{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T17:58:52Z","timestamp":1770487132744,"version":"3.49.0"},"reference-count":78,"publisher":"Informa UK Limited","issue":"9","funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["NSC 102-2511-S-275-002-MY2"],"award-info":[{"award-number":["NSC 102-2511-S-275-002-MY2"]}],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1080\/0144929x.2016.1177114","type":"journal-article","created":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T03:56:55Z","timestamp":1462939015000},"page":"693-705","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Understanding undergraduates\u2019 problems from determinants of Facebook continuance intention"],"prefix":"10.1080","volume":"35","author":[{"given":"Kan-Min","family":"Lin","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(86)90045-4"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.127.1.142"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"CIT0010","volume-title":"Social Foundations of Thought and Action","author":"Bandura A.","year":"1986"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.25.5.729"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i8.3086"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0272"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1080\/14703290801950286"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1108\/10662241111176344"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1108\/13612020310464368"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-011-0857-2"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1348\/014466603763276135"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.003"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/10632919709600763"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.023"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1108\/09564239210019450"},{"key":"CIT0028","first-page":"195","volume-title":"E-commerceand M-commerce Technologies","author":"Fang K. T.","year":"2005"},{"key":"CIT0029","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"Fishbein M.","year":"1975"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1037\/h0061470"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"CIT0036","volume-title":"Multivariate Data Analysis","author":"Hair F.","year":"1998","edition":"5"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.11.020"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/10508422.2011.585597"},{"issue":"6","key":"CIT0041","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2006.tb00151.x","volume":"23","author":"Ifinedo P.","year":"2006","journal-title":"The Electronic Journal of Information Systems in Developing Countries"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.03.005"},{"key":"CIT0101","doi-asserted-by":"publisher","DOI":"10.2307\/4132324"},{"key":"CIT0043","first-page":"1","volume":"1","author":"Jones H.","year":"2005","journal-title":"Project MAC: MIT Project on Mathematics and Computing"},{"key":"CIT0044","volume-title":"LISREL 8","author":"J\u00f6reskog K. G.","year":"2001"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1086\/208674"},{"issue":"3","key":"CIT0046","first-page":"424","volume":"75","author":"Katz M. L.","year":"1985","journal-title":"The American Economic Review"},{"key":"CIT0100","doi-asserted-by":"publisher","DOI":"10.1086\/261409"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.2202\/1949-6605.1905"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph8093528"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.003"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2010.09.017"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1027736"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415130103"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1080\/01449291003752948"},{"key":"CIT0057","first-page":"47","volume":"60","author":"Lin K. M.","year":"2014","journal-title":"Advances in Education Research"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.12.009"},{"key":"CIT0059","volume-title":"Reputation Management and Social Media: How People Monitor Their Identity and Search for Others Online","author":"Madden M.","year":"2010"},{"key":"CIT0060","first-page":"207","volume-title":"Impact of E-Commerce on Consumers and Small Firms","author":"Mariani M. G.","year":"2006"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.97.3.562"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2002.16.s-1.33"},{"issue":"4","key":"CIT0063","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.2004.tb00292.x","volume":"9","author":"Metzger M.","year":"2004","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"CIT0065","first-page":"63","volume":"31","author":"O\u2019brien D.","year":"2012","journal-title":"Irish Journal of Management"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.2307\/3150499"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.1.54"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.12.010"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.015"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1177\/014920638601200408"},{"key":"CIT0072","volume-title":"33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking","author":"Powell J.","year":"2009"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1108\/10662240110695070"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.05.001"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.002"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.022"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01513.x"},{"issue":"5","key":"CIT0081","volume":"1","author":"Tan M.","year":"2000","journal-title":"Journal of the AIS"},{"key":"CIT0082","volume-title":"Grown Up Digital: How the Net Generation Is Changing Your World HC","author":"Tapscott D.","year":"2008"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.010"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0277(88)90021-2"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1177\/1745691612442904"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0208"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1108\/07378831311303967"},{"key":"CIT0091","first-page":"28","volume":"28","author":"Zhongzeng B.","year":"2005","journal-title":"Psychological Science (China)"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2016.1177114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T10:22:15Z","timestamp":1567851735000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2016.1177114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,11]]},"references-count":78,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2016,3,16]]},"published-print":{"date-parts":[[2016,9]]}},"alternative-id":["10.1080\/0144929X.2016.1177114"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2016.1177114","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}