{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:59:58Z","timestamp":1773795598181,"version":"3.50.1"},"reference-count":128,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T00:00:00Z","timestamp":1678924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T00:00:00Z","timestamp":1678924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72061147005"],"award-info":[{"award-number":["72061147005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10660-023-09679-4","type":"journal-article","created":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T21:15:07Z","timestamp":1679001307000},"page":"849-878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["To trust or not to trust: a qualitative study of older adults\u2019 online communication during the COVID-19 pandemic"],"prefix":"10.1007","volume":"25","author":[{"given":"Xusen","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Liyang","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8459-8390","authenticated-orcid":false,"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ruixue","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,16]]},"reference":[{"key":"9679_CR1","unstructured":"Cyberspace Administration of China (2021, February 03). The 47th statistical report on Internet development in China Retrieved January 15, 2022, from http:\/\/www.cac.gov.cn\/2021-02\/03\/c_1613923423079314.htm"},{"key":"9679_CR2","doi-asserted-by":"crossref","unstructured":"Choi, N. G., & Dinitto, D. M. (2013). The digital divide among low-income homebound older adults: internet use patterns, eHealth literacy, and attitudes toward computer\/internet use.Journal of Medical Internet Research, 15(5), e93.","DOI":"10.2196\/jmir.2645"},{"issue":"1","key":"9679_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","volume":"37","author":"W Hong","year":"2013","unstructured":"Hong, W., & James, Y. L. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275\u2013298.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9679_CR4","doi-asserted-by":"publisher","first-page":"491","DOI":"10.25300\/MISQ\/2022\/14861","volume":"46","author":"N Zhang","year":"2022","unstructured":"Zhang, N., Wang, C., Karahanna, E., & Xu, Y. (2022). Peer privacy concerns: conceptualization and measurement. MIS Quarterly, 46(1), 491\u2013530. https:\/\/doi.org\/10.25300\/MISQ\/2022\/14861.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9679_CR5","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1186\/s12889-020-09448-0","volume":"20","author":"X Sun","year":"2020","unstructured":"Sun, X., Yan, W., Zhou, H., Wang, Z., Zhang, X., Huang, S., & Li, L. (2020). Internet use and need for digital health technology among the elderly: a cross-sectional survey in China. Bmc Public Health, 20(1), 1386.","journal-title":"Bmc Public Health"},{"key":"9679_CR6","unstructured":"National Bureau of Statistics of China (2021, May 11). The main data of the seventh national census Retrieved January 15, 2022, from http:\/\/www.stats.gov.cn\/tjsj\/zxfb\/202105\/t20210510_1817176.html"},{"key":"9679_CR7","unstructured":"China Development Research Foundation (2021, October 09). China Development Report 2020: Trends and policies of China\u2019s aging population Retrieved January 15, 2022, from https:\/\/www.cdrf.org.cn\/llhxmdt\/5786.htm"},{"key":"9679_CR8","unstructured":"Cacioppo, J. T., & Patrick, W. (2008). Loneliness: human nature and the need for social connection. WW Norton & Company."},{"key":"9679_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y. R. R., & Schulz, P. J. (2016). The effect of information communication technology interventions on reducing social isolation in the elderly: a systematic review.Journal of Medical Internet Research, 18(1), e18.","DOI":"10.2196\/jmir.4596"},{"key":"9679_CR10","doi-asserted-by":"crossref","unstructured":"Armitage, R., & Nellums, L. B. (2020). COVID-19 and the consequences of isolating the elderly.The Lancet Public Health, 5(5), e256","DOI":"10.1016\/S2468-2667(20)30061-X"},{"key":"9679_CR11","unstructured":"Alexander, J. E., & Tate, M. A. (1999). Web wisdom: how to evaluate and create information quality on the web. Lawrence Erlbaum Associates."},{"key":"9679_CR12","volume-title":"Trust in Cyberspace","author":"FB Schneider","year":"1999","unstructured":"Schneider, F. B. (1999). Trust in Cyberspace. Washington: National Academy Press."},{"issue":"2","key":"9679_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2979\/esj.2003.2.2.7","volume":"2","author":"D Gefen","year":"2003","unstructured":"Gefen, D., & Straub, D. W. (2003). Managing user trust in B2C e-Services. E-Service Journal, 2(2), 7\u201324.","journal-title":"E-Service Journal"},{"issue":"2","key":"9679_CR14","doi-asserted-by":"publisher","first-page":"407","DOI":"10.25300\/MISQ\/2014\/38.2.04","volume":"38","author":"Y Fang","year":"2014","unstructured":"Fang, Y., Qureshi, I., Sun, H., Mccole, P., Ramsey, E., & Lim, K. H. (2014). Trust, satisfaction, and online repurchase intention: the moderating role of perceived effectiveness of e-commerce institutional mechanisms. MIS Quarterly, 38(2), 407\u2013427.