{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:59:14Z","timestamp":1770141554905,"version":"3.49.0"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10796-021-10224-7","type":"journal-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T10:02:57Z","timestamp":1637575377000},"page":"1989-2006","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2299-3854","authenticated-orcid":false,"given":"Kane J.","family":"Smith","sequence":"first","affiliation":[]},{"given":"Gurpreet","family":"Dhillon","sequence":"additional","affiliation":[]},{"given":"Brigid A.","family":"Otoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"issue":"4","key":"10224_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1037\/0003-066X.46.4.333","volume":"46","author":"MS Ainsworth","year":"1991","unstructured":"Ainsworth, M. S., & Bowlby, J. (1991). An ethological approach to personality development. American Psychologist, 46(4), 333.","journal-title":"American Psychologist"},{"key":"10224_CR2","doi-asserted-by":"crossref","unstructured":"Akkermans, H., & van Helden, K. (2002). Vicious and virtuous cycles in ERP implementation: a case study of interrelations between critical success factors. European Journal of Information Systems 11(1), 35\u201346.","DOI":"10.1057\/palgrave.ejis.3000418"},{"key":"10224_CR3","doi-asserted-by":"crossref","unstructured":"Andone, I., B\u0142aszkiewicz, K., Eibes, M., Trendafilov, B., Montag, C., & Markowetz, A. (2016). Menthal: A framework for Mobile data collection and analysis. In proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing: Adjunct, 624-629.","DOI":"10.1145\/2968219.2971591"},{"key":"10224_CR4","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.addbeh.2016.03.006","volume":"64","author":"CS Andreassen","year":"2017","unstructured":"Andreassen, C. S., Pallesen, S., & Griffiths, M. D. (2017). The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey. Addictive Behaviors, 64, 287\u2013293.","journal-title":"Addictive Behaviors"},{"issue":"4","key":"10224_CR5","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1111\/j.1541-0072.2011.00428.x","volume":"39","author":"MR Auer","year":"2011","unstructured":"Auer, M. R. (2011). The policy sciences of social media. Policy Studies Journal, 39(4), 709\u2013736.","journal-title":"Policy Studies Journal"},{"key":"10224_CR6","doi-asserted-by":"crossref","unstructured":"B\u00e1nyai, F., Zsila, \u00c1., Kir\u00e1ly, O., Maraz, A., Elekes, Z., Griffiths, M. D., ... & Demetrovics, Z. (2017). Problematic social media use: Results from a large-scale nationally representative adolescent sample. PLoS One, 12(1), e0169839.","DOI":"10.1371\/journal.pone.0169839"},{"issue":"4","key":"10224_CR7","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1177\/0743915619859852","volume":"38","author":"P Berthon","year":"2019","unstructured":"Berthon, P., Pitt, L., & Campbell, C. (2019). Addictive devices: A public policy analysis of sources and solutions to digital addiction. Journal of Public Policy & Marketing, 38(4), 451\u2013468.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"3","key":"10224_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1108\/09564231311326987","volume":"24","author":"RN Bolton","year":"2013","unstructured":"Bolton, R. N., Parasuraman, A., Hoefnagels, A., Migchels, N., Kabadayi, S., Gruber, T., & Solnet, D. (2013). Understanding generation Y and their use of social media: A review and research agenda. Journal of Service Management, 24(3), 245\u2013267.","journal-title":"Journal of Service Management"},{"issue":"1","key":"10224_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1177\/1329878X16665494","volume":"161","author":"D Bossio","year":"2016","unstructured":"Bossio, D., & Bebawi, S. (2016). Mapping the emergence of social Media in Everyday Journalistic Practices. Media International Australia, 161(1), 147\u2013158.","journal-title":"Media International Australia"},{"key":"10224_CR10","volume-title":"Attachment and loss, volume I: Attachment second edition","author":"J Bowlby","year":"1982","unstructured":"Bowlby, J. (1982). Attachment and loss, volume I: Attachment second edition. Basic Books."},{"issue":"1","key":"10224_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210\u2013230.