{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:20:16Z","timestamp":1770452416750,"version":"3.49.0"},"reference-count":87,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,6,3]]},"DOI":"10.1080\/0144929x.2018.1539518","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T10:16:26Z","timestamp":1540548986000},"page":"549-563","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":46,"title":["How compulsive use of social media affects performance: insights from the UK by purpose of use"],"prefix":"10.1080","volume":"38","author":[{"given":"Vladlena","family":"Benson","sequence":"first","affiliation":[{"name":"School of Computing and Engineering, University of West London, London, UK"}]},{"given":"Chris","family":"Hand","sequence":"additional","affiliation":[{"name":"Department of Strategy, Marketing, &amp; Innovation, Kingston Business School, Kingston upon Thames, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5262-7564","authenticated-orcid":false,"given":"Richard","family":"Hartshorne","sequence":"additional","affiliation":[{"name":"Department of Learning Sciences and Educational Research, University of Central Florida, Orlando, FL, USA"}]}],"member":"301","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"CIT0002","first-page":"24","volume":"9","author":"Anderson Monica","year":"2014","journal-title":"Pew Research Center"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.2307\/23042809"},{"key":"CIT0004"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812445878"},{"key":"CIT0006","volume-title":"Online Connections: Internet Interpersonal Relationships","author":"Barnes Sue B.","year":"2001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.031"},{"key":"CIT0009","volume-title":"Empowered: Unleash Your Employees, Energize Your Customers, Transform Your Business","author":"Bernoff Josh","year":"2010"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1108\/09564231311326987"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/j.1471-1842.2007.00701.x"},{"issue":"38","key":"CIT0012","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/EMR.2010.5559139","volume":"3","author":"Boyd Danah","year":"2010","journal-title":"IEEE Engineering Management Review"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1177\/0093650203257842"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.023"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.07.028"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160105"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/s10648-005-8138-1"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1089\/109493103322725469"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.09.003"},{"key":"CIT0021","first-page":"35","volume":"17","author":"Cyr Dianne","year":"2008","journal-title":"SIGHCI 2008 Proceedings"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2011.05.009"},{"issue":"3","key":"CIT0024","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1089\/cyber.2013.0029","volume":"17","author":"De Cock Rozane","year":"2014","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2011.21"},{"issue":"1","key":"CIT0027","first-page":"5","volume":"15","author":"Ferdig Richard E.","year":"2007","journal-title":"Journal of Technology and Teacher Education"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20079"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2012.01574.x"},{"issue":"5","key":"CIT0032","first-page":"12","volume":"9","author":"Griffiths M. D.","year":"2010","journal-title":"World Online Gambling Law Report"},{"issue":"1","key":"CIT0033","first-page":"59","volume":"22","author":"Griffiths Mark D.","year":"2010","journal-title":"International Journal of Adolescent Medicine and Health"},{"issue":"1","key":"CIT0035","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1108\/EBR-09-2015-0094","volume":"28","author":"Hair Joe F.","year":"2016","journal-title":"European Business Review"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1080\/13691181003639866"},{"key":"CIT0037","first-page":"1066","volume-title":"Society for Information Technology & Teacher Education International Conference","author":"Hartshorne Richard","year":"2016"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1177\/0956797612437426"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.05.004"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0135"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754068"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1108\/13287261211232126"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2011.01.005"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2008.0327"},{"issue":"1","key":"CIT0047","doi-asserted-by":"crossref","first-page":"71","DOI":"10.35151\/kyci.2012.20.1.005","volume":"20","author":"Kim D. I.","year":"2012","journal-title":"The Korean Journal of Youth Counseling"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.024"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1470671"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph8093528"},{"key":"CIT0051","first-page":"59","volume-title":"A Networked Self: Identity, Community, and Culture on Social Network Sites","author":"LaRose Robert","year":"2010"},{"key":"CIT0052","first-page":"3","volume-title":"IADIS International Conference ICT","author":"LaRose Robert","year":"2011"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.002"},{"key":"CIT0054","author":"Lenhart Amanda","year":"2010","journal-title":"Pew Internet & American Life Project"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1080\/01587919.2011.565495"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2002.10673685"},{"key":"CIT0057","volume-title":"Latent Variable Path Modeling with Partial Least Squares","author":"Lohm\u00f6ller Jan-Bernd.","year":"2013"},{"issue":"18","key":"CIT0058","first-page":"B26","volume":"53","author":"Maloney Edward.","year":"2007","journal-title":"Chronicle of Higher Education"},{"key":"CIT0059","first-page":"157","volume-title":"ECIS","author":"M\u00e4ntym\u00e4ki Matti","year":"2010"},{"key":"CIT0060","volume-title":"Proceedings from the 22nd Australiasian Conference on Information Systems ACIS","author":"M\u00e4ntym\u00e4ki Matt","year":"2011"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.047"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1080\/1041794X.2012.686558"},{"key":"CIT0063","first-page":"1","volume":"36","author":"Mazzoni E.","year":"2017","journal-title":"Behaviour & Information Technology"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.95"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2008.0181"},{"issue":"1","key":"CIT0066","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1002\/jcaf.20645","volume":"22","author":"Mooney J. Lowell","year":"2010","journal-title":"Journal of Corporate Accounting & Finance"},{"issue":"2","key":"CIT0067","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1159\/000277001","volume":"43","author":"Morrison Catriona M.","year":"2010","journal-title":"Psychopathology"},{"key":"CIT0068","volume-title":"Psychological Theory","author":"Nunnally Jum C.","year":"1994"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.025"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20236"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0161"},{"issue":"1","key":"CIT0072","first-page":"52","volume":"2","author":"Powell Patrick Wayne","year":"2013","journal-title":"The Practitioner Scholar: Journal of Counseling and Professional Psychology"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.06.008"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610380009"},{"issue":"4","key":"CIT0075","doi-asserted-by":"crossref","first-page":"0","DOI":"10.1111\/j.1083-6101.1997.tb00201.x","volume":"2","author":"Rafaeli Sheizaf","year":"1997","journal-title":"Journal of Computer-Mediated Communication"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2012.09.010"},{"key":"CIT0077","volume-title":"SmartPLS 3","author":"Ringle C. M.","year":"2015"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1007\/BF03395707"},{"issue":"3","key":"CIT0079","first-page":"198","volume":"13","author":"Shen Jia.","year":"2012","journal-title":"Journal of Electronic Commerce Research"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1016\/0148-2963(91)90050-8"},{"issue":"1","key":"CIT0081","first-page":"14","volume":"56","author":"Sigman Aric.","year":"2009","journal-title":"Biologist (columbus, Ohio)"},{"issue":"1","key":"CIT0082","first-page":"345","volume":"35","author":"\u0160ka\u0159upov\u00e1 Kate\u0159ina","year":"2016","journal-title":"Behaviour & Information Technology"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1424937"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1992.tb00812.x"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-190-2.ch020"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.297"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888."},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.1"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"CIT0091","doi-asserted-by":"publisher","DOI":"10.1002\/embr.201338222"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-006-9009-9"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2004.7.443"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.05.001"},{"key":"CIT0095","first-page":"217","volume-title":"2011 2nd International Conference on Networking and Information Technology, IPCSIT","volume":"17","author":"Yen Y. S.","year":"2011"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2009.10.003"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1539518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T14:21:37Z","timestamp":1572272497000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1539518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":87,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2018,12,2]]},"published-print":{"date-parts":[[2019,6,3]]}},"alternative-id":["10.1080\/0144929X.2018.1539518"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1539518","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2017-12-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}