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9679_CR15","doi-asserted-by":"publisher","first-page":"841","DOI":"10.25300\/MISQ\/2017\/41.3.08","volume":"41","author":"R Bapna","year":"2017","unstructured":"Bapna, R., Qiu, L., & Rice, S. (2017). Repeated interactions versus social ties: quantifying the economic value of trust, forgiveness, and reputation using a field experiment. MIS Quarterly, 41(3), 841\u2013866.","journal-title":"MIS Quarterly"},{"key":"9679_CR16","doi-asserted-by":"crossref","unstructured":"Shareef, M. A., Kumar, V., Dwivedi, Y. K., Kumar, U., & Raman, R. (2021). A new health care system enabled by machine intelligence: elderly people\u2019s trust or losing self control. Technological Forecasting and Social Change, 162, 120334.","DOI":"10.1016\/j.techfore.2020.120334"},{"key":"9679_CR17","doi-asserted-by":"crossref","unstructured":"Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., & Rao, H. R. (2016Mar). Online shopping intention in the context of data breach in online retail stores: an examination of older and younger adults. Decision Support Systems, 83, 47\u201356.","DOI":"10.1016\/j.dss.2015.12.007"},{"issue":"10","key":"9679_CR18","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1111\/j.1525-1497.2004.30381.x","volume":"19","author":"JE Montgomery","year":"2004","unstructured":"Montgomery, J. E., Irish, J. T., Wilson, I. B., Chang, H., Li, H. A. C., Rogers, W. H., & Safran, D. G. (2004). Primary care experiences of Medicare beneficiaries, 1998 to 2000. Journal of General Internal Medicine, 19(10), 991\u2013998.","journal-title":"Journal of General Internal Medicine"},{"key":"9679_CR19","doi-asserted-by":"publisher","first-page":"101152","DOI":"10.1016\/j.ehb.2022.101152","volume":"46","author":"A Brugiavinia","year":"2022","unstructured":"Brugiavinia, A., Novib, C. D., & Orsoc, C. E. (2022). Visiting parents in times of COVID-19: the impact of parent-adult child contacts on the psychological health of the elderly. Economics & Human Biology, 46, 101152.","journal-title":"Economics & Human Biology"},{"key":"9679_CR20","doi-asserted-by":"crossref","unstructured":"Armitage, R., & Nellums, L. B. (2020). Covid-19 and the consequences of isolating the elderly.The Lancet Public Health, 5(5), e256.","DOI":"10.1016\/S2468-2667(20)30061-X"},{"issue":"5","key":"9679_CR21","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1037\/h0031464","volume":"26","author":"JB Rotter","year":"1971","unstructured":"Rotter, J. B. (1971). Generalized expectancies for interpersonal trust. American Psychologist, 26(5), 443\u2013452.","journal-title":"American Psychologist"},{"issue":"3","key":"9679_CR22","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709\u2013734.","journal-title":"Academy of Management Review"},{"issue":"3","key":"9679_CR23","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2307\/259290","volume":"23","author":"DH Mcknight","year":"1998","unstructured":"Mcknight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473\u2013490.","journal-title":"Academy of Management Review"},{"issue":"2","key":"9679_CR24","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1037\/h0024833","volume":"68","author":"K Giffin","year":"1967","unstructured":"Giffin, K. (1967). The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. Psychological Bulletin, 68(2), 104\u2013120.","journal-title":"Psychological Bulletin"},{"key":"9679_CR25","unstructured":"Gabarro, J. J. (1978). The development of trust, influence, and expectations. In A. G. Athos & J. J. Gabarro (Eds.), Interpersonal behavior: Communication and understanding in relationships Englewood Cliffs."},{"issue":"4","key":"9679_CR26","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1037\/h0050834","volume":"51","author":"AA Lumsdaine","year":"1954","unstructured":"Lumsdaine, A. A. (1954). Communication and persuasion. Psychological Bulletin, 51(4), 438\u2013439.","journal-title":"Psychological Bulletin"},{"issue":"1","key":"9679_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1111\/j.2044-8325.1980.tb00005.x","volume":"53","author":"J Cook","year":"1980","unstructured":"Cook, J., & Wall, T. (1980). New work attitude measures of trust, organizational commitment and personal need non-fulfilment. Journal of Occupational & Organizational Psychology, 53(1), 39\u201352. https:\/\/doi.org\/10.1111\/j.2044-8325.1980.tb00005.x.","journal-title":"Journal of Occupational & Organizational Psychology"},{"issue":"3","key":"9679_CR28","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1177\/014920639101700307","volume":"17","author":"JK Butler","year":"1991","unstructured":"Butler, J. K. (1991). Toward understanding and measuring conditions of trust: evolution of a conditions of trust inventory. Journal of Management, 17(3), 643\u2013663. https:\/\/doi.org\/10.1177\/014920639101700307.","journal-title":"Journal of Management"},{"issue":"2","key":"9679_CR29","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1037\/0022-3514.78.2.223","volume":"78","author":"B Lickel","year":"2000","unstructured":"Lickel, B., Hamilton, D., Wieczorkowska, G., Lewis, A., Sherman, S. J., & Uhles, A. N. (2000). Varieties of groups and the perception of group entitativity. Journal of Personality & Social Psychology, 78(2), 223\u2013246.","journal-title":"Journal of Personality & Social Psychology"},{"key":"9679_CR30","doi-asserted-by":"crossref","unstructured":"Earle, T. C., & Cvetkovich, G. (1995). Social trust: toward a cosmopolitan society. Greenwood Publishing Group.","DOI":"10.5040\/9798216016113"},{"issue":"2","key":"9679_CR31","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/10864415.2001.11044235","volume":"6","author":"DH Mcknight","year":"2001","unstructured":"Mcknight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35\u201359.","journal-title":"International Journal of Electronic Commerce"},{"issue":"3\u20134","key":"9679_CR32","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0963-8687(02)00017-3","volume":"11","author":"PA Pavlou","year":"2002","unstructured":"Pavlou, P. A. (2002). Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. Journal of Strategic Information Systems, 11(3\u20134), 215\u2013243.","journal-title":"Journal of Strategic Information Systems"},{"issue":"3","key":"9679_CR33","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10726-013-9340-z","volume":"23","author":"X Cheng","year":"2014","unstructured":"Cheng, X., & Macaulay, L. (2014). Exploring individual trust factors in computer mediated group collaboration: a case study approach. Group Decision and Negotiation, 23(3), 533\u2013560.","journal-title":"Group Decision and Negotiation"},{"issue":"1","key":"9679_CR34","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51\u201390.