{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:03:21Z","timestamp":1770487401420,"version":"3.49.0"},"reference-count":49,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1080\/08874417.2015.11645759","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T09:55:50Z","timestamp":1460368550000},"page":"78-87","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":47,"title":["Understanding Consumers' Web-Mobile Shopping Extension Behavior: A Trust Transfer Perspective"],"prefix":"10.1080","volume":"55","author":[{"given":"Shuiqing","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yuangao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"June","family":"Wei","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,10]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"CIT0003","first-page":"1","volume-title":"European Journal of Information Systems","author":"Bhattacherjee","year":"2013"},{"issue":"4","key":"CIT0004","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/08874417.2013.11645647","volume":"53","author":"Chong","year":"2013","journal-title":"Journal of Computer Information Systems"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-012-0111-5"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415120305"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1177\/1094670507306683"},{"issue":"1","key":"CIT0008","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"Gefen Karahanna","year":"2003","journal-title":"Mis Quarterly"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888."},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.05.012"},{"key":"CIT0011","volume-title":"IResearh: the market share of China mobile shopping is expected to rearch 48.27","author":"IResearch","year":"2012"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(00)00042-1"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160402"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.009"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0188"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00269.x"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1023\/B:ITEM.0000008081.55563.d4"},{"issue":"4","key":"CIT0019","doi-asserted-by":"crossref","first-page":"941","DOI":"10.2307\/25148760","volume":"30","author":"Komiak","year":"2006","journal-title":"MIS Quarterly"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160401"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.12.002"},{"issue":"3","key":"CIT0022","first-page":"165","volume":"6","author":"Lee","year":"2005","journal-title":"Journal of Electronic Commerce Research"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.11.006"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.906851"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/1046669X.2010.512859"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230210"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.07.006"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2011.07.008"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.09.006"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.008"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"issue":"4","key":"CIT0032","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1080\/07421222.2005.11045823","volume":"21","author":"Nelson Todd","year":"2005","journal-title":"Journal of Management Information Systems"},{"key":"CIT0033","volume-title":"\u201cPsychometric theory,\u201d","author":"Nunnally","year":"1978"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2009.2023084"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1086\/208613"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1177\/014920638601200408"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260210"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1177\/0049124187016001006"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.1.5.12810"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230106"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.12.015"},{"issue":"1","key":"CIT0044","first-page":"14","volume":"52","author":"Wen Prybutok","year":"2011","journal-title":"Journal of Computer Information Systems"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.019"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.02.007"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211199988"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0485-y"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T12:58:12Z","timestamp":1567774692000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2015.11645759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":49,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2015,12,10]]},"published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1080\/08874417.2015.11645759"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2015.11645759","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}