{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:15:11Z","timestamp":1772644511669,"version":"3.50.1"},"reference-count":102,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10799-023-00409-8","type":"journal-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T18:02:14Z","timestamp":1693332134000},"page":"219-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Coping or threat? Unraveling the mechanisms enabling user acceptance of blockchain technologies"],"prefix":"10.1007","volume":"26","author":[{"given":"Soo Jung","family":"Oh","sequence":"first","affiliation":[]},{"given":"Shufeng","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Byung Il","family":"Park","sequence":"additional","affiliation":[]},{"given":"Taewoo","family":"Roh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"issue":"9","key":"409_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.2017.3571064","volume":"50","author":"T Aste","year":"2017","unstructured":"Aste T, Tasca P, Matteo TD (2017) Blockchain technologies: the foreseeable impact on society and industry. Computer 50(9):18\u201328","journal-title":"Computer"},{"key":"409_CR2","first-page":"70","volume":"46","author":"MM Queiroz","year":"2019","unstructured":"Queiroz MM, Fosso Wamba S (2019) Blockchain adoption challenges in supply chain: an empirical investigation of the main drivers in India and the USA. Int J Inf Manag 46:70\u201382","journal-title":"Int J Inf Manag"},{"key":"409_CR3","doi-asserted-by":"publisher","first-page":"107207","DOI":"10.1016\/j.chb.2022.107207","volume":"131","author":"D Marikyan","year":"2022","unstructured":"Marikyan D, Papagiannidis S, Rana OF, Ranjan R (2022) Blockchain adoption: a study of cognitive factors underpinning decision making. Comput Hum Behav 131:107207","journal-title":"Comput Hum Behav"},{"issue":"2","key":"409_CR4","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1108\/EL-06-2019-0150","volume":"38","author":"J-W Lian","year":"2020","unstructured":"Lian J-W, Chen C-T, Shen L-F, Chen H-M (2020) Understanding user acceptance of blockchain-based smart locker. Electron Libr 38(2):353\u2013366","journal-title":"Electron Libr"},{"issue":"5","key":"409_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1002\/jsc.2360","volume":"29","author":"T Clohessy","year":"2020","unstructured":"Clohessy T, Treiblmaier H, Acton T, Rogers N (2020) Antecedents of blockchain adoption: an integrative framework. Strateg Chang 29(5):501\u2013515","journal-title":"Strateg Chang"},{"issue":"2","key":"409_CR6","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2021.1912915","volume":"38","author":"T-P Liang","year":"2021","unstructured":"Liang T-P, Kohli R, Huang H-C, Li Z-L (2021) What drives the adoption of the blockchain technology? A fit-viability perspective. J Manag Inf Syst 38(2):314\u2013337","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"409_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3390\/computers11020024","volume":"11","author":"H Taherdoost","year":"2022","unstructured":"Taherdoost H (2022) A critical review of blockchain acceptance models\u2014blockchain technology adoption frameworks and applications. Computers 11(2):24","journal-title":"Computers"},{"issue":"9","key":"409_CR8","doi-asserted-by":"publisher","first-page":"5176","DOI":"10.3390\/su14095176","volume":"14","author":"A AL-Ashmori","year":"2022","unstructured":"AL-Ashmori A, Basri SB, Dominic PDD, Capretz LF, Muneer A, Balogun AO, Gilal AR, Ali RF (2022) Classifications of sustainable factors in blockchain adoption: a literature review and bibliometric analysis. Sustainability 14(9):5176","journal-title":"Sustainability"},{"issue":"3","key":"409_CR9","first-page":"94","volume":"98","author":"V Gaur","year":"2020","unstructured":"Gaur V, Gaiha A (2020) Building a transparent supply chain blockchain can enhance trust, efficiency, and speed. Harv Bus Rev 98(3):94\u2013103","journal-title":"Harv Bus Rev"},{"key":"409_CR10","unstructured":"Vitasek K, Bayliss J, Owen L, Srivastava N (2022) How walmart canada uses blockchain to solve supply-chain challenges. Harv Bus Rev 5"},{"key":"409_CR11","doi-asserted-by":"crossref","unstructured":"Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B (2017) In Blockchain technology innovations, IEEE Technology & Engineering Management Conference (TEMSCON), 8\u201310 June 2017, 2017; 