{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:27:33Z","timestamp":1704846453129},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"26-27","license":[{"start":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:00:00Z","timestamp":1584057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:00:00Z","timestamp":1584057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11042-020-08819-4","type":"journal-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T06:35:01Z","timestamp":1584081301000},"page":"34571-34589","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Motivation research on the participation of multimedia Web page users in \u201cshare\u201d behavior: a case study of Alipay"],"prefix":"10.1007","volume":"80","author":[{"given":"Hong","family":"Jin","sequence":"first","affiliation":[]},{"given":"Yunting","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Xinping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Joung-Hae","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Eun-Mi","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"issue":"6","key":"8819_CR1","doi-asserted-by":"publisher","first-page":"2243","DOI":"10.1016\/j.chb.2011.07.003","volume":"27","author":"K Baek","year":"2011","unstructured":"Baek K, Holton A, Harp D et al (2011) The links that bind: uncovering novel motivations for linking on Facebook.[J]. Comput Hum Behav 27(6):2243\u20132248","journal-title":"Comput Hum Behav"},{"key":"8819_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.chb.2015.01.055","volume":"48","author":"E Basak","year":"2015","unstructured":"Basak E, Calisir F (2015) An empirical study on factors affecting continuance intention of using Facebook [J]. Comput Hum Behav 48:181\u2013198","journal-title":"Comput Hum Behav"},{"issue":"3","key":"8819_CR3","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1093\/jcr\/ucx055","volume":"44","author":"Z Chen","year":"2017","unstructured":"Chen Z, Consumer JO (2017) Social acceptance and word of mouth: how the motive to belong leads to divergent WOM with strangers and friends [J]. J Consum Res 44(3):613\u2013632","journal-title":"J Consum Res"},{"issue":"11","key":"8819_CR4","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1089\/cyber.2011.0608","volume":"16","author":"HT Chen","year":"2013","unstructured":"Chen HT, Kim Y (2013) Problematic use of social network sites: the interactive relationship between gratifications sought and privacy concerns [J]. Cyberpsychol Behav Soc Netw 16(11):806\u2013812","journal-title":"Cyberpsychol Behav Soc Netw"},{"key":"8819_CR5","doi-asserted-by":"publisher","unstructured":"Deci EL (1975) Intrinsic motivation [M]. Plenum Press. https:\/\/doi.org\/10.1007\/978-1-4613-4446-9","DOI":"10.1007\/978-1-4613-4446-9"},{"issue":"3","key":"8819_CR6","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ijresmar.2003.12.004","volume":"21","author":"UM Dholakia","year":"2004","unstructured":"Dholakia UM, Bagozzi RP, Pearo LK (2004) A social influence model of consumer participation in network- and small-group-based virtual communities [J]. Int J Res Mark 21(3):241\u2013263","journal-title":"Int J Res Mark"},{"key":"8819_CR7","volume-title":"The basis of embedded real-time multitasking software development [M]","author":"C Feng","year":"2004","unstructured":"Feng C (2004) The basis of embedded real-time multitasking software development [M]. Tsinghua University Press, Beijing"},{"issue":"1","key":"8819_CR8","first-page":"3","volume":"4","author":"M Foster","year":"2010","unstructured":"Foster M, Francescucci A, West BC (2010) Why users participate in online social networks [J]. Int J Bus Manag 4(1):3\u201319","journal-title":"Int J Bus Manag"},{"key":"8819_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.chb.2016.11.033","volume":"68","author":"C Hallam","year":"2017","unstructured":"Hallam C, Zanella G. Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards [J]. Comput Hum Behav,2017,68:217\u2013227.","journal-title":"Comput Hum Behav"},{"issue":"7","key":"8819_CR10","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1016\/j.tele.2017.05.012","volume":"34","author":"T Jin-Hsin","year":"2017","unstructured":"Jin-Hsin T, Yi-Jen L (2017) Websites, data types and information privacy concerns: A contingency model [J]. Telematics Inform 34(7):1274\u20131128","journal-title":"Telematics Inform"},{"key":"8819_CR11","first-page":"212","volume-title":"Foundations of behavioral research [M]","author":"F Kerlinger","year":"1984","unstructured":"Kerlinger F (1984) Foundations of behavioral research [M]. Holt, Rinehart and Mnston, New York, pp 212\u2013220"},{"issue":"2","key":"8819_CR12","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim DJ, Ferrin DL, Rao HR (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents [J]. Decis Support Syst 44(2):544\u2013564","journal-title":"Decis Support Syst"},{"issue":"23","key":"8819_CR13","doi-asserted-by":"publisher","first-page":"24955","DOI":"10.1007\/s11042-017-5212-x","volume":"76","author":"L Li","year":"2017","unstructured":"Li L, Huang Z, Zha ZJ et al (2017) Guest editorial: knowledge-based multimedia computing [J]. Multimed Tools Appl 76(23):24955\u201324959","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"8819_CR14","first-page":"8183","volume":"29","author":"Z Liang","year":"2009","unstructured":"Liang Z, Wei Z (2009) Interface design and research based on android technology [J]. Computer Knowledge and Technology 29(5):8183\u20138185","journal-title":"Computer Knowledge and