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1","key":"10224_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00048623.2013.773858","volume":"44","author":"L Cadell","year":"2013","unstructured":"Cadell, L. (2013). Socially practical or practically unsociable? A study into social media policy experiences in Queensland cultural heritage institutions. Australian Academic & Research Libraries, 44(1), 3\u201313.","journal-title":"Australian Academic & Research Libraries"},{"key":"10224_CR13","unstructured":"Cave, D. (2019, March 31). Countries want to ban 'Weaponized' social media. What would that look like? Retrieved from https:\/\/www.nytimes.com\/2019\/03\/31\/world\/australia\/countries-controlling-social-media.html"},{"key":"10224_CR14","unstructured":"Centre for Addiction and Mental Health. (2015) Population studies eBulletins. http:\/\/www.camh.ca\/en\/research\/news_and_publications\/Pages\/research_p."},{"key":"10224_CR15","unstructured":"Cho, Y. B. (2014). U.S. patent application no. 14\/160,787."},{"key":"10224_CR16","doi-asserted-by":"publisher","first-page":"106160","DOI":"10.1016\/j.chb.2019.106160","volume":"104","author":"SM Coyne","year":"2020","unstructured":"Coyne, S. M., Rogers, A. A., Zurcher, J. D., Stockdale, L., & Booth, M. (2020). Does time spent using social media impact mental health?: An eight year longitudinal study. Computers in Human Behavior, 104, 106160.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10224_CR17","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10551-017-3697-x","volume":"157","author":"G Dhillon","year":"2019","unstructured":"Dhillon, G., & Smith, K. J. (2019). Defining objectives for preventing cyberstalking. Journal of Business Ethics, 157(1), 137\u2013158.","journal-title":"Journal of Business Ethics"},{"issue":"3","key":"10224_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","volume":"16","author":"G Dhillon","year":"2006","unstructured":"Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal, 16(3), 293\u2013314.","journal-title":"Information Systems Journal"},{"issue":"1","key":"10224_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1207\/s15327736me1701_2","volume":"17","author":"J Dimmick","year":"2004","unstructured":"Dimmick, J., Chen, Y., & Li, Z. (2004). Competition between the internet and traditional news media: The gratification-opportunities niche dimension. The Journal of Media Economics, 17(1), 19\u201333.","journal-title":"The Journal of Media Economics"},{"issue":"1","key":"10224_CR20","first-page":"61","volume":"61","author":"K Donovan","year":"2012","unstructured":"Donovan, K. (2012). Mobile money for financial inclusion. Information and Communications for Development, 61(1), 61\u201373.","journal-title":"Information and Communications for Development"},{"issue":"2","key":"10224_CR21","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.chb.2011.10.015","volume":"28","author":"M Drouin","year":"2012","unstructured":"Drouin, M., & Landgraff, C. (2012). Texting, sexting, and attachment in college students\u2019 romantic relationships. Computers in Human Behavior, 28(2), 444\u2013449.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10224_CR22","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"NB Ellison","year":"2007","unstructured":"Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook \u201cfriends:\u201d social capital and college students\u2019 use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143\u20131168.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10224_CR23","doi-asserted-by":"crossref","unstructured":"Flores, P. J. (2001). Addiction as an attachment disorder: Implications for group therapy. International journal of group psychotherapy, 51(1: Special issue), 63-81.","DOI":"10.1521\/ijgp.51.1.63.49730"},{"key":"10224_CR24","unstructured":"Frier, S. (2016, February 29). Snapchat's Spiegel to investors: We have 8 billion video views a day. Retrieved from http:\/\/www.bloomberg.com\/news\/articles\/2016-02-9\/snapchat-s-spiegel-to-investors-we-have-8-billion-video-views-a-day."},{"issue":"1","key":"10224_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/09523980802588626","volume":"46","author":"CN Gunawardena","year":"2009","unstructured":"Gunawardena, C. N., Hermans, M. B., Sanchez, D., Richmond, C., Bohley, M., & Tuttle, R. (2009). A theoretical framework for building online communities of practice with social networking tools. Educational Media International, 46(1), 3\u201316.","journal-title":"Educational Media International"},{"key":"10224_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.paid.2014.12.016","volume":"77","author":"J Hart","year":"2015","unstructured":"Hart, J., Nailling, E., Bizer, G. Y., & Collins, C. K. (2015). Attachment theory as a framework