2017; pp\u00a0137\u2013141","DOI":"10.1109\/TEMSCON.2017.7998367"},{"issue":"2","key":"409_CR12","first-page":"174","volume":"41","author":"S-J Chang","year":"2020","unstructured":"Chang S-J, Av W, Eden L (2020) From the editors: common method variance in international business research. J Int Bus Stud 41(2):174\u2013184","journal-title":"J Int Bus Stud"},{"key":"409_CR13","unstructured":"Blockchains Top 5 blockchain security issues in 2022 (2022) Available online: https:\/\/101blockchains.com\/blockchain-security-issues\/ (Accessed 09"},{"key":"409_CR14","unstructured":"Degirmenci K, Barros A (2021) In How secure is blockchain? extending the protection motivation theory with trust, Proceedings of the 27th Americas Conference on Information Systems, AMCIS 2021, ; 2021; p\u00a01301"},{"issue":"1","key":"409_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10586-020-03200-4","volume":"24","author":"M Alazab","year":"2021","unstructured":"Alazab M, Alhyari S, Awajan A, Abdallah AB (2021) Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption\/acceptance. Cluster Comput 24(1):83\u2013101","journal-title":"Cluster Comput"},{"key":"409_CR16","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.jbusres.2022.05.015","volume":"149","author":"M Dehghani","year":"2022","unstructured":"Dehghani M, William Kennedy R, Mashatan A, Rese A, Karavidas D (2022) High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology. J Bus Res 149:393\u2013411","journal-title":"J Bus Res"},{"key":"409_CR17","volume-title":"From promise to reality: Deloitte\u2019s 2020 global blockchain survey","author":"L Pawczuk","year":"2020","unstructured":"Pawczuk L, Holdowsky J, Massey R, Hansen B (2020) From promise to reality: Deloitte\u2019s 2020 global blockchain survey. Deloitte Consulting LLP, London, UK"},{"issue":"1","key":"409_CR18","first-page":"29","volume":"24","author":"T Roh","year":"2023","unstructured":"Roh T, Park BI, Xiao SS (2023) Adoption of AI-enabled robo-advisors in fintech: simultaneous employment of UTAUT and the theory of reasoned action. J Electron Commer 24(1):29\u201347","journal-title":"J Electron Commer"},{"key":"409_CR19","doi-asserted-by":"publisher","first-page":"120465","DOI":"10.1016\/j.techfore.2020.120465","volume":"163","author":"SS Kamble","year":"2021","unstructured":"Kamble SS, Gunasekaran A, Kumar V, Belhadi A, Foropon C (2021) A machine learning based approach for predicting blockchain adoption in supply chain. Technol Forecast Soc Change 163:120465","journal-title":"Technol Forecast Soc Change"},{"key":"409_CR20","first-page":"101320","volume":"62","author":"H Albayati","year":"2020","unstructured":"Albayati H, Kim SK, Rho JJ (2020) Accepting financial transactions using blockchain technology and cryptocurrency: a customer perspective approach. Tehcnol Soc 62:101320","journal-title":"Tehcnol Soc"},{"issue":"7","key":"409_CR21","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.1080\/00207543.2020.1730463","volume":"58","author":"L-W Wong","year":"2020","unstructured":"Wong L-W, Tan GW-H, Lee V-H, Ooi K-B, Sohal A (2020) Unearthing the determinants of blockchain adoption in supply chain management. Int J Product Res 58(7):2100\u20132123","journal-title":"Int J Product Res"},{"key":"409_CR22","first-page":"114","volume":"49","author":"L Hughes","year":"2019","unstructured":"Hughes L, Dwivedi YK, Misra SK, Rana NP, Raghavan V, Akella V (2019) Blockchain research, practice and policy: applications, benefits, limitations, emerging research themes and research agenda. Int J Inf Manag 49:114\u2013129","journal-title":"Int J Inf Manag"},{"issue":"5","key":"409_CR23","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1080\/01972243.2020.1795958","volume":"36","author":"D Kavanagh","year":"2020","unstructured":"Kavanagh D, Ennis PJ (2020) Cryptocurrencies and the emergence of blockocracy. Inf Soc 36(5):290\u2013300","journal-title":"Inf Soc"},{"issue":"4","key":"409_CR24","doi-asserted-by":"publisher","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","volume":"39","author":"SR Boss","year":"2015","unstructured":"Boss SR, Galletta DF, Lowry PB, Moody GD, Polak P (2015) What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Q 39(4):837\u2013864","journal-title":"MIS Q"},{"issue":"7","key":"409_CR25","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1177\/0093650218800915","volume":"48","author":"SC