{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T15:00:37Z","timestamp":1778511637149,"version":"3.51.4"},"reference-count":144,"publisher":"Informa UK Limited","issue":"14","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1080\/0144929x.2021.1963475","type":"journal-article","created":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:04:18Z","timestamp":1628546658000},"page":"2953-2972","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":51,"title":["Fake news detection and social media trust: a cross-cultural perspective"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6122-5674","authenticated-orcid":false,"given":"Amal","family":"Dabbous","sequence":"first","affiliation":[{"name":"Department of Finance and Economics, Saint Joseph University of Beirut, Beirut, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3398-8823","authenticated-orcid":false,"given":"Karine","family":"Aoun Barakat","sequence":"additional","affiliation":[{"name":"Department of Marketing, INSEEC Grande Ecole, INSEEC U, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0636-0002","authenticated-orcid":false,"given":"Beatriz","family":"de Quero Navarro","sequence":"additional","affiliation":[{"name":"Universidad Loyola Andaluc\u00eda, Cordoba, Spain"}]}],"member":"301","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1177\/1069072712475181"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101475"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfbs.2013.12.002"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2018.07.002"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0278-x"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1160"},{"key":"CIT0008","volume-title":"Self-efficacy: The Exercise of Control","author":"Bandura A.","year":"1997"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1207\/S1532785XMEP0303_03"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.17512\/pjms.2019.19.1.05"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1177\/0049124187016001004"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpr057"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1177\/0276146718755869"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1353\/pla.2018.0015"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2017.1331312"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.11.011"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21349"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.06.004"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2010.11.004"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1207\/s15328007sem1102_8"},{"key":"CIT0021","volume-title":"Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming","author":"Byrne B. M.","year":"2010","edition":"2"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1505934"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1057\/jibs.2009.88"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1145\/570907.570911"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1108\/JPBM-12-2018-2145"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2020.1750656"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0902_5"},{"key":"CIT0028","unstructured":"CIS. 2017. Bar\u00f3metro de Diciembre 2016. Estudio n\u00b0 3162. Madrid: Centro de Investigaciones Sociologicas. Accessed June 16 2020. http:\/\/www.cis.es\/cis\/export\/sites\/default\/-Archivos\/Marginales\/3160_3179\/3162\/es3162mar.pdf."},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.03.032"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.909"},{"issue":"2","key":"CIT0032","first-page":"199","volume":"53","author":"Corbu N.","year":"2020","journal-title":"European Journal of Communication"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/15332861.2020.1756190"},{"issue":"3","key":"CIT0034","first-page":"181","volume":"23","author":"De Mooij M.","year":"2011","journal-title":"Journal of International Consumer Marketing"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.05.021"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.01.012"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1623904"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1111\/weng.12262"},{"key":"CIT0041","volume-title":"A Primer for Soft Modeling","author":"Falk R. F.","year":"1992"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1108\/JPBM-12-2018-2149"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1177\/107769900007700304"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807075015"},{"key":"CIT0045","volume-title":"Measuring the Reach of \u201cFake News\u201d and Online Disinformation in Europe","author":"Fletcher R.","year":"2018"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1986.tb00583.x"},{"key":"CIT0047","volume-title":"Trust: The Social Virtues and the Creation of Prosperity","author":"Fukuyama F.","year":"1995"},{"key":"CIT0048","first-page":"32 (1) :148","author":"Goodman L. A.","year":"1961","journal-title":"The Annals of Mathematical Statistics"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1080\/13527266.2013.797773"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1080\/07360932.2013.781517"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2018.1504840"},{"key":"CIT0052","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"2010","edition":"7"},{"key":"CIT0053","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair J. F.","year":"2013"},{"key":"CIT0054","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling","author":"Hair J. F.","year":"2017"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0261-6"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.4324\/9781315704562"},{"key":"CIT0057","volume-title":"Modern Factor Analysis","author":"Harman H. H.","year":"1976"},{"key":"CIT0058","volume-title":"A Step-by-Step Approach to Using SAS for Factor Analysis and Structural Equation Modeling","author":"Hatcher L.","year":"2013"},{"key":"CIT0059","unstructured":"Haug, M. 2019. \u201cEndorse the Source\u2013the Impact of Information Assessment on News Sharing Behavior.\u201d Twenty-fifth Americas Conference on Information Systems, Cancun, Mexico."},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.020"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.5465\/AME.1993.9411302328"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-01-2014-0007"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2015.12.031"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1474241"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1108\/IJPPM-02-2018-0052"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.11.034"},{"key":"CIT0068","doi-asserted-by":"crossref","unstructured":"Jin, Z., J. Cao, Y. Zhang, and J. Luo. 2016. \u201cNews verification by Exploiting Conflicting Social Viewpoints in Microblogs.\u201d In: AAAI. Proceeding AAAI'16 Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2972\u20132978. Arizona: Phoenix.","DOI":"10.1609\/aaai.v30i1.10382"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1177\/0002764219869406"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1700175114"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120426"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1578828"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.030"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.08.015"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1145\/3415211"},{"key":"CIT0076","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline R. B.","year":"2015"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1177\/016555159502100204"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-014-0014-x"},{"key":"CIT0079","unstructured":"Kumar, S., and N. Shah. 2018. False Information on Web and Social Media: A Survey. arXiv preprint arXiv:1804.08559."