for explaining engagement with Facebook. Personality and Individual Differences, 77, 33\u201340.","journal-title":"Personality and Individual Differences"},{"issue":"1","key":"10224_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/s15327965pli0501_1","volume":"5","author":"C Hazan","year":"1994","unstructured":"Hazan, C., & Shaver, P. R. (1994). Attachment as an organizational framework for research on close relationships. Psychological Inquiry, 5(1), 1\u201322.","journal-title":"Psychological Inquiry"},{"key":"10224_CR28","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.learninstruc.2016.01.007","volume":"42","author":"RB Hollis","year":"2016","unstructured":"Hollis, R. B., & Was, C. A. (2016). Mind wandering, control failures, and social media distractions in online learning. Learning and Instruction, 42, 104\u2013112.","journal-title":"Learning and Instruction"},{"key":"10224_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1046\/j.1365-2575.1997.00005.x","volume":"7","author":"MG Hunter","year":"1997","unstructured":"Hunter, M. G. (1997). The use of RepGrids to gather data about information systems analysts. Information Systems Journal, 7, 67\u201381.","journal-title":"Information Systems Journal"},{"issue":"4","key":"10224_CR30","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1177\/1745691612447308","volume":"7","author":"MH Immordino-Yang","year":"2012","unstructured":"Immordino-Yang, M. H., Christodoulou, J. A., & Singh, V. (2012). Rest is not idleness: Implications of the brain\u2019s default mode for human development and education. Perspectives on Psychological Science, 7(4), 352\u2013364.","journal-title":"Perspectives on Psychological Science"},{"issue":"2","key":"10224_CR31","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1287\/isre.1040.0023","volume":"15","author":"Q Jones","year":"2004","unstructured":"Jones, Q., Ravid, G., & Rafaeli, S. (2004). Information overload and the message dynamics of online interaction spaces: A theoretical model and empirical exploration. Information Systems Research, 15(2), 194\u2013210.","journal-title":"Information Systems Research"},{"key":"10224_CR32","doi-asserted-by":"crossref","unstructured":"Kahan, D. M. (2000). Gentle nudges vs. hard shoves: Solving the sticky norms problem. The University of Chicago law Review, 607-645.","DOI":"10.2307\/1600336"},{"key":"10224_CR33","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.ijhm.2013.08.015","volume":"36","author":"J Kang","year":"2014","unstructured":"Kang, J., Tang, L., & Fiore, A. M. (2014). Enhancing consumer\u2013brand relationships on restaurant Facebook fan pages: Maximizing consumer benefits and increasing active participation. International Journal of Hospitality Management, 36, 145\u2013155.","journal-title":"International Journal of Hospitality Management"},{"key":"10224_CR34","doi-asserted-by":"crossref","unstructured":"Kang, R., Dabbish, L., & Sutton, K. (2016, February). Strangers on your phone: Why people use anonymous communication applications. In proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, 359-370.","DOI":"10.1145\/2818048.2820081"},{"issue":"7","key":"10224_CR35","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1177\/1461444814544001","volume":"16","author":"A Kaun","year":"2014","unstructured":"Kaun, A., & Stiernstedt, F. (2014). Facebook time: Technological and institutional affordances for media memories. New Media and Society, 16(7), 1154\u20131168.","journal-title":"New Media and Society"},{"key":"10224_CR36","volume-title":"Value-focused thinking","author":"RL Keeney","year":"1992","unstructured":"Keeney, R. L. (1992). Value-focused thinking. Harvard University Press."},{"key":"10224_CR37","first-page":"33","volume":"35","author":"RL Keeney","year":"1994","unstructured":"Keeney, R. L. (1994a). Creativity in decision making with value-focused thinking. Sloan Management Review, 35, 33\u201341.","journal-title":"Sloan Management Review"},{"issue":"5","key":"10224_CR38","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1287\/opre.42.5.793","volume":"42","author":"RL Keeney","year":"1994","unstructured":"Keeney, R. L. (1994b). Using values in operations research. Operations Research, 42(5), 793\u2013813.","journal-title":"Operations Research"},{"issue":"3","key":"10224_CR39","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/0377-2217(96)00004-5","volume":"92","author":"RL Keeney","year":"1996","unstructured":"Keeney, R. L. (1996). Value-focused thinking: Identifying decision