{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T03:13:23Z","timestamp":1768274003150,"version":"3.49.0"},"reference-count":67,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2018,4,3]]},"DOI":"10.1080\/10447318.2018.1427826","type":"journal-article","created":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T18:17:09Z","timestamp":1516817829000},"page":"356-366","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":69,"title":["Understanding WeChat Users\u2019 Behavior of Sharing Social Crisis Information"],"prefix":"10.1080","volume":"34","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"College of Humanity and Social Science, Harbin University of Technology (Shenzhen), Shenzhen, China"}]},{"given":"Chulu","family":"Liang","sequence":"additional","affiliation":[{"name":"College of Humanity and Social Science, Harbin University of Technology (Shenzhen), Shenzhen, China"}]},{"given":"Danqing","family":"Cai","sequence":"additional","affiliation":[{"name":"Huawei Technologies, Shenzhen, China"}]}],"member":"301","published-online":{"date-parts":[[2018,1,24]]},"reference":[{"key":"cit0001","first-page":"438","volume-title":"Theory of planned behavior handbook theories of social psychology","author":"Ajzen I.","year":"2011"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-013-9502-z"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.jiph.2016.08.015"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1002\/ab.20325"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.07.003"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr1604_2"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2014.02.008"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2007.04.001"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.soscij.2016.02.011"},{"issue":"1","key":"cit0011","first-page":"27","volume":"27","author":"Bird D.","year":"2012","journal-title":"Australian Journal of Emergency Management"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1177\/019027250406700105"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1207\/S15327574IJT0101_4"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2013.01.001"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.028"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2010.11.001"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-02-2012-0025"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.05.021"},{"key":"cit0019","author":"Chen L.","year":"2017","journal-title":"Telematics & Informatics, 34(7), 1125\u20131142"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.09.003"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.08.031"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.04.001"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2011.01623.x"},{"key":"cit0024","unstructured":"CNNIC. (2017). China Internet network information center report of 2017. Retrieved from http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201701\/P020170123364672657408.pdf"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1177\/009365094021005005"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.05.064"},{"key":"cit0028","volume-title":"Prosocial development","author":"Eisenberg N.","year":"1998"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.060"},{"key":"cit0030","volume-title":"Belief, attitude, intention and behavior: An introduction to theory and research","author":"Fishbein M.","year":"1975"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.10.010"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.2307\/2092623"},{"key":"cit0033","author":"Hai A.","journal-title":"International Journal of Sustainable Built Environment"},{"key":"cit0034","volume-title":"Multivariate data analysis","author":"Hair J. F.","year":"2006","edition":"6"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1177\/1527476411418351"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.07.046"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441868"},{"key":"cit0039","first-page":"19e32","volume-title":"The uses of mass communications: Current perspectives on gratifications research","author":"Katz E.","year":"1974"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2017.02.006"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.03.001"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.110"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.001"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.05.027"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.002"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.05.001"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.06.009"},{"key":"cit0048","volume":"76","author":"Meade A. W.","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijme.2016.11.002"},{"key":"cit0050","volume-title":"The net delusion: The dark side of internet freedom","author":"Morozov E.","year":"2010"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9275-8"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.08.002"},{"issue":"6","key":"cit0053","first-page":"729","volume":"12","author":"Park N.","year":"2009","journal-title":"Cyberpsychology & Behavior the Impact of the Internet Multimedia & Virtual Reality on Behavior & Society"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.02.041"},{"key":"cit0055","unstructured":"Sanstock, John W. & Topical, A. (2007). Approach to life span development (4th, Ch. 15, pp. 489\u2013491). New York, NY: McGraw-Hill."},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1509\/jm.11.0316"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2005.05.001"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1177\/0002764209356252"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.036"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.027"},{"key":"cit0061","unstructured":"Tecent. (2017). 2017 Tecent WeChat interim report. Retrieved from June 20, 2017, from http:\/\/t.qianzhan.com\/caijing\/detail\/170424-8f9569e1.html"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-120571"},{"key":"cit0063","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(00)00045-7"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1177\/0170840607076003"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.05.023"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.06.061"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.054"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2018.1427826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T05:33:52Z","timestamp":1634967232000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2018.1427826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,24]]},"references-count":67,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4,3]]}},"alternative-id":["10.1080\/10447318.2018.1427826"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2018.1427826","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-01-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}