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9679_CR35","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijinfomgt.2016.11.009","volume":"37","author":"X Cheng","year":"2017","unstructured":"Cheng, X., Fu, S., & Vreede, G. J. (2017). Understanding trust influencing factors in social media communication: a qualitative study. International Journal of Information Management, 37(2), 25\u201335.","journal-title":"International Journal of Information Management"},{"issue":"1","key":"9679_CR36","doi-asserted-by":"publisher","first-page":"209","DOI":"10.25300\/MISQ\/2014\/38.1.10","volume":"38","author":"CX Ou","year":"2014","unstructured":"Ou, C. X., Pavlou, P. A., & Davison, R. M. (2014). Swift guanxi in online marketplaces: the role of computer-mediated communication technologies. MIS Quarterly, 38(1), 209\u2013230.","journal-title":"MIS Quarterly"},{"issue":"4","key":"9679_CR37","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.im.2018.09.014","volume":"56","author":"CA Tsai","year":"2019","unstructured":"Tsai, C. A., & Hung, S. Y. (2019). Examination of community identification and interpersonal trust on continuous use intention: evidence from experienced online community members. Information & Management, 56(4), 552\u2013569.","journal-title":"Information & Management"},{"key":"9679_CR38","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ijmedinf.2019.04.001","volume":"126","author":"M Zhou","year":"2019","unstructured":"Zhou, M., Zhao, L., Kong, N., Campy, K. S., Qu, S., & Wang, S. (2019). Factors influencing behavior intentions to telehealth by chinese elderly: an extended TAM model. International Journal of Medical Informatics, 126, 118\u2013127.","journal-title":"International Journal of Medical Informatics"},{"key":"9679_CR39","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.chb.2018.12.005","volume":"93","author":"HL Yang","year":"2019","unstructured":"Yang, H. L., & Lin, S. L. (2019). The reasons why elderly mobile users adopt ubiquitous mobile social service. Computers in Human Behavior, 93, 62\u201375.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"9679_CR40","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.chb.2012.12.004","volume":"29","author":"MT Braun","year":"2013","unstructured":"Braun, M. T. (2013). Obstacles to social networking website use among older adults. Computers in Human Behavior, 29(3), 673\u2013680.","journal-title":"Computers in Human Behavior"},{"key":"9679_CR41","doi-asserted-by":"publisher","first-page":"101693","DOI":"10.1016\/j.techsoc.2021.101693","volume":"67","author":"Y Hanif","year":"2021","unstructured":"Hanif, Y., & Lallie, H. S. (2021). Security factors on the intention to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM - with perceived cyber security, risk, and trust. Technology in Society, 67, 101693.","journal-title":"Technology in Society"},{"issue":"1","key":"9679_CR42","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1108\/ITP-11-2019-0602","volume":"35","author":"F Meng","year":"2021","unstructured":"Meng, F., Guo, X., Peng, Z., Ye, Q., & Lai, K. H. (2021). Trust and elderly users\u2019 continuance intention regarding mobile health services: the contingent role of health and technology anxieties. Information Technology & People, 35(1), 259\u2013280.","journal-title":"Information Technology & People"},{"key":"9679_CR43","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jpsychires.2018.01.002","volume":"98","author":"KM Han","year":"2018","unstructured":"Han, K. M., Han, C., Shin, C., Jee, H. J., An., H., Yoon, H. K., Ko, Y. H., & Kim, S. H. (2018). Social capital, socioeconomic status, and depression in community-living elderly. Journal of Psychiatric Research, 98, 133\u2013140.","journal-title":"Journal of Psychiatric Research"},{"key":"9679_CR44","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-60031\/v2","author":"H Chen","year":"2020","unstructured":"Chen, H., & Zhu, Z. (2020). Social trust and emotional health in rural older adults in China: the mediating and moderating role of subjective well-being and subjective social status. Bmc Public Health. https:\/\/doi.org\/10.21203\/rs.3.rs-60031\/v2.","journal-title":"Bmc Public Health"},{"issue":"3","key":"9679_CR45","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1037\/0033-295X.103.3.403","volume":"103","author":"TA Salthouse","year":"1996","unstructured":"Salthouse, T. A. (1996). The processing-speed theory of adult age differences in cognition. Psychological review, 103(3), 403\u2013428.","journal-title":"Psychological review"},{"key":"9679_CR46","doi-asserted-by":"crossref","unstructured":"Molm, L. D. (1997). Coercive power in social exchange. Cambridge University Press.","DOI":"10.1017\/CBO9780511570919"},{"issue":"2","key":"9679_CR47","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jsis.2017.02.001","volume":"26","author":"H Ye","year":"2017","unstructured":"Ye, H., & Kankanhalli, A. (2017). Solvers\u2019 participation in crowdsourcing platforms: examining the impacts of trust, and benefit and cost factors. Journal of Strategic Information Systems, 26(2), 101\u2013111.","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"9679_CR48","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/07421222.2002.11045717","volume":"19","author":"D Gefen","year":"2002","unstructured":"Gefen, D., & Ridings, C. M. (2002). Implementation team responsiveness and user evaluation of customer relationship management: a quasi-experimental design study of social exchange theory. Journal of Management Information Systems, 19(1), 47\u201370.","journal-title":"Journal of Management Information Systems"},{"key":"9679_CR49","unstructured":"Blau, P. M. (1964). Exchange and power in social life. John Wiley."