opportunities and creating alternatives. European Journal of Operational Research, 92(3), 537\u2013549.","journal-title":"European Journal of Operational Research"},{"key":"10224_CR40","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1287\/mnsc.45.4.533","volume":"45","author":"RL Keeney","year":"1999","unstructured":"Keeney, R. L. (1999). The value of internet commerce to the customer. Management Science, 45, 533\u2013542.","journal-title":"Management Science"},{"key":"10224_CR41","doi-asserted-by":"crossref","unstructured":"Keeney, R. L., Von Winterfeldt, D., & Eppel, T. (1990). Eliciting public values for complex policy decisions. Management Science, 36(9), 1011\u20131030.","DOI":"10.1287\/mnsc.36.9.1011"},{"issue":"6","key":"10224_CR42","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.chb.2010.03.024","volume":"26","author":"PA Kirschner","year":"2010","unstructured":"Kirschner, P. A., & Karpinski, A. C. (2010). Facebook and academic performance. Computers in Human Behavior, 26(6), 1237\u20131245.","journal-title":"Computers in Human Behavior"},{"key":"10224_CR43","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/249410","volume":"23","author":"HK Klein","year":"1999","unstructured":"Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23, 67\u201394.","journal-title":"MIS Quarterly"},{"key":"10224_CR44","doi-asserted-by":"crossref","unstructured":"Ko, D. G., Kirsch, L. J., & King, W. R. (2005). Antecedents of knowledge transfer from consultants to clients in enterprise system implementations. MIS Quarterly, 59\u201385.","DOI":"10.2307\/25148668"},{"issue":"2","key":"10224_CR45","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1002\/bult.2014.1720400206","volume":"40","author":"C Kotfila","year":"2014","unstructured":"Kotfila, C. (2014). This message will self-destruct: The growing role of obscurity and self-destructing data in digital communication. Bulletin of the Association for Information Science and Technology, 40(2), 12\u201316.","journal-title":"Bulletin of the Association for Information Science and Technology"},{"key":"10224_CR46","doi-asserted-by":"crossref","unstructured":"Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction\u2014a review of the psychological literature. International Journal of Environmental Research and Public Health 8(9), 3528\u20133552.","DOI":"10.3390\/ijerph8093528"},{"issue":"3","key":"10224_CR47","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/S1567-4223(03)00026-7","volume":"2","author":"W Lee","year":"2003","unstructured":"Lee, W., & Benbasat, I. (2003). Designing an electronic commerce interface: Attention and product memory as elicited by web design. Electronic Commerce Research and Applications, 2(3), 240\u2013253.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"4","key":"10224_CR48","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1177\/1094670515584331","volume":"18","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Eisingerich, A. B., Auh, S., Merlo, O., & Chun, H. E. H. (2015). Service firm performance transparency: How, when, and why does it pay off? Journal of Service Research, 18(4), 451\u2013467.","journal-title":"Journal of Service Research"},{"issue":"6","key":"10224_CR49","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1108\/08876041211257882","volume":"26","author":"SJ Long Tolbert","year":"2012","unstructured":"Long Tolbert, S. J., & Gammoh, B. S. (2012). In good and bad times: The interpersonal nature of brand love in service relationships. Journal of Services Marketing, 26(6), 391\u2013402.","journal-title":"Journal of Services Marketing"},{"issue":"12","key":"10224_CR50","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1089\/cyber.2010.0588","volume":"14","author":"A Lyndon","year":"2011","unstructured":"Lyndon, A., Bonds-Raacke, J., & Cratty, A. D. (2011). College students' Facebook stalking of ex-partners. Cyberpsychology, Behavior and Social Networking, 14(12), 711\u2013716.","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"10224_CR51","unstructured":"Mak, T. (2019, August 14). Senator pushes bill to curb 'Exploitative and Addictive' social media practices. Retrieved from https:\/\/www.npr.org\/2019\/08\/14\/750585438\/senator-pushes-bill-to-curb-exploitative-and-addictive-social-media-practices"},{"issue":"1","key":"10224_CR52","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.dss.2012.12.036","volume":"55","author":"J May","year":"2013","unstructured":"May, J., Dhillon, G., & Caldeira, M. (2013). Defining value-based