Boerman","year":"2021","unstructured":"Boerman SC, Kruikemeier S, Zuiderveen Borgesius FJ (2021) Exploring motivations for online privacy protection behavior: insights from panel data. Commun Res 48(7):953\u2013977","journal-title":"Commun Res"},{"key":"409_CR26","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jbusres.2022.07.045","volume":"152","author":"J Cloarec","year":"2022","unstructured":"Cloarec J (2022) Privacy controls as an information source to reduce data poisoning in artificial intelligence-powered personalization. J Bus Res 152:144\u2013153","journal-title":"J Bus Res"},{"issue":"2","key":"409_CR27","doi-asserted-by":"publisher","first-page":"213","DOI":"10.2307\/249689","volume":"19","author":"DL Goodhue","year":"1995","unstructured":"Goodhue DL, Thompson RL (1995) Task-technology fit and individual performance. MIS Q 19(2):213\u2013236","journal-title":"MIS Q"},{"issue":"1","key":"409_CR28","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. J Psychol 91(1):93\u2013114","journal-title":"J Psychol"},{"issue":"5","key":"409_CR29","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"JE Maddux","year":"1983","unstructured":"Maddux JE, Rogers RW (1983) Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. J Exp Soc Psychol 19(5):469\u2013479","journal-title":"J Exp Soc Psychol"},{"issue":"1","key":"409_CR30","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83\u201395","journal-title":"Comput Secur"},{"issue":"4","key":"409_CR31","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1080\/07421222.2017.1394083","volume":"34","author":"P Menard","year":"2017","unstructured":"Menard P, Bott GJ, Crossler RE (2017) User motivations in protecting information security: protection motivation theory versus self-determination theory. J Manag Inf Syst 34(4):1203\u20131230","journal-title":"J Manag Inf Syst"},{"key":"409_CR32","first-page":"153","volume-title":"Social psychophysiology: a sourcebook","author":"RW Rogers","year":"1983","unstructured":"Rogers RW (1983) Cognitive and psychological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo J, Petty R (eds) Social psychophysiology: a sourcebook. Guilford Press, New York, pp 153\u2013176"},{"key":"409_CR33","unstructured":"Woon I, Tan G-W, Low R (2005) In A protection motivation theory approach to home wireless security, 26th International Conference on Information Systems, Las Vegas, USA, ; Las Vegas, USA, 2005; pp\u00a0367\u2013380"},{"key":"409_CR34","doi-asserted-by":"crossref","unstructured":"Chenoweth T, Minch R, Gattiker T (2009) In Application of protection motivation theory to adoption of protective technologies, 42nd Hawaii International Conference on System Sciences, 5\u20138 Jan. 2009, 2009; 2009; pp\u00a01\u201310","DOI":"10.1109\/HICSS.2009.74"},{"key":"409_CR35","first-page":"62","volume":"41","author":"T Alashoor","year":"2017","unstructured":"Alashoor T, Han S, Joseph RC (2017) Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: an APCO model. Commun Assoc Inf Syst 41:62\u201396","journal-title":"Commun Assoc Inf Syst"},{"issue":"4","key":"409_CR36","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/2691517.2691521","volume":"45","author":"R Crossler","year":"2014","unstructured":"Crossler R, B\u00e9langer F (2014) An extended perspective on individual security behaviors. Data Base Adv Inf Syst 45(4):51\u201371","journal-title":"Data Base Adv Inf Syst"},{"issue":"3\u20134","key":"409_CR37","first-page":"6","volume":"19","author":"D Goodhue","year":"1988","unstructured":"Goodhue D (1988) I\/S attitudes: toward theoretical and definitional clarity. ACM SIGMIS database: the DATABASE for advances. Inform Syst 19(3\u20134):6\u201315","journal-title":"Inform Syst"},{"key":"409_CR38","doi-asserted-by":"publisher","first-page":"106900","DOI":"10.1016\/j.chb.2021.106900","volume":"124","author":"X Wang","year":"2021","unstructured":"Wang X, Wong YD, Chen T, Yuen KF (2021) Adoption of shopper-facing technologies under social distancing: a conceptualisation and an interplay between task-technology fit and technology trust. Comput Hum Behav 124:106900","journal-title":"Comput Hum Behav"},{"issue":"4","key":"409_CR39","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.chb.2010.01.013","volume":"26","author":"T Zhou","year":"2010","unstructured":"Zhou T, Lu Y, Wang B (2010) Integrating TTF and UTAUT