},{"issue":"1","key":"9679_CR50","doi-asserted-by":"publisher","first-page":"113","DOI":"10.2307\/25148670","volume":"29","author":"A Kankanhalli","year":"2005","unstructured":"Kankanhalli, A., Tan, B. C. Y., & Wei, K. K. (2005). Contributing knowledge to electronic knowledge repositories: an empirical investigation. MIS Quarterly, 29(1), 113\u2013143.","journal-title":"MIS Quarterly"},{"issue":"6","key":"9679_CR51","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1177\/0149206305279602","volume":"31","author":"R Cropanzano","year":"2005","unstructured":"Cropanzano, R., & Mitchell, M. S. (2005). Social exchange theory: an interdisciplinary review. Journal of Management, 31(6), 874\u2013900.","journal-title":"Journal of Management"},{"issue":"5","key":"9679_CR52","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.im.2016.02.001","volume":"53","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Wang, T., Chen, Y., & Zhang, H. (2016). Knowledge sharing in online health communities: a social exchange theory perspective. Information & Management, 53(5), 643\u2013653.","journal-title":"Information & Management"},{"issue":"1","key":"9679_CR53","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/25148667","volume":"29","author":"ML Wasko","year":"2005","unstructured":"Wasko, M. L., & Faraj, S. (2005). Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35\u201357.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9679_CR54","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1057\/jibs.2010.34","volume":"42","author":"JH Dyer","year":"2011","unstructured":"Dyer, J. H., & Chu, W. (2011). The determinants of trust in supplier-automaker relationships in the U.S. Japan and Korea. Journal of International Business Studies, 42(1), 10\u201327.","journal-title":"Journal of International Business Studies"},{"issue":"5","key":"9679_CR55","doi-asserted-by":"publisher","first-page":"894","DOI":"10.5465\/amj.2006.22798171","volume":"49","author":"R Krishnan","year":"2006","unstructured":"Krishnan, R., Martin, X., & Noorderhaven, N. G. (2006). When does trust matter to alliance performance? Academy of Management Journal, 49(5), 894\u2013917.","journal-title":"Academy of Management Journal"},{"issue":"2","key":"9679_CR56","doi-asserted-by":"publisher","first-page":"161","DOI":"10.2307\/2092623","volume":"25","author":"AW Gouldner","year":"1960","unstructured":"Gouldner, A. W. (1960). The norm of reciprocity: a preliminary statement. American Sociological Review, 25(2), 161\u2013178.","journal-title":"American Sociological Review"},{"issue":"2","key":"9679_CR57","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.jbusres.2021.05.024","volume":"134","author":"DY Kim","year":"2021","unstructured":"Kim, D. Y., & Kim, H. Y. (2021). Trust me, trust me not: a nuanced view of influencer marketing on social media. Journal of Business Research, 134(2), 223\u2013232.","journal-title":"Journal of Business Research"},{"key":"9679_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tourman.2018.02.014","volume":"68","author":"F Kelliher","year":"2018","unstructured":"Kelliher, F., Reinl, L., Johnson, T. G., & Joppe, M. (2018). The role of trust in building rural tourism micro firm network engagement: a multi-case study. Tourism Management, 68, 1\u201312.","journal-title":"Tourism Management"},{"issue":"1","key":"9679_CR59","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.im.2015.08.006","volume":"53","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Min, Q., Zhai, Q., & Smyth, R. (2015). Self-disclosure in chinese micro-blogging: a social exchange theory perspective. Information & Management, 53(1), 53\u201363.","journal-title":"Information & Management"},{"key":"9679_CR60","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.indmarman.2020.05.004","volume":"88","author":"RM Cortez","year":"2020","unstructured":"Cortez, R. M., & Johnston, W. J. (2020). The coronavirus crisis in B2B settings: crisis uniqueness and managerial implications based on social exchange theory. Industrial Marketing Management, 88, 125\u2013135.","journal-title":"Industrial Marketing Management"},{"issue":"6","key":"9679_CR61","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1177\/0149206306294405","volume":"32","author":"RJ Lewicki","year":"2006","unstructured":"Lewicki, R. J., Tomlinson, E. C., & Gillespie, N. (2006). Models of interpersonal trust development: theoretical approaches, empirical evidence, and future directions. Journal of Management, 32(6), 991\u20131022.","journal-title":"Journal of Management"},{"issue":"2","key":"9679_CR62","first-page":"35","volume":"61","author":"PM Doney","year":"1997","unstructured":"Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. Journal of Marketing, 61(2), 35\u201351.","journal-title":"Journal of Marketing"},{"issue":"3","key":"9679_CR63","doi-asserted-by":"publisher","first-page":"601","DOI":"10.2307\/259297","volume":"23","author":"PM Doney","year":"1998","unstructured":"Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601\u2013620.","journal-title":"Academy of Management Review"},{"issue":"1","key":"9679_CR64","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1287\/orsc.14.1.5.12810","volume":"14","author":"KJ Stewart","year":"2003","unstructured":"Stewart, K. J. (2003). Trust transfer on the world wide web. Organization Science, 14(1), 5\u201317.","journal-title":"Organization Science"},{"issue":"2","key":"9679_CR65","doi-asserted-by":"publisher","first-page":"241","DOI":"10.2753\/MIS0742-1222260210","volume":"26","author":"L Robert","year":"2009","unstructured":"Robert, L., Dennis, A. R., & Hung, Y. T. C. (2009). Individual swift trust and knowledge-based trust in face-to-face and virtual team members. Journal of Management Information Systems, 26(2), 241\u2013279.","journal-title":"Journal of Management Information Systems"},{"issue":"7","key":"9679_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2018.10.014","volume":"45","author":"X Cheng","year":"2019","unstructured":"Cheng, X., Gu, Y., & Shen, J. (2019). An integrated