Technology"},{"issue":"4","key":"8819_CR15","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra NK, Agarwal KJ (2004) Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model [J]. Inf Syst Res 15(4):336\u2013355","journal-title":"Inf Syst Res"},{"key":"8819_CR16","doi-asserted-by":"crossref","unstructured":"Moon Y, Lim M (2019) Simulation analysis of prefetching image content for social networking service framework [J]. Multimed Tools Appl 78:28435\u201328452","DOI":"10.1007\/s11042-017-5492-1"},{"issue":"4","key":"8819_CR17","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1111\/j.1540-5885.2009.00667.x","volume":"26","author":"S Nambisan","year":"2009","unstructured":"Nambisan S, Baron RA (2009) Virtual customer environments: Testing a model of voluntary participation in value co-creation activities [J]. J Prod Innov Manag 26(4):388\u2013406","journal-title":"J Prod Innov Manag"},{"issue":"14","key":"8819_CR18","doi-asserted-by":"publisher","first-page":"4141","DOI":"10.1007\/s00500-016-2061-x","volume":"21","author":"B Nogueira","year":"2017","unstructured":"Nogueira B, Maciel P, Tavares E et al (2017) Multi-objective optimization of multimedia embedded systems using genetic algorithms and stochastic simulation [J]. Soft Comput 21(14):4141\u20134158","journal-title":"Soft Comput"},{"issue":"1","key":"8819_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behaviors [J]. J Consum Aff 41(1):100\u2013126","journal-title":"J Consum Aff"},{"issue":"4","key":"8819_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/dir.1019","volume":"15","author":"JE Phelpd","year":"2001","unstructured":"Phelpd JE, Souza GD, Nowak GJ (2001) Antecedents and consequences of consumer privacy concerns:an empirical investigation [J]. J Interact Mark 15(4):2\u201317","journal-title":"J Interact Mark"},{"issue":"4","key":"8819_CR21","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/s11031-006-9051-8","volume":"30","author":"RM Ryan","year":"2006","unstructured":"Ryan RM, Rigby CS, Przybylski A (2006) The motivational pull of video games: a self-determination theory approach [J]. Motiv Emot 30(4):344\u2013360","journal-title":"Motiv Emot"},{"key":"8819_CR22","doi-asserted-by":"crossref","unstructured":"Kwon SJ, Park E, Kim KJ (2014) What drives successful social networking services? A comparative analysis of user acceptance of Facebook and Twitter [J]. Soc Sci J 51(4):534\u2013544","DOI":"10.1016\/j.soscij.2014.04.005"},{"issue":"1","key":"8819_CR23","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1509\/jmkg.69.1.32.55512","volume":"69","author":"I Simonson","year":"2005","unstructured":"Simonson I (2005) Determinants of Customers\u2019Responses to customized offers:conceptual framework and research propositions [J]. J Mark 69(1):32\u201345","journal-title":"J Mark"},{"issue":"5","key":"8819_CR24","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1080\/08911762.2010.521115","volume":"23","author":"YJ Sung","year":"2010","unstructured":"Sung YJ, Kim YJ, Kwon OY, Moon JH (2010) An explorative study of Korean individual participation in virtual brand communities in social network sites [J]. J Glob Mark 23(5):430\u2013445","journal-title":"J Glob Mark"},{"issue":"10","key":"8819_CR25","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.ijhcs.2010.06.002","volume":"68","author":"A Vasalou","year":"2010","unstructured":"Vasalou A, Joinson AN, Courvoisier D (2010) Cultural differences, experience with social networks and the nature of\u2018true Commitment\u2019in Facebook [J]. Int J Hum Comput Stud 68(10):719\u2013728","journal-title":"Int J Hum Comput Stud"},{"issue":"1","key":"8819_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/25148667","volume":"29","author":"MM Wasko","year":"2005","unstructured":"Wasko MM, Faraj S (2005) Why should I share? Examining social capital and knowledge contribution in electronic networks of practice [J]. MIS Q 29(1):35\u201357","journal-title":"MIS Q"},{"issue":"24","key":"8819_CR27","first-page":"73","volume":"34","author":"Y Xiaojing","year":"2011","unstructured":"Xiaojing Y, Junwei H (2011) Multimedia player solution based on android system [J]. Mod Electron Technol 34(24):73\u201376","journal-title":"Mod Electron Technol"},{"key":"8819_CR28","first-page":"136","volume":"8","author":"D Xinmin","year":"2016","unstructured":"Xinmin D (2016) Research and application of multimedia framework based on android embedded platform [J]. Digital Technology & Applications 8:136\u2013137","journal-title":"Digital Technology & Applications"},{"key":"8819_CR29","unstructured":"Li YS, Li Jun (2015) Development on multimedia application based on android [J]. Modern Electronics Technique 38(2):32\u201338"},{"key":"8819_CR30","unstructured":"Yuan Y, Huang W, Wang X et al (2019) Automated accurate registration method between UAV image and Google satellite map [J]. Multimed Tools Appl 11:1\u201319"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08819-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08819-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08819-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T18:07:37Z","timestamp":1636740457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08819-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,13]]},"references-count":30,"journal-issue":{"issue":"26-27","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["8819"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08819-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,13]]},"assertion":[{"value":"30 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}