objectives for ERP systems planning. Decision Support Systems, 55(1), 98\u2013109.","journal-title":"Decision Support Systems"},{"key":"10224_CR53","unstructured":"MediaKix (2018). These 8 social media addiction statistics show where we\u2019re spending our time. Retrieved from http:\/\/mediakix.com\/2018\/04\/social-media-addiction-statistics\/#gs.4mi80p"},{"issue":"2","key":"10224_CR54","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1111\/j.1350-4126.2005.00108.x","volume":"12","author":"M Mikulincer","year":"2005","unstructured":"Mikulincer, M., & Shaver, P. R. (2005). Attachment theory and emotions in close relationships: Exploring the attachment-related dynamics of emotional reactions to relational events. Personal Relationships, 12(2), 149\u2013168.","journal-title":"Personal Relationships"},{"issue":"9","key":"10224_CR55","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1089\/cyber.2012.0334","volume":"16","author":"MA Moreno","year":"2013","unstructured":"Moreno, M. A., Goniu, N., Moreno, P. S., & Diekema, D. (2013). Ethics of social media research: Common concerns and practical considerations. Cyberpsychology, Behavior and Social Networking, 16(9), 708\u2013713.","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"issue":"2","key":"10224_CR56","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1017\/S2045796015001067","volume":"25","author":"JA Naslund","year":"2016","unstructured":"Naslund, J. A., Aschbrenner, K. A., Marsch, L. A., & Bartels, S. J. (2016). The future of mental health care: Peer-to-peer support and social media. Epidemiology and Psychiatric Sciences, 25(2), 113\u2013122.","journal-title":"Epidemiology and Psychiatric Sciences"},{"key":"10224_CR57","unstructured":"Nyland R, Marvez R, & Beck J. (2007). MySpace: Social networking or social isolation? In the proceedings of the midwinter conference of the Association for Education in journalism and mass communication; Reno, NV, USA. 23\u201324."},{"issue":"2","key":"10224_CR58","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1080\/09638237.2020.1714007","volume":"29","author":"M O\u2019Reilly","year":"2020","unstructured":"O\u2019Reilly, M. (2020). Social media and adolescent mental health: The good, the bad and the ugly. Journal of Mental Health, 29(2), 200\u2013206.","journal-title":"Journal of Mental Health"},{"key":"10224_CR59","doi-asserted-by":"publisher","DOI":"10.4324\/9780203103258","volume-title":"Orality and literacy","author":"WJ Ong","year":"2013","unstructured":"Ong, W. J. (2013). Orality and literacy. Routledge."},{"key":"10224_CR60","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1145\/196734.196745","volume":"12","author":"WJ Orlikowski","year":"1994","unstructured":"Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems, 12, 174\u2013207.","journal-title":"ACM Transactions on Information Systems"},{"issue":"6","key":"10224_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1509\/jmkg.74.6.1","volume":"74","author":"CW Park","year":"2010","unstructured":"Park, C. W., MacInnis, D. J., Priester, J., Eisingerich, A. B., & Iacobucci, D. (2010). Brand attachment and brand attitude strength: Conceptual and empirical differentiation of two critical brand equity drivers. Journal of Marketing, 74(6), 1\u201317.","journal-title":"Journal of Marketing"},{"issue":"4","key":"10224_CR62","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1108\/10610421111148315","volume":"20","author":"H Patwardhan","year":"2011","unstructured":"Patwardhan, H., & Balasubramanian, S. K. (2011). Brand romance: A complementary approach to explain emotional attachment toward brands. Journal of Product & Brand Management, 20(4), 297\u2013308.","journal-title":"Journal of Product & Brand Management"},{"issue":"4","key":"10224_CR63","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1111\/jcom.12045","volume":"63","author":"KE Pearce","year":"2013","unstructured":"Pearce, K. E., & Rice, R. E. (2013). Digital divides from access to activities: Comparing mobile and personal computer internet users. Journal of Communication, 63(4), 721\u2013744.","journal-title":"Journal of Communication"},{"key":"10224_CR64","doi-asserted-by":"crossref","unstructured":"Pelling, E. L., & White, K. M. (2009). The theory of planned behavior applied to young people's use of social networking websites. CyberPsychology & Behavior,12(6), 755-759.","DOI":"10.1089\/cpb.2009.0109"},{"key":"10224_CR65","unstructured":"Phillips, M., & Spitzberg, B. (2009). MySpace or yours?: Social networking sites surveillance in romantic relationships. In the annual meeting of the Western states communication association, Mesa, ."