view of particularized trust in social commerce: an empirical investigation. International Journal of Information Management, 45(7), 1\u201312.","journal-title":"International Journal of Information Management"},{"issue":"3\u20134","key":"9679_CR67","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/S0963-8687(02)00020-3","volume":"11","author":"DH Mcknight","year":"2002","unstructured":"Mcknight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The Journal of Strategic Information Systems, 11(3\u20134), 297\u2013323.","journal-title":"The Journal of Strategic Information Systems"},{"issue":"1","key":"9679_CR68","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"PA Pavlou","year":"2004","unstructured":"Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37\u201359.","journal-title":"Information Systems Research"},{"issue":"1","key":"9679_CR69","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2753\/JEC1086-4415140105","volume":"14","author":"J Chen","year":"2009","unstructured":"Chen, J., Zhang, C., & Xu, Y. (2009). The role of mutual trust in building members\u2019 loyalty to a C2C platform provider. International Journal of Electronic Commerce, 14(1), 147\u2013117.","journal-title":"International Journal of Electronic Commerce"},{"key":"9679_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2018.02.006","volume":"41","author":"L Liu","year":"2018","unstructured":"Liu, L., Lee, M. K. O., Liu, R., & Chen, J. (2018). Trust transfer in social media brand communities: the role of consumer engagement. International Journal of Information Management, 41, 1\u201313.","journal-title":"International Journal of Information Management"},{"key":"9679_CR71","doi-asserted-by":"publisher","first-page":"113716","DOI":"10.1016\/j.dss.2021.113716","volume":"155","author":"Z Shao","year":"2022","unstructured":"Shao, Z., Zhang, L., Brown, S. A., & Zhao, T. (2022). Understanding users\u2019 trust transfer mechanism in a blockchain-enabled platform: a mixed methods study. Decision Support Systems, 155, 113716.","journal-title":"Decision Support Systems"},{"key":"9679_CR72","unstructured":"Yin, R. (2003). Case study research: Design and methods 3rd edition. SAGE Publications."},{"issue":"4","key":"9679_CR73","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.25300\/MISQ\/2018\/13703","volume":"42","author":"RW Gregory","year":"2018","unstructured":"Gregory, R. W., Kaganer, E., Henfridsson, O., & Ruch, T. J. (2018). IT consumerization and the transformation of IT governance. MIS Quarterly, 42(4), 1225\u20131253.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9679_CR74","doi-asserted-by":"publisher","first-page":"873","DOI":"10.25300\/MISQ\/2019\/14214","volume":"4","author":"N Berente","year":"2019","unstructured":"Berente, N., Yoo, Y., Maurer, C., & Lyytinen, K. (2019). Institutional logics and pluralistic responses to enterprise system implementation: a qualitative meta-analysis. MIS Quarterly, 4(3), 873\u2013902.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9679_CR75","doi-asserted-by":"publisher","first-page":"515","DOI":"10.5465\/amj.2007.25525647","volume":"50","author":"DA Plowman","year":"2007","unstructured":"Plowman, D. A., Baker, L. T., Beck, T., & Kulkarni, M. (2007). Radical change accidentally: the emergence and amplification of small change. Academy of Management Journal, 50(3), 515\u2013543.","journal-title":"Academy of Management Journal"},{"issue":"4","key":"9679_CR76","doi-asserted-by":"publisher","first-page":"532","DOI":"10.2307\/258557","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532\u2013550.","journal-title":"Academy of Management Review"},{"issue":"1","key":"9679_CR77","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1177\/1525822X05279903","volume":"18","author":"G Guest","year":"2006","unstructured":"Guest, G., Bunce, A., & Johnson, L. (2006). How many interviews are enough? An experiment with data saturation and variability. Field Methods, 18(1), 59\u201382.","journal-title":"Field Methods"},{"issue":"2","key":"9679_CR78","doi-asserted-by":"publisher","first-page":"673","DOI":"10.25300\/MISQ\/2019\/12112","volume":"42","author":"P Wunderlich","year":"2019","unstructured":"Wunderlich, P., Veit, D. J., & Sarker, S. (2019). Adoption of sustainable technologies: a mixed-methods study of german households. MIS Quarterly, 42(2), 673\u2013691.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9679_CR79","first-page":"439","volume":"10","author":"JF Marques","year":"2005","unstructured":"Marques, J. F., & Mccall, C. (2005). The application of interrater reliability as a solidification instrument in a phenomenological study. The Qualitative Report, 10(3), 439\u2013462.","journal-title":"The Qualitative Report"},{"issue":"6","key":"9679_CR80","first-page":"1248","volume":"43","author":"TA Scandura","year":"2000","unstructured":"Scandura, T. A., & Williams, E. A. (2000). Research methodology in management: current practices, trends, and implications for future research. The Academy of Management Journal, 43(6), 1248\u20131264.","journal-title":"The Academy of Management Journal"},{"issue":"1","key":"9679_CR81","doi-asserted-by":"publisher","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","volume":"37","author":"V Venkatesh","year":"2013","unstructured":"Venkatesh, V., Brown, S. A., & Susan, A. (2013). Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Quarterly, 37(1), 21\u201354.