to explain mobile banking user adoption. Comput Hum Behav 26(4):760\u2013767","journal-title":"Comput Hum Behav"},{"issue":"4","key":"409_CR40","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.im.2013.10.003","volume":"51","author":"M Aljukhadar","year":"2014","unstructured":"Aljukhadar M, Senecal S, Nantel J (2014) Is more always better? Investigating the task-technology fit theory in an online user context. Inf Manag 51(4):391\u2013397","journal-title":"Inf Manag"},{"issue":"3","key":"409_CR41","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.emj.2020.10.001","volume":"39","author":"C Walsh","year":"2021","unstructured":"Walsh C, O\u2019Reilly P, Gleasure R, McAvoy J, O\u2019Leary K (2021) Understanding manager resistance to blockchain systems. Eur Manag J 39(3):353\u2013365","journal-title":"Eur Manag J"},{"key":"409_CR42","doi-asserted-by":"crossref","unstructured":"Luo Y, Wang G, Li Y, Ye Q (2021) Examining protection motivation and network externality perspective regarding the continued intention to use m-health apps. In Int J Environ Res Public Health, ; Vol. 18","DOI":"10.3390\/ijerph18115684"},{"key":"409_CR43","doi-asserted-by":"publisher","first-page":"120328","DOI":"10.1016\/j.techfore.2020.120328","volume":"161","author":"P-J Hsieh","year":"2020","unstructured":"Hsieh P-J, Lai H-M (2020) Exploring people\u2019s intentions to use the health passbook in self-management: an extension of the technology acceptance and health behavior theoretical perspectives in health literacy. Technol Forecast Soc Change 161:120328","journal-title":"Technol Forecast Soc Change"},{"issue":"2","key":"409_CR44","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1057\/ejis.2009.11","volume":"18","author":"Y Lee","year":"2009","unstructured":"Lee Y, Larsen KR (2009) Threat or coping appraisal: determinants of SMB executives\u2019 decision to adopt anti-malware software. Eur J Inf Syst 18(2):177\u2013187","journal-title":"Eur J Inf Syst"},{"issue":"2","key":"409_CR45","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.dss.2010.07.009","volume":"50","author":"Y Lee","year":"2011","unstructured":"Lee Y (2011) Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective. Decis Support Syst 50(2):361\u2013369","journal-title":"Decis Support Syst"},{"key":"409_CR46","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.chb.2016.09.054","volume":"66","author":"J Laugesen","year":"2017","unstructured":"Laugesen J, Hassanein K (2017) Adoption of personal health records by chronic disease patients: a research model and an empirical study. Comput Hum Behav 66:256\u2013272","journal-title":"Comput Hum Behav"},{"issue":"6","key":"409_CR47","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.im.2008.06.004","volume":"45","author":"T-C Lin","year":"2008","unstructured":"Lin T-C, Huang C-C (2008) Understanding knowledge management system usage antecedents: an integration of social cognitive theory and task technology fit. Inf Manag 45(6):410\u2013417","journal-title":"Inf Manag"},{"key":"409_CR48","first-page":"101473","volume":"64","author":"M Shahbaz","year":"2021","unstructured":"Shahbaz M, Gao C, Zhai L, Shahzad F, Khan I (2021) Environmental air pollution management system: predicting user adoption behavior of big data analytics. Tehcnol Soc 64:101473","journal-title":"Tehcnol Soc"},{"issue":"1","key":"409_CR49","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1111\/j.1540-5915.1998.tb01346.x","volume":"29","author":"LD Goodhue","year":"1998","unstructured":"Goodhue LD (1998) Development and measurement validity of a task-technology fit instrument for user evaluations of information system. Decis Sci 29(1):105\u2013138","journal-title":"Decis Sci"},{"issue":"1","key":"409_CR50","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0378-7206(98)00101-3","volume":"36","author":"MT Dishaw","year":"1999","unstructured":"Dishaw MT, Strong DM (1999) Extending the technology acceptance model with task\u2013technology fit constructs. Inf Manag 36(1):9\u201321","journal-title":"Inf Manag"},{"issue":"5","key":"409_CR51","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.chb.2010.02.005","volume":"26","author":"DC Yen","year":"2010","unstructured":"Yen DC, Wu C-S, Cheng F-F, Huang Y-W (2010) Determinants of users\u2019 intention to adopt wireless technology: an empirical study by integrating TTF with