},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(20)30084-4"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2018.04.019"},{"key":"CIT0083","first-page":"1","author":"Luo M.","year":"2020","journal-title":"Communication Research"},{"key":"CIT0084","first-page":"127","volume-title":"Predicting Health Behavior","author":"Luszczynska A.","year":"2005"},{"key":"CIT0085","volume-title":"Marketing Research: An Applied Approach: 3rd European Edition","author":"Malhotra N.","year":"2007"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-06-2019-0289"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-06-2015-0022"},{"key":"CIT0088","first-page":"7","volume-title":"Information Quality: Definitions and Dimensions","author":"Marchand D.","year":"1990"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.98.2.224"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1086\/422111"},{"key":"CIT0091","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.93.3.568"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01488.x"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(03)00049-6"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1177\/0002764217701217"},{"key":"CIT0095","first-page":"317","volume":"2018","author":"Milanese N.","year":"2018","journal-title":"IEMed Mediterranean Yearbook"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.21500\/20112084.857"},{"key":"CIT0097","first-page":"1","volume":"11","author":"Miller R.","year":"2010","journal-title":"Asia Pacific Public Relations Journal"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0228882"},{"key":"CIT0099","doi-asserted-by":"crossref","unstructured":"Mustafaraj, E., and P. T. Metaxas. 2017. \u201cThe Fake News Spreading Plague: Was It Preventable?\u201d In Proceedings of the 2017 ACM on Web Science Conference, 235\u2013239.","DOI":"10.1145\/3091478.3091523"},{"key":"CIT0100","volume-title":"Mplus User's Guide: Statistical Analysis with Latent Variables","author":"Muth\u00e9n L. K.","year":"1998","edition":"6"},{"key":"CIT0101","volume-title":"Going Viral","author":"Nahon K.","year":"2013"},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818758715"},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2005.11045823"},{"key":"CIT0104","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0803_2"},{"key":"CIT0105","volume-title":"Psychometric Methods","author":"Nunnally J.","year":"1978"},{"key":"CIT0106","doi-asserted-by":"publisher","DOI":"10.1080\/14241277.2020.1799794"},{"key":"CIT0107","doi-asserted-by":"publisher","DOI":"10.1111\/jopy.12476"},{"key":"CIT0108","unstructured":"Pew Research Center. 2018. \u201cPublics Globally Want Unbiased News Coverage, but are Divided on Whether their News Media Deliver.\u201d Report, Washington, DC: Pew Research Center. Accessed March 5 2020. https:\/\/www.pewresearch.org\/global\/2018\/01\/11\/publics-globally-want-unbiased-news-coverage-but-are-divided-on-whether-their-news-media-deliver\/."},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"CIT0110","first-page":"60","volume":"37","author":"Quelch J. A.","year":"1996","journal-title":"Sloan Management Review"},{"key":"CIT0111","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2019.1686676"},{"key":"CIT0112","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1629025"},{"key":"CIT0113","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00021-5"},{"key":"CIT0114","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926617"},{"key":"CIT0115","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2019.10779"},{"key":"CIT0116","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2018.1511822"},{"key":"CIT0117","doi-asserted-by":"publisher","DOI":"10.3200\/JOER.99.6.323-338"},{"key":"CIT0118","doi-asserted-by":"publisher","DOI":"10.3390\/su12041691"},{"key":"CIT0119","doi-asserted-by":"publisher","DOI":"10.1080\/09593969.2016.1170065"},{"key":"CIT0120","doi-asserted-by":"publisher","DOI":"10.1145\/3305260"},{"key":"CIT0121","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.008"},{"key":"CIT0122","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"CIT0123","unstructured":"Silverman, C. 2016. \u201cHere are 50 of the Biggest Fake News Hits on Facebook from 2016.\u201d Buzzfeed News, 1\u201312. https:\/\/www.buzzfeednews.com\/article\/craigsilverman\/top-fake-news-of-2016."},{"key":"CIT0124","doi-asserted-by":"publisher","DOI":"10.15171\/ijhpm.2017.19"},{"key":"CIT0125","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.025"},{"key":"CIT0126","first-page":"73","volume-title":"Digital Media, Youth, and Credibility","author":"Sundar S.","year":"2008"},{"key":"CIT0127","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2019.05.026"},{"key":"CIT0128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2020.102197"},{"key":"CIT0129","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1360143"},{"key":"CIT0130","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-11-2019-0455"},{"key":"CIT0131","doi-asserted-by":"crossref","unstructured":"Torres, R., N. Gerhart, and A. Negahban. 2018. Combating fake news: An investigation of information verification behaviors on social networking sites. In Proceedings of the 51st Hawaii International Conference on System Sciences.","DOI":"10.24251\/HICSS.2018.499"},{"key":"CIT0132","doi-asserted-by":"publisher","DOI":"10.1177\/1081180X05280776"},{"key":"CIT0133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.07.022"},{"key":"CIT0134","doi-asserted-by":"publisher","DOI":"10.1177\/109442810031002"},{"key":"CIT0135","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1078834"},{"key":"CIT0136","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817712086"},{"key":"CIT0137","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000644"},{"key":"CIT0138","doi-asserted-by":"publisher","DOI":"10.1177\/0093650203257838"},{"issue":"4","key":"CIT0139","first-page":"32","volume":"6","author":"Vongurai R.","year":"2018","journal-title":"Asia Pacific Journal of Multidisciplinary Research"},{"key":"CIT0140","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"CIT0141","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1637445"},{"key":"CIT0142","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.011"},{"key":"CIT0143","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.026"},{"key":"CIT0144","doi-asserted-by":"publisher","DOI":"10.1002\/pits.20308"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2021.1963475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T13:56:34Z","timestamp":1670594194000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2021.1963475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":144,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,10,26]]}},"alternative-id":["10.1080\/0144929X.2021.1963475"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2021.1963475","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-10-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}