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9679_CR82","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"DH Mcknight","year":"2002","unstructured":"Mcknight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research, 13(3), 334\u2013359.","journal-title":"Information Systems Research"},{"key":"9679_CR83","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ijinfomgt.2018.03.005","volume":"41","author":"X Cheng","year":"2018","unstructured":"Cheng, X., Fu, S., & Vreede, G. J. (2018). A mixed method investigation of sharing economy driven car-hailing services: online and offline perspectives. International Journal of Information Management, 41, 57\u201364.","journal-title":"International Journal of Information Management"},{"issue":"4","key":"9679_CR84","doi-asserted-by":"publisher","first-page":"100956","DOI":"10.1016\/j.elerap.2020.100956","volume":"40","author":"X Cheng","year":"2020","unstructured":"Cheng, X., Su, L., & Yang, B. (2020). An investigation into sharing economy enabled ridesharing drivers\u2019 trust: a qualitative study. Electronic Commerce Research and Application, 40(4), 100956.","journal-title":"Electronic Commerce Research and Application"},{"issue":"2","key":"9679_CR85","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544\u2013564.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9679_CR86","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.dss.2011.12.007","volume":"53","author":"GW Bock","year":"2012","unstructured":"Bock, G. W., Lee, J., Kuan, H. H., & Kim, J. H. (2012). The progression of online trust in the multi-channel retailer context and the role of product uncertainty. Decision Support Systems, 53(1), 97\u2013107.","journal-title":"Decision Support Systems"},{"key":"9679_CR87","unstructured":"Fung, R., & Lee, M. (1999, December 31). EC-trust (trust in electronic commerce): Exploring the antecedent factors. Americas Conference on Information Systems 1999 Proceedings 179 Retrieved January 15, 2022, from https:\/\/aisel.aisnet.org\/amcis1999\/179"},{"key":"9679_CR88","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.tourman.2014.10.009","volume":"47","author":"EB Ponte","year":"2015","unstructured":"Ponte, E. B., Carvajal-Trujillo, E., & Escobar-Rodriguez, T. (2015). Influence of trust and perceived value on the intention to purchase travel online: integrating the effects of assurance on trust antecedents. Tourism Management, 47, 286\u2013302.","journal-title":"Tourism Management"},{"issue":"3","key":"9679_CR89","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/j.ijinfomgt.2015.02.003","volume":"35","author":"HS Yoon","year":"2015","unstructured":"Yoon, H. S., & Occena, L. G. (2015). Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age. International Journal of Information Management, 35(3), 352\u2013363.","journal-title":"International Journal of Information Management"},{"issue":"8","key":"9679_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1jais.00008","volume":"1","author":"D Gefen","year":"2000","unstructured":"Gefen, D., & Straub, D. W. (2000). The relative importance of perceived ease of use in is adoption: a study of e-commerce adoption. Journal of the Association for Information Systems, 1(8), 1\u201330.","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"9679_CR91","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0963-8687(02)00021-5","volume":"11","author":"CM Ridings","year":"2002","unstructured":"Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. Journal of Strategic Information Systems, 11(3), 271\u2013295.","journal-title":"Journal of Strategic Information Systems"},{"key":"9679_CR92","doi-asserted-by":"crossref","unstructured":"Metzger, M. J. Effects of site, vendor, and consumer characteristics on web site trust and disclosure.Communication Research, 33(3),155\u2013179.","DOI":"10.1177\/0093650206287076"},{"issue":"5","key":"9679_CR93","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.chb.2010.03.013","volume":"26","author":"A Beldad","year":"2010","unstructured":"Beldad, A., Jong, M. D., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857\u2013869.","journal-title":"Computers in Human Behavior"},{"key":"9679_CR94","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.elerap.2017.11.002","volume":"27","author":"K Stouthuysen","year":"2017","unstructured":"Stouthuysen, K., Teunis, I., Reusen, E., & Slabbinck, H. (2017). Initial trust and intentions to buy: the effect of vendor-specific guarantees, customer reviews and the role of online shopping experience. Electronic Commerce Research and Applications, 27, 23\u201338.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"5757","key":"9679_CR95","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1126\/science.1116869","volume":"311","author":"G Kossinets","year":"2006","unstructured":"Kossinets, G., & Watts, D. J. (2006). Empirical analysis of an evolving social network. Science, 311(5757), 88\u201390.","journal-title":"Science"},{"issue":"1","key":"9679_CR96","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M Mcpherson","year":"2001","unstructured":"Mcpherson, M., & Cook, S. (2001). Birds of a feather: homophily in social networks. Annual Review of Sociology, 27(1), 415\u2013444.","journal-title":"Annual Review of Sociology"},{"issue":"4","key":"9679_CR97","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2753\/MIS0742-1222240401","volume":"24","author":"DJ Kim","year":"2008","unstructured":"Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13\u201345.","journal-title":"Journal of Management Information Systems"},{"key":"9679_CR98","doi-asserted-by":"crossref","unstructured":"Xiao, L., Zhang, Y., & Fu, B. (2019May). Exploring the moderators and causal process of trust transfer in online-to- offline commerce. Journal of Business Research, 98, 214\u2013226.","DOI":"10.1016\/j.jbusres.2019.01.069"},{"issue":"6","key":"9679_CR99","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/j.im.2014.05.016","volume":"51","author":"D Belanche","year":"2014","unstructured":"Belanche, D., Casal\u00f3, L. V., Flavi\u00e1n, C., & Schepers, J. (2014). Trust transfer in the continued usage of public e-services. Information & Management, 51(6), 627\u2013640.","journal-title":"Information & Management"},{"issue":"3","key":"9679_CR100","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/002224299405800302","volume":"58","author":"RM