TAM. Comput Hum Behav 26(5):906\u2013915","journal-title":"Comput Hum Behav"},{"issue":"12","key":"409_CR52","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1287\/mnsc.41.12.1827","volume":"41","author":"LD Goodhue","year":"1995","unstructured":"Goodhue LD (1995) Understanding user evaluations of information systems. Manag Sci 41(12):1827\u20131844","journal-title":"Manag Sci"},{"key":"409_CR53","doi-asserted-by":"crossref","unstructured":"Roth T, Stohr A, Amend J, Fridgen G, Rieger A (2022) Blockchain as a driving force for federalism: a theory of cross-organizational task-technology fit. Int J Inf Manag forthcoming","DOI":"10.1016\/j.ijinfomgt.2022.102476"},{"key":"409_CR54","unstructured":"Forbes 13 evolving and emerging uses for blockchain technology. Available online: https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/06\/10\/13-evolving-and-emerging-uses-for-blockchain-technology\/?sh=50665331162e"},{"key":"409_CR55","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.rser.2019.03.002","volume":"107","author":"A Ahl","year":"2019","unstructured":"Ahl A, Yarime M, Tanaka K, Sagawa D (2019) Review of blockchain-based distributed energy: implications for institutional development. Renew Sust Energ Rev 107:200\u2013211","journal-title":"Renew Sust Energ Rev"},{"key":"409_CR56","doi-asserted-by":"publisher","first-page":"128579","DOI":"10.1016\/j.jclepro.2021.128579","volume":"319","author":"B Niu","year":"2021","unstructured":"Niu B, Shen Z, Xie F (2021) The value of blockchain and agricultural supply chain parties\u2019 participation confronting random bacteria pollution. J Clean Prod 319:128579","journal-title":"J Clean Prod"},{"issue":"3","key":"409_CR57","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.chb.2009.02.006","volume":"25","author":"TJ Larsen","year":"2009","unstructured":"Larsen TJ, S\u00f8reb\u00f8 AM, S\u00f8reb\u00f8 \u00d8 (2009) The role of task-technology fit as users\u2019 motivation to continue information system use. Comput Hum Behav 25(3):778\u2013784","journal-title":"Comput Hum Behav"},{"issue":"1","key":"409_CR58","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/10627260802153421","volume":"21","author":"B Rawlins","year":"2008","unstructured":"Rawlins B (2008) Give the emperor a mirror: toward developing a stakeholder measurement of organizational transparency. J Public Relat Res 21(1):71\u201399","journal-title":"J Public Relat Res"},{"key":"409_CR59","first-page":"861","volume-title":"The virtuous journalist","author":"S Klaidman","year":"1987","unstructured":"Klaidman S (1987) The virtuous journalist, vol 98. Oxford University Press, New York, pp 861\u2013863"},{"issue":"4","key":"409_CR60","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1111\/1467-6478.00199","volume":"28","author":"L Stirton","year":"2001","unstructured":"Stirton L, Lodge M (2001) Transparency mechanisms: building publicness into public services. J Law Soc 28(4):471\u2013489","journal-title":"J Law Soc"},{"key":"409_CR61","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.dss.2015.11.005","volume":"82","author":"Z-J Chen","year":"2016","unstructured":"Chen Z-J, Vogel D, Wang Z-H (2016) How to satisfy citizens? Using mobile government to reengineer fair government processes. Decis Support Syst 82:47\u201357","journal-title":"Decis Support Syst"},{"key":"409_CR62","doi-asserted-by":"publisher","first-page":"122041","DOI":"10.1016\/j.techfore.2022.122041","volume":"185","author":"Y Kim","year":"2022","unstructured":"Kim Y, Roh T (2022) Preparing an exhibition in the post-pandemic era: evidence from an O2O-based exhibition of B2B firms. Technol Forecast Soc Change 185:122041","journal-title":"Technol Forecast Soc Change"},{"key":"409_CR63","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.chb.2016.10.028","volume":"67","author":"B Wu","year":"2017","unstructured":"Wu B, Chen X (2017) Continuance intention to use MOOCs: integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Comput Hum Behav 67:221\u2013232","journal-title":"Comput Hum Behav"},{"key":"409_CR64","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.tourman.2017.02.022","volume":"61","author":"A DeFranco","year":"2017","unstructured":"DeFranco A, Morosan C (2017) Coping with the risk of internet connectivity in hotels: perspectives from american consumers traveling internationally. Tour