},{"issue":"3","key":"10224_CR66","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1016\/j.dss.2005.05.030","volume":"43","author":"DJ Power","year":"2007","unstructured":"Power, D. J., & Sharda, R. (2007). Model-driven decision support systems: Concepts and research directions. Decision Support Systems, 43(3), 1044\u20131061.","journal-title":"Decision Support Systems"},{"issue":"4","key":"10224_CR67","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ausmj.2011.07.004","volume":"19","author":"W Read","year":"2011","unstructured":"Read, W., Robertson, N., & McQuilken, L. (2011). A novel romance: The technology acceptance model with emotional attachment. Australasian marketing journal (AMJ), 19(4), 223\u2013229.","journal-title":"Australasian marketing journal (AMJ)"},{"issue":"3","key":"10224_CR68","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0092-6566(77)90037-X","volume":"11","author":"JA Russell","year":"1977","unstructured":"Russell, J. A., & Mehrabian, A. (1977). Evidence for a three-factor theory of emotions. Journal of Research in Personality, 11(3), 273\u2013294.","journal-title":"Journal of Research in Personality"},{"issue":"1","key":"10224_CR69","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1186\/s40537-017-0096-1","volume":"4","author":"MV Sangameswar","year":"2017","unstructured":"Sangameswar, M. V., Rao, M. N., & Satyanarayana, S. (2017). An algorithm for identification of natural disaster affected area. Journal of Big Data, 4(1), 39.","journal-title":"Journal of Big Data"},{"issue":"4","key":"10224_CR70","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1362\/147539212X13546197909985","volume":"11","author":"A Sarkar","year":"2012","unstructured":"Sarkar, A., Ponnam, A., & Murthy, B. K. (2012). Understanding and measuring romantic brand love. Journal of Customer Behaviour, 11(4), 324\u2013347.","journal-title":"Journal of Customer Behaviour"},{"issue":"1","key":"10224_CR71","doi-asserted-by":"publisher","first-page":"187","DOI":"10.2308\/isys-50674","volume":"28","author":"LC Schaupp","year":"2013","unstructured":"Schaupp, L. C., & B\u00e9langer, F. (2013). The value of social media for small businesses. Journal of Information Systems, 28(1), 187\u2013207.","journal-title":"Journal of Information Systems"},{"issue":"2","key":"10224_CR72","first-page":"234","volume":"10","author":"S Schuck","year":"2010","unstructured":"Schuck, S., Aubusson, P., & Kearney, M. (2010). Web 2.0 in the classroom? Dilemmas and opportunities inherent in adolescent web 2.0 engagement. Contemporary Issues in Technology and Teacher Education, 10(2), 234\u2013246.","journal-title":"Contemporary Issues in Technology and Teacher Education"},{"issue":"1","key":"10224_CR73","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1108\/10662240910927795","volume":"19","author":"G Shao","year":"2009","unstructured":"Shao, G. (2009). Understanding the appeal of user-generated media: A uses and gratification perspective. Internet Research, 19(1), 7\u201325.","journal-title":"Internet Research"},{"key":"10224_CR74","unstructured":"Statista. (2017). Number of monthly active twitter users worldwide from 1st quarter 2010 to 2nd quarter 2017 (in millions). Source https:\/\/www.statista.com\/statistics\/282087\/number-of-monthly-active-twitter-users\/"},{"issue":"2","key":"10224_CR75","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1037\/0033-295X.93.2.119","volume":"93","author":"RJ Sternberg","year":"1986","unstructured":"Sternberg, R. J. (1986). A triangular theory of love. Psychological Review, 93(2), 119\u2013135.","journal-title":"Psychological Review"},{"issue":"2","key":"10224_CR76","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3316\/QRJ1102063","volume":"11","author":"H Suri","year":"2011","unstructured":"Suri, H. (2011). Purposeful sampling in qualitative research synthesis. Qualitative Research Journal, 11(2), 63\u201375.","journal-title":"Qualitative Research Journal"},{"issue":"3","key":"10224_CR77","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1111\/deci.12335","volume":"50","author":"R Syed","year":"2019","unstructured":"Syed, R., Dhillon, G., & Merrick, J. (2019). The identity management value model: A design science approach to assess value gaps on social media. Decision Sciences, 50(3), 498\u2013536.","journal-title":"Decision