Morgan","year":"1994","unstructured":"Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20\u201338.","journal-title":"Journal of Marketing"},{"issue":"1","key":"9679_CR101","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1509\/jmkg.66.1.15.18449","volume":"66","author":"D Sirdeshmukh","year":"2002","unstructured":"Sirdeshmukh, D., & Sabol, S. B. (2002). Consumer trust, value, and loyalty in relational exchanges. Journal of Marketing, 66(1), 15\u201337.","journal-title":"Journal of Marketing"},{"key":"9679_CR102","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.tourman.2018.01.009","volume":"67","author":"K So","year":"2018","unstructured":"So, K., Oh, H., & Min, S. (2018). Motivations and constraints of Airbnb consumers: findings from a mixed-methods approach. Tourism Management, 67, 224\u2013236.","journal-title":"Tourism Management"},{"issue":"4","key":"9679_CR103","doi-asserted-by":"publisher","first-page":"695","DOI":"10.2307\/25148660","volume":"28","author":"HVD Heijden","year":"2004","unstructured":"Heijden, H. V. D. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695\u2013704.","journal-title":"MIS Quarterly"},{"issue":"4","key":"9679_CR104","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","volume":"11","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V. (2000). Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342\u2013365.","journal-title":"Information Systems Research"},{"issue":"1","key":"9679_CR105","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157\u2013178.","journal-title":"MIS Quarterly"},{"issue":"4","key":"9679_CR106","doi-asserted-by":"publisher","first-page":"665","DOI":"10.2307\/3250951","volume":"24","author":"R Agarwal","year":"2000","unstructured":"Agarwal, R., & Karahanna, E. (2000). Time flies when you\u2019re having fun: cognitive absorption and beliefs about information technology usage 1. MIS Quarterly, 24(4), 665\u2013694.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9679_CR107","doi-asserted-by":"publisher","first-page":"102721","DOI":"10.1016\/j.jretconser.2021.102721","volume":"63","author":"M Uzir","year":"2021","unstructured":"Uzir, M., Halbusi, H. A., Thurasamy, R., Hock, R., & Hamid, M. (2021). The effects of service quality, perceived value and trust in home delivery service personnel on customer satisfaction: evidence from a developing country. Journal of Retailing and Consumer Services, 63(2), 102721.","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"2","key":"9679_CR108","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1177\/0092070394222001","volume":"22","author":"AS Dick","year":"1994","unstructured":"Dick, A. S., & Basu, K. (1994). Customer loyalty: toward an integrated conceptual framework. Journal of the Academy of Marketing Science, 22(2), 99\u2013113.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"3","key":"9679_CR109","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1177\/1094670507310767","volume":"10","author":"T Dewitt","year":"2008","unstructured":"Dewitt, T., Nguyen, D. T., & Marshall, R. (2008). Exploring customer loyalty following service recovery: the mediating effects of trust and emotions. Journal of Service Research, 10(3), 269\u2013281.","journal-title":"Journal of Service Research"},{"key":"9679_CR110","doi-asserted-by":"publisher","first-page":"113846","DOI":"10.1016\/j.dss.2022.113846","volume":"163","author":"SW Schuetz","year":"2022","unstructured":"Schuetz, S. W., Steelman, Z. R., & Syler, R. A. (2022). It\u2019s not just about accuracy: an investigation of the human factors in users\u2019 reliance on anti-phishing tools. Decision Support Systems, 163, 113846.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9679_CR111","doi-asserted-by":"publisher","first-page":"103394","DOI":"10.1016\/j.im.2020.103394","volume":"58","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Zahedi, F. M., Abbasi, A., & Dobolyi, D. (2021). Trust calibration of automated security IT artifacts: a multi-domain study of phishing-website detection tools. Information & Management, 58(1), 103394.","journal-title":"Information & Management"},{"key":"9679_CR112","doi-asserted-by":"publisher","first-page":"104416","DOI":"10.1016\/j.tourman.2021.104416","volume":"88","author":"YR Kim","year":"2022","unstructured":"Kim, Y. R., & Liu, A. (2022). Social distancing, trust and post-COVID \u2013 19 recovery. Tourism Management, 88, 104416.","journal-title":"Tourism Management"},{"key":"9679_CR113","doi-asserted-by":"publisher","first-page":"103207","DOI":"10.1016\/j.jretconser.2022.103207","volume":"71","author":"MN Sakib","year":"2023","unstructured":"Sakib, M. N., Hasan, F., Emran, M. A., & Felix, R. (2023). A cross-cultural analysis of ridesharing intentions and compliance with COVID-19 health guidelines: the roles of social trust, fear of COVID-19, and trust-in-God. Journal of Retailing and Consumer Services, 71, 103207.","journal-title":"Journal of Retailing and Consumer Services"},{"key":"9679_CR114","doi-asserted-by":"publisher","first-page":"110869","DOI":"10.1016\/j.paid.2021.110869","volume":"178","author":"DD Cong","year":"2021","unstructured":"Cong, D. D. (2021). The impact of fear and anxiety of COVID-19 on life satisfaction: psychological distress and sleep disturbance as mediators. Personality and Individual Differences, 178, 110869.","journal-title":"Personality and Individual Differences"},{"key":"9679_CR115","doi-asserted-by":"publisher","first-page":"102307","DOI":"10.1016\/j.janxdis.2020.102307","volume":"76","author":"G Boyraz","year":"2020","unstructured":"Boyraz, G., Legros, D. N., & Tigershtrom, A. (2020). Covid-19 and traumatic stress: the role of perceived vulnerability, covid-19-related worries, and social isolation. Journal of Anxiety Disorders, 76, 102307.","journal-title":"Journal of Anxiety Disorders"},{"issue":"5","key":"9679_CR116","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1111\/1467-8721.ep11512261","volume":"4","author":"LL