Manag 61:380\u2013393","journal-title":"Tour Manag"},{"key":"409_CR65","doi-asserted-by":"publisher","first-page":"120166","DOI":"10.1016\/j.techfore.2020.120166","volume":"158","author":"V Chang","year":"2020","unstructured":"Chang V, Baudier P, Zhang H, Xu Q, Zhang J, Arami M (2020) How blockchain can impact financial services \u2013 the overview, challenges and recommendations from expert interviewees. Technol Forecast Soc Change 158:120166","journal-title":"Technol Forecast Soc Change"},{"issue":"1","key":"409_CR66","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/jcom.12276","volume":"67","author":"L Baruh","year":"2017","unstructured":"Baruh L, Secinti E, Cemalcilar Z (2017) Online privacy concerns and privacy management: a meta-analytical review. J Commun 67(1):26\u201353","journal-title":"J Commun"},{"issue":"4","key":"409_CR67","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1080\/02650487.2016.1239878","volume":"36","author":"C-D Ham","year":"2017","unstructured":"Ham C-D (2017) Exploring how consumers cope with online behavioral advertising. Iint J Advert 36(4):632\u2013658","journal-title":"Iint J Advert"},{"key":"409_CR68","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.chb.2016.03.076","volume":"62","author":"C-D Ham","year":"2016","unstructured":"Ham C-D, Nelson MR (2016) The role of persuasion knowledge, assessment of benefit and harm, and third-person perception in coping with online behavioral advertising. Comput Hum Behav 62:689\u2013702","journal-title":"Comput Hum Behav"},{"issue":"1","key":"409_CR69","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1108\/EJM-06-2019-0515","volume":"55","author":"R Bandara","year":"2021","unstructured":"Bandara R, Fernando M, Akter S (2021) Managing consumer privacy concerns and defensive behaviours in the digital marketplace. Eur J Mark 55(1):219\u2013246","journal-title":"Eur J Mark"},{"issue":"3","key":"409_CR70","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1111\/joca.12218","volume":"53","author":"VM Wottrich","year":"2019","unstructured":"Wottrich VM, van Reijmersdal EA, Smit EG (2019) App users unwittingly in the spotlight: a model of privacy protection in mobile apps. J Consum Aff 53(3):1056\u20131083","journal-title":"J Consum Aff"},{"issue":"3","key":"409_CR71","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/j.1745-6606.2009.01148.x","volume":"43","author":"GR Milne","year":"2009","unstructured":"Milne GR, Labrecque LI, Cromer C (2009) Toward an understanding of the online consumer\u2019s risky behavior and protection practices. J Consum Aff 43(3):449\u2013473","journal-title":"J Consum Aff"},{"issue":"2","key":"409_CR72","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1207\/s15326985ep2802_3","volume":"28","author":"A Bandura","year":"1993","unstructured":"Bandura A (1993) Perceived self-efficacy in cognitive development and functioning. Educ Psychol 28(2):117\u2013148","journal-title":"Educ Psychol"},{"issue":"5","key":"409_CR73","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/986213.986216","volume":"47","author":"D Zhang","year":"2004","unstructured":"Zhang D, Zhao JL, Zhou L, Nunamaker JF Jr (2004) Can e-learning replace classroom learning? Commun ACM 47(5):75\u201379","journal-title":"Commun ACM"},{"issue":"2","key":"409_CR74","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.compedu.2008.10.002","volume":"52","author":"TJ McGill","year":"2009","unstructured":"McGill TJ, Klobas JE (2009) A task\u2013technology fit view of learning management system impact. Comput Educ 52(2):496\u2013508","journal-title":"Comput Educ"},{"issue":"5","key":"409_CR75","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.intcom.2010.05.001","volume":"22","author":"D-H Shin","year":"2010","unstructured":"Shin D-H (2010) The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact Comput 22(5):428\u2013438","journal-title":"Interact Comput"},{"issue":"1","key":"409_CR76","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1111\/j.1083-6101.2007.00397.x","volume":"13","author":"K-H Kim","year":"2007","unstructured":"Kim K-H, Yun H (2007) Cying for me, cying for us: relational dialectics in a korean social network site. J Comput-Mediat Comm 13(1):298\u2013318","journal-title":"J Comput-Mediat Comm"},{"issue":"2","key":"409_CR77","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10660-015-9205-4","volume":"17","author":"J