{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T01:29:19Z","timestamp":1775093359687,"version":"3.50.1"},"reference-count":70,"publisher":"Informa UK Limited","issue":"11","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,8,18]]},"DOI":"10.1080\/0144929x.2021.1929489","type":"journal-article","created":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:57:13Z","timestamp":1621580233000},"page":"2427-2437","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":29,"title":["Smartphone uses and emotional and psychological well-being in China: the attenuating role of perceived information overload"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4133-5953","authenticated-orcid":false,"given":"Xueqing","family":"Li","sequence":"first","affiliation":[{"name":"School of Media and Communication, Shanghai Jiao Tong University, Shanghai, People\u2019s Republic of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9911-593X","authenticated-orcid":false,"given":"Michael","family":"Chan","sequence":"additional","affiliation":[{"name":"School of Journalism and Communication, The Chinese University of Hong Kong, Shatin, Hong Kong"}]}],"member":"301","published-online":{"date-parts":[[2021,5,20]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.057"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.117.3.497"},{"key":"CIT0003","volume-title":"Information Overload","author":"Bawden D.","year":"2001"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000006984"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.4135\/9781483329529.n26"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1177\/0894439314528779"},{"key":"CIT0007","first-page":"20","volume-title":"Proceedings of the Workshop New Challenges for NLP Frameworks","author":"Bontcheva K.","year":"2010"},{"key":"CIT0008","unstructured":"Bontcheva, K., G. Gorrell, and B. Wessels. 2013. Social Media and Information Overload: Survey Results [online]. http:\/\/arxiv.org\/abs\/1306.0813"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/SHUSER.2012.6268881"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.048"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01496.x"},{"key":"CIT0012","unstructured":"Cao, Z. 2019. Report: Average Chinese Mobile User Installs 56 Apps [Online]. http:\/\/www.chinadaily.com.cn\/a\/201908\/16\/WS5d561e4ea310cf3e35566287.html."},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813516836"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.05.027"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101469"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.09.002"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.011"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.011"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1089\/109493104322820066"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1111\/j.1360-0443.2009.02854.x"},{"key":"CIT0021","unstructured":"CNNIC. 2019. The 44st Survey Report [online]. https:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201908\/P020190830356787490958.pdf."},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-8854-0_8"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.2.197"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-2354-4_4"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1007\/978-4-431-55753-1_2"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.023"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811415047"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1177\/2050157912459496"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/3894.3895"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-007-9140-8"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0487"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0610"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.02.028"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1177\/2050157920927062"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511489471"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20022"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.246"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2020.05.001"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/03634523.2013.767917"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2000.tb02833.x"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1002\/9781118783764.wbieme0077"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.10.047"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.011"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmz013"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.3109\/01612840.2011.632708"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106217"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1177\/0013916514539755"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1177\/0013916511404408"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1080\/10955040701301722"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0580"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1177\/0265407512453827"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610380009"},{"key":"CIT0054","unstructured":"Rodriguez, M. G., K. Gummadi, and B. Schoelkopf. 2014, May. \u2018Quantifying Information Overload in Social Media and its Impact on Social Contagions\u2019. In Eighth International AAAI Conference on Weblogs and Social Media [online]. https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM14\/paper\/viewFile\/8108\/8117."},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2017.09.001"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12091"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.141"},{"key":"CIT0058","unstructured":"Shirky, C. 2008. It\u2019s Not Information Overload. It\u2019s Filter Failure [online]. https:\/\/d.ucsd.edu\/IxD\/research\/2019\/lectures\/discussants\/15-Attention.pdf."},{"key":"CIT0059","doi-asserted-by":"crossref","unstructured":"Sk\u00e5nland, M.S. 2013. Music, Health, and Well-Being. International Journal of Qualitative Studies on Health and Well-being, 8 [online]. https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC3740598\/","DOI":"10.3402\/qhw.v8i0.21780"},{"key":"CIT0060","unstructured":"Statista. 2019a. Distribution of Smartphone Users in China from 2013 to 2019, by Age Group [online]. https:\/\/www.statista.com\/statistics\/224110\/smartphone-users-in-china-by-age\/."},{"key":"CIT0061","unstructured":"Statista. 2019b. Number of Smartphone Users in China from 2017 to 2023 (in Millions) [online]. https:\/\/www.statista.com\/statistics\/467160\/forecast-of-smartphone-users-in-china\/."},{"key":"CIT0062","unstructured":"Tencent Research Institute. 2018. Comments from the Founder: How to Achieve Tech-For-Good in the Time of Information Overload? https:\/\/tisi.org\/4999."},{"key":"CIT0063","volume-title":"Alone Together: Why we Expect More from Technology and Less from Each Other","author":"Turkle S.","year":"2011"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.039"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1177\/1461444806059870"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1177\/146045820100700210"},{"key":"CIT0067","unstructured":"Xinhua News. 2015. Media Literacy Education: Protect the Youth from Cyber Harm. http:\/\/www.xinhuanet.com\/politics\/2015-06\/05\/c_127882922.htm."},{"key":"CIT0068","unstructured":"Xinhua News. 2017. Full Text of Xi Jinping's Report at 19th CPC National Congress [online]. http:\/\/www.xinhuanet.com\/english\/special\/2017-11\/03\/c_136725942.htm."},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2016.0562"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-12-2015-0195"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2021.1929489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T11:22:32Z","timestamp":1665746552000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2021.1929489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,20]]},"references-count":70,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,8,18]]}},"alternative-id":["10.1080\/0144929X.2021.1929489"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2021.1929489","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-11-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}