Carstensen","year":"1995","unstructured":"Carstensen, L. L. (1995). Evidence for a life-span theory of socioemotional selectivity. Current Directions in Psychological Science, 4(5), 151\u2013162.","journal-title":"Current Directions in Psychological Science"},{"issue":"3","key":"9679_CR117","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1177\/0956797610361706","volume":"21","author":"CR Mortensen","year":"2010","unstructured":"Mortensen, C. R., Becker, D. V., Ackerman, J. M., Neuberg, S. L., & Kenrick, D. T. (2010). Infection breeds reticence the effects of disease salience on self-perceptions of personality and behavioral avoidance tendencies. Psychological Science, 21(3), 440\u2013447.","journal-title":"Psychological Science"},{"issue":"6","key":"9679_CR118","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1037\/a0027198","volume":"102","author":"SL Miller","year":"2012","unstructured":"Miller, S. L., & Maner, J. K. (2012). Overperceiving disease cues: the basic cognition of the behavioral immune system. Journal of Personality and Social Psychology, 102(6), 1198\u20131213.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"9679_CR119","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1037\/0033-2909.98.2.310","volume":"98","author":"S Cohen","year":"1985","unstructured":"Cohen, S., & Wills, T. A. (1985). Stress, social support, and the buffering hypothesis. Psychological Bulletin, 98(2), 310\u2013357.","journal-title":"Psychological Bulletin"},{"issue":"2","key":"9679_CR120","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s12160-010-9210-8","volume":"40","author":"LC Hawkley","year":"2010","unstructured":"Hawkley, L. C., & Cacioppo, J. T. (2010). Loneliness matters: a theoretical and empirical review of consequences and mechanisms. Annals of Behavioral Medicine: A Publication of the Society of Behavioral Medicine, 40(2), 218\u2013227.","journal-title":"Annals of Behavioral Medicine: A Publication of the Society of Behavioral Medicine"},{"issue":"4","key":"9679_CR121","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1007\/s11469-019-00082-5","volume":"17","author":"MC D\u2019Arienzo","year":"2019","unstructured":"D\u2019Arienzo, M. C., Boursier, V., & Griffiths, M. D. (2019). Addiction to social media and attachment styles: a systematic literature review. International Journal of Mental Health and Addiction, 17(4), 1094\u20131118.","journal-title":"International Journal of Mental Health and Addiction"},{"issue":"10","key":"9679_CR122","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.tics.2009.06.005","volume":"13","author":"JT Cacioppo","year":"2009","unstructured":"Cacioppo, J. T., & Hawkley, L. C. (2009). Perceived social isolation and cognition. Trends in Cognitive Sciences, 13(10), 447\u2013454.","journal-title":"Trends in Cognitive Sciences"},{"key":"9679_CR123","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.dss.2016.03.007","volume":"86","author":"W Wang","year":"2016","unstructured":"Wang, W., Qiu, L., Kim, D., & Benbasat, I. (2016). Effects of rational and social appeals of online recommendation agents on cognition- and affect-based trust. Decision Support Systems, 86, 48\u201360.","journal-title":"Decision Support Systems"},{"issue":"4","key":"9679_CR124","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1177\/0149206312439327","volume":"38","author":"CA Fulmer","year":"2012","unstructured":"Fulmer, C. A., & Gelfand, M. J. (2012). At what level (and in whom) we trust: trust across multiple organizational levels. Journal of Management, 38(4), 1167\u20131230.","journal-title":"Journal of Management"},{"issue":"3","key":"9679_CR125","doi-asserted-by":"publisher","first-page":"103504","DOI":"10.1016\/j.im.2021.103504","volume":"58","author":"B Luo","year":"2021","unstructured":"Luo, B., Wang, Z., & Zhang, S. (2021). Platform-based mechanisms, institutional trust, and continuous use intention: the moderating role of perceived effectiveness of sharing economy institutional mechanisms. Information & Management, 58(3), 103504.","journal-title":"Information & Management"},{"key":"9679_CR126","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.dss.2016.03.004","volume":"85","author":"B Lu","year":"2016","unstructured":"Lu, B., Zhang, T., Wang, L., & Keller, L. R. (2016). Trust antecedents, trust and online microsourcing adoption: an empirical study from the resource perspective. Decision Support Systems, 85, 104\u2013114.","journal-title":"Decision Support Systems"},{"key":"9679_CR127","doi-asserted-by":"crossref","unstructured":"Xia, D., Li, Y., He, Y., Zhang, T., Wang, Y., & Gu, J. (2019Sep). Exploring the role of cultural individualism and collectivism on public acceptance of nuclear energy. Energy Policy, 132, 208\u2013214.","DOI":"10.1016\/j.enpol.2019.05.014"},{"issue":"9","key":"9679_CR128","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1287\/mnsc.44.9.1205","volume":"44","author":"EU Weber","year":"1998","unstructured":"Weber, E. U., & Hsee, C. (1998). Cross-cultural differences in risk perception, but cross-cultural similarities in attitudes towards perceived risk. Management Science, 44(9), 1205\u20131217.","journal-title":"Management Science"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-023-09679-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10660-023-09679-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-023-09679-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:27:38Z","timestamp":1743218858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10660-023-09679-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,16]]},"references-count":128,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["9679"],"URL":"https:\/\/doi.org\/10.1007\/s10660-023-09679-4","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,16]]},"assertion":[{"value":"27 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}