Mou","year":"2017","unstructured":"Mou J, Shin D-H, Cohen JF (2017) Trust and risk in consumer acceptance of e-services. Electron Commer Res 17(2):255\u2013288","journal-title":"Electron Commer Res"},{"key":"409_CR78","doi-asserted-by":"crossref","unstructured":"Roh T, Yang YS, Xiao S, Park BI (2022) What makes consumers trust and adopt fintech? An empirical investigation in China. Electron Commer Res forthcoming","DOI":"10.1007\/s10660-021-09527-3"},{"issue":"1","key":"409_CR79","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1080\/0144929X.2012.692167","volume":"32","author":"D-H Shin","year":"2013","unstructured":"Shin D-H (2013) User experience in social commerce: in friends we trust. Behav Inf Technol 32(1):52\u201367","journal-title":"Behav Inf Technol"},{"key":"409_CR80","doi-asserted-by":"publisher","first-page":"101483","DOI":"10.1016\/j.tele.2020.101483","volume":"56","author":"Y Kim","year":"2021","unstructured":"Kim Y, Wang Q, Roh T (2021) Do information and service quality affect perceived privacy protection, satisfaction, and loyalty? Evidence from a chinese O2O-based mobile shopping application. Telemat Inf 56:101483","journal-title":"Telemat Inf"},{"issue":"12","key":"409_CR81","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1108\/01443571011094253","volume":"30","author":"A Awaysheh","year":"2010","unstructured":"Awaysheh A, Klassen RD (2010) The impact of supply chain structure on the use of supplier socially responsible practices. Int J Oper Prod Manag 30(12):1246\u20131268","journal-title":"Int J Oper Prod Manag"},{"key":"409_CR82","first-page":"80","volume":"39","author":"N Kshetri","year":"2018","unstructured":"Kshetri N (2018) 1 Blockchain\u2019s roles in meeting key supply chain management objectives. Int J Inf Manag 39:80\u201389","journal-title":"Int J Inf Manag"},{"key":"409_CR83","unstructured":"Forbes This emerging tech company has put Asia\u2019s tuna on the blockchain. Available online: https:\/\/www.forbes.com\/sites\/keshiahannam\/2016\/09\/30\/this-emerging-tech-company-has-put-asias-tuna-on-the-blockchain\/?sh=3b3ac7192649"},{"issue":"3","key":"409_CR84","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013340","journal-title":"MIS Q"},{"issue":"37","key":"409_CR85","doi-asserted-by":"publisher","first-page":"4263","DOI":"10.1080\/00036846.2021.1898535","volume":"53","author":"N Liu","year":"2021","unstructured":"Liu N, Ye Z (2021) Empirical research on the blockchain adoption \u2013 based on TAM. Appl Econ 53(37):4263\u20134275","journal-title":"Appl Econ"},{"issue":"7","key":"409_CR86","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1080\/00207543.2018.1518610","volume":"57","author":"S Kamble","year":"2019","unstructured":"Kamble S, Gunasekaran A, Arha H (2019) Understanding the blockchain technology adoption in supply chains-indian context. Int J Product Res 57(7):2009\u20132033","journal-title":"Int J Product Res"},{"issue":"3","key":"409_CR87","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1177\/002224377701400320","volume":"14","author":"JS Armstrong","year":"1977","unstructured":"Armstrong JS, Overton TS (1977) Estimating nonresponse bias in mail surveys. J Mark Res 14(3):396\u2013402","journal-title":"J Mark Res"},{"issue":"4","key":"409_CR88","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1037\/a0021504","volume":"96","author":"RE Johnson","year":"2011","unstructured":"Johnson RE, Rosen CC, Djurdjevic E (2011) Assessing the impact of common method variance on higher order multidimensional constructs. J Appl Soc Psychol 96(4):744\u2013761","journal-title":"J Appl Soc Psychol"},{"issue":"5","key":"409_CR89","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff PM, MacKenzie SB, Lee J-Y, Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Soc Psychol 88(5):879\u2013903","journal-title":"J Appl Soc Psychol"},{"key":"409_CR90","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.chb.2015.08.039","volume":"54","author":"RF Malaquias","year":"2016","unstructured":"Malaquias RF, Hwang Y (2016) An empirical study on trust in mobile banking: a developing country perspective. Comput Hum Behav 54:453\u2013461","journal-title":"Comput Hum Behav"},{"issue":"9","key":"409_CR91","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.technovation.2008.03.006","volume":"28","author":"HH