Zhao","year":"2012","unstructured":"Zhao, L., & Lu, Y. (2012). Enhancing perceived interactivity through network externalities: an empirical study on micro-blogging service satisfaction and continuance intention. Decision Support Systems, 53(4), 825\u2013834.","journal-title":"Decision Support Systems"},{"issue":"4","key":"9580_CR59","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.ijinfomgt.2018.08.014","volume":"47","author":"H Karjaluoto","year":"2019","unstructured":"Karjaluoto, H., Shaikh, A. A., Saarij\u00e4rvi, H., & Saraniemi, S. (2019). How perceived value drives the use of mobile financial services apps. International Journal of Information Management, 47(4), 252\u2013261.","journal-title":"International Journal of Information Management"},{"key":"9580_CR60","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.chb.2016.08.017","volume":"65","author":"Y Yung-Shen","year":"2016","unstructured":"Yung-Shen, Y., & Feng-Shang, Wu. (2016). Predicting the adoption of mobile financial services: the impacts of perceived mobility and personal habit. Computers in Human Behavior, 65, 31\u201342.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"9580_CR61","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11205-016-1309-2","volume":"132","author":"Z Chu","year":"2017","unstructured":"Chu, Z., Wang, Z., Xiao, J. J., & Zhang, W. (2017). Financial literacy, portfolio choice and financial well-being. Social Indicators Research, 132(2), 799\u2013820.","journal-title":"Social Indicators Research"},{"issue":"8","key":"9580_CR62","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1287\/mnsc.2013.1849","volume":"60","author":"D Fernandes","year":"2014","unstructured":"Fernandes, D., Lynch, J. G., Jr., & Netemeyer, R. G. (2014). Financial literacy, financial education, and downstream financial behaviors. Management Science, 60(8), 1861\u20131883.","journal-title":"Management Science"},{"issue":"1","key":"9580_CR63","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1057\/palgrave.ejis.3000657","volume":"16","author":"TJ Strader","year":"2007","unstructured":"Strader, T. J., Ramaswami, S. N., & Houle, P. A. (2007). Perceived network externalities and communication technology acceptance. European Journal of Information Systems, 16(1), 54\u201365.","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"9580_CR64","doi-asserted-by":"publisher","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"A Bhattacherjee","year":"2001","unstructured":"Bhattacherjee, A. (2001). understanding information systems continuance: an expectation-confirmation model. Mis Quarterly, 25(3), 351\u2013370.","journal-title":"Mis Quarterly"},{"issue":"3","key":"9580_CR65","first-page":"3","volume":"10","author":"LTM Nguyen","year":"2016","unstructured":"Nguyen, L. T. M., Gallery, G., & Newton, C. (2016). The influence of financial risk tolerance on investment decision-making in a financial advice context1. Australasian Accounting, Business and Finance Journal, 10(3), 3\u201322.","journal-title":"Australasian Accounting, Business and Finance Journal"},{"issue":"1","key":"9580_CR66","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1016\/j.ijinfomgt.2016.07.005","volume":"37","author":"X Chen","year":"2017","unstructured":"Chen, X., Huang, Q., & Davison, R. M. (2017). The role of website quality and social capital in building buyers\u2019 loyalty. International Journal of Information Management, 37(1), 1563\u20131574.","journal-title":"International Journal of Information Management"},{"issue":"5","key":"9580_CR67","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879\u2013903.","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"9580_CR68","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/25148781","volume":"31","author":"H Liang","year":"2007","unstructured":"Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly: Management Information Systems, 31(1), 59\u201387.","journal-title":"MIS Quarterly: Management Information Systems"},{"issue":"1\u20132","key":"9580_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.lrp.2013.01.001","volume":"46","author":"JF Hair","year":"2013","unstructured":"Hair, J. F., Ringle, C. M., & Sarstedt, M. (2013). Partial least squares structural equation modeling: rigorous applications, better results and higher acceptance. Long Range Planning, 46(1\u20132), 1\u201312.","journal-title":"Long Range Planning"},{"issue":"2","key":"9580_CR70","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1080\/10705519909540128","volume":"6","author":"PF de Jong","year":"1999","unstructured":"de Jong, P. F. (1999). Hierarchical regression analysis in structural equation modeling. Structural Equation Modeling, 6(2), 198\u2013211.","journal-title":"Structural Equation Modeling"},{"issue":"3","key":"9580_CR71","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1177\/002224378101800312","volume":"18","author":"RP Bagozzi","year":"1981","unstructured":"Bagozzi, R. P. (1981). Evaluating structural equation models with unobservable variables and measurement error: a comment. Journal of Marketing Research, 18(3), 375\u2013381.","journal-title":"Journal of Marketing Research"},{"issue":"4","key":"9580_CR72","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1207\/s15327906mbr2504_4","volume":"25","author":"J Jaccard","year":"1990","unstructured":"Jaccard, J., Wan, C. K., & Turrisi, R. (1990). The detection and interpretation of interaction effects between continuous variables in multiple regression. Multivariate Behavioral Research, 25(4), 467\u2013478.","journal-title":"Multivariate Behavioral Research"},{"key":"9580_CR73","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.tourman.2017.10.005","volume":"66","author":"J-J Hew","year":"2018","unstructured":"Hew, J.-J., Leong, L.-Y., Tan, G.W.-H., Lee, V.-H., & Ooi, K.-B. (2018). Mobile social tourism shopping: a dual-stage analysis of a multi-mediation model. Tourism Management, 66, 121\u2013139.","journal-title":"Tourism Management"},{"issue":"1","key":"9580_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/1082-989X.12.1.1","volume":"12","author":"JR Edwards","year":"2007","unstructured":"Edwards, J. R., & Lambert, L. S. (2007). Methods for integrating moderation and mediation: a general analytical framework using moderated path analysis. PSYCHOLOGICAL METHODS, 12(1), 1\u201322.","journal-title":"PSYCHOLOGICAL METHODS"},{"issue":"4","key":"9580_CR75","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1108\/IJBM-07-2019-0269","volume":"38","author":"J-M Lee","year":"2020","unstructured":"Lee, J.-M., & Kim, H.-J. (2020). Determinants of adoption and continuance intentions toward Internet-only banks. International Journal of Bank Marketing, 38(4), 843\u2013865.","journal-title":"International Journal of Bank Marketing"},{"issue":"1","key":"9580_CR76","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1080\/14792779443000049","volume":"6","author":"SD Reicher","year":"1995","unstructured":"Reicher, S. D., Spears, R., & Postmes, T. (1995). A social identity model of deindividuation phenomena. European Review of Social Psychology, 6(1), 161\u2013198.","journal-title":"European Review of Social Psychology"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-022-09580-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10660-022-09580-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-022-09580-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:24:00Z","timestamp":1744201440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10660-022-09580-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,16]]},"references-count":76,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["9580"],"URL":"https:\/\/doi.org\/10.1007\/s10660-022-09580-6","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,16]]},"assertion":[{"value":"14 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"none","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}