Sciences"},{"issue":"3\u20134","key":"10224_CR78","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1504\/IJMLO.2014.067020","volume":"8","author":"G Thorsteinsson","year":"2014","unstructured":"Thorsteinsson, G., & Page, T. (2014). User attachment to smartphones and design guidelines. International journal of mobile learning and organisation, 8(3\u20134), 201\u2013215.","journal-title":"International journal of mobile learning and organisation"},{"issue":"1","key":"10224_CR79","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1177\/097282010400100104","volume":"1","author":"D Turpin","year":"2004","unstructured":"Turpin, D. (2004). Kimura KK: Can this customer be saved? Asian Journal of Management Cases, 1(1), 25\u201338.","journal-title":"Asian Journal of Management Cases"},{"issue":"1","key":"10224_CR80","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1111\/j.1467-9442.2006.00444.x","volume":"108","author":"JR Tyran","year":"2006","unstructured":"Tyran, J. R., & Feld, L. P. (2006). Achieving compliance when legal sanctions are non-deterrent. Scandinavian Journal of Economics, 108(1), 135\u2013156.","journal-title":"Scandinavian Journal of Economics"},{"key":"10224_CR81","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.intmar.2015.09.001","volume":"32","author":"RA VanMeter","year":"2015","unstructured":"VanMeter, R. A., Grisaffe, D. B., & Chonko, L. B. (2015). Of \u201clikes\u201d and \u201cpins\u201d: The effects of consumers' attachment to social media. Journal of Interactive Marketing, 32, 70\u201388.","journal-title":"Journal of Interactive Marketing"},{"issue":"12","key":"10224_CR82","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1080\/0144929X.2015.1004648","volume":"34","author":"M Waheed","year":"2015","unstructured":"Waheed, M., Kaur, K., Ain, N., & Sanni, S. A. (2015). Emotional attachment and multidimensional self-efficacy: Extension of innovation diffusion theory in the context of eBook reader. Behaviour & Information Technology, 34(12), 1147\u20131159.","journal-title":"Behaviour & Information Technology"},{"key":"10224_CR83","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1057\/ejis.1995.9","volume":"4","author":"G Walsham","year":"1995","unstructured":"Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems, 4, 74\u201381.","journal-title":"European Journal of Information Systems"},{"issue":"5","key":"10224_CR84","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.jretconser.2012.06.003","volume":"19","author":"K Yang","year":"2012","unstructured":"Yang, K. (2012). Consumer technology traits in determining mobile shopping adoption: An application of the extended theory of planned behavior. Journal of Retailing and Consumer Services, 19(5), 484\u2013491.","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"4","key":"10224_CR85","doi-asserted-by":"publisher","first-page":"283","DOI":"10.3727\/109830508788403114","volume":"10","author":"KH Yoo","year":"2008","unstructured":"Yoo, K. H., & Gretzel, U. (2008). What motivates consumers to write online travel reviews? Information Technology and Tourism, 10(4), 283\u2013295.","journal-title":"Information Technology and Tourism"},{"issue":"3","key":"10224_CR86","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1207\/s15327590ijhc1803_3","volume":"18","author":"D Zhang","year":"2005","unstructured":"Zhang, D., & Adipat, B. (2005). Challenges, methodologies, and issues in the usability testing of mobile applications. International Journal of Human-Computer Interaction, 18(3), 293\u2013308.","journal-title":"International Journal of Human-Computer Interaction"},{"key":"10224_CR87","doi-asserted-by":"crossref","unstructured":"Zhao, X., & Lindley, S. E. (2014). Curation through use: Understanding the personal value of social media. In proceedings of the SIGCHI conference on human factors in computing systems.\u00a02431\u20132440.","DOI":"10.1145\/2556288.2557291"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-021-10224-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-021-10224-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-021-10224-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T06:08:21Z","timestamp":1671170901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-021-10224-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":87,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10224"],"URL":"https:\/\/doi.org\/10.1007\/s10796-021-10224-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,22]]},"assertion":[{"value":"9 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}