Chang","year":"2008","unstructured":"Chang HH (2008) Intelligent agent\u2019s technology characteristics applied to online auctions\u2019 task: a combined model of TTF and TAM. Technovation 28(9):564\u2013577","journal-title":"Technovation"},{"issue":"2","key":"409_CR92","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1509\/jmkg.69.2.61.60759","volume":"69","author":"ML Meuter","year":"2005","unstructured":"Meuter ML, Bitner MJ, Ostrom AL, Brown SW (2005) Choosing among alternative service delivery modes: an investigation of customer trial of self-service technologies. J Mark 69(2):61\u201383","journal-title":"J Mark"},{"issue":"3","key":"409_CR93","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1108\/IJLM-01-2017-0018","volume":"29","author":"TR Morgan","year":"2018","unstructured":"Morgan TR, Richey RG Jr, Ellinger AE (2018) Supplier transparency: scale development and validation. Int J Logist Manag 29(3):959\u2013984","journal-title":"Int J Logist Manag"},{"issue":"3","key":"409_CR94","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/asi.23699","volume":"68","author":"LM Maruping","year":"2017","unstructured":"Maruping LM, Bala H, Venkatesh V, Brown SA (2017) Going beyond intention: integrating behavioral expectation into the unified theory of acceptance and use of technology. J Assoc Inf Sci Technol 68(3):623\u2013637","journal-title":"J Assoc Inf Sci Technol"},{"issue":"6","key":"409_CR95","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.emj.2016.08.001","volume":"34","author":"NF Richter","year":"2016","unstructured":"Richter NF, Cepeda-Carrion G, Rold\u00e1n Salgueiro JL, Ringle CM (2016) European management research using partial least squares structural equation modeling (PLS-SEM). Eur Manag J 34(6):589\u2013597","journal-title":"Eur Manag J"},{"issue":"6","key":"409_CR96","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1057\/palgrave.jibs.8400164","volume":"36","author":"S Venaik","year":"2005","unstructured":"Venaik S, Midgley DF, Devinney TM (2005) Dual paths to performance: the impact of global pressures on MNC subsidiary conduct and performance. J Int Bus Stud 36(6):655\u2013675","journal-title":"J Int Bus Stud"},{"issue":"1","key":"409_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/smj.642","volume":"29","author":"C Zott","year":"2008","unstructured":"Zott C, Amit R (2008) The fit between product market strategy and business model: implications for firm performance. Strateg Manag J 29(1):1\u201326","journal-title":"Strateg Manag J"},{"issue":"1","key":"409_CR98","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39\u201350","journal-title":"J Mark Res"},{"issue":"2","key":"409_CR99","first-page":"295","volume":"295","author":"WW Chin","year":"1998","unstructured":"Chin WW (1998) The partial least squares approach to structural equation modeling. Mod Methods Bus Res 295(2):295\u2013336","journal-title":"Mod Methods Bus Res"},{"issue":"2","key":"409_CR100","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7","volume":"20","author":"J Hulland","year":"1999","unstructured":"Hulland J (1999) Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strateg Manag J 20(2):195\u2013204","journal-title":"Strateg Manag J"},{"issue":"1","key":"409_CR101","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler J, Ringle CM, Sarstedt M (2015) A new criterion for assessing discriminant validity in variance-based structural equation modeling. J Acad Mark Sci 43(1):115\u2013135","journal-title":"J Acad Mark Sci"},{"key":"409_CR102","volume-title":"Principles and practice of structural equation modeling","author":"RB Kline","year":"2011","unstructured":"Kline RB (2011) Principles and practice of structural equation modeling. Guilford Press, New York"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-023-00409-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10799-023-00409-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-023-00409-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:11:46Z","timestamp":1747905106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10799-023-00409-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":102,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["409"],"URL":"https:\/\/doi.org\/10.1007\/s10799-023-00409-8","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"17 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}