{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:24:22Z","timestamp":1777029862278,"version":"3.51.4"},"reference-count":165,"publisher":"Informa UK Limited","issue":"20","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1080\/10447318.2023.2247612","type":"journal-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T04:54:40Z","timestamp":1693198480000},"page":"6167-6184","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Effects of Users\u2019 Motivation on Their Usage of Mobile Cloud Computing"],"prefix":"10.1080","volume":"40","author":[{"given":"Mirsobit","family":"Mirusmonov","sequence":"first","affiliation":[{"name":"School of Business, Yeungnam University, Gyeongsan, South Korea"}]},{"given":"Guihua","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Business, Yeungnam University, Gyeongsan, South Korea"}]},{"given":"Jafar","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Business, Yeungnam University, Gyeongsan, South Korea"}]},{"given":"Sung Ho","family":"Lee","sequence":"additional","affiliation":[{"name":"VIP Care Team, Customer Care Center, KT Corp, Seoul, South Korea"}]},{"given":"Dae Wan","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Business, Yeungnam University, Gyeongsan, South Korea"}]},{"given":"Jongheon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Business, Auburn University-Montgomery, Montgomery, AL, USA"}]}],"member":"301","published-online":{"date-parts":[[2023,8,27]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"Abimbola B. (2021). Cloud computing concept and roots. arXiv preprint arXiv:2102.00981"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-08277-2_4"},{"key":"e_1_3_2_4_1","first-page":"2168","volume-title":"Cloud Security: Concepts, Methodologies, Tools, and Applications","author":"Ahmed Z. E.","year":"2019","unstructured":"Ahmed, Z. E., Saeed, R. A., & Mukherjee, A. (2019). Challenges and opportunities in vehicular cloud computing. Cloud Security: Concepts, Methodologies, Tools, and Applications. (2168\u20132185). IGI Global. (Reprinted)."},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.195"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2016.11.002"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.34306\/itsdi.v1i2.103"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10936-020-09752-1"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0040"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99007-1_84"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21248226"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22010196"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-9454-7"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2018.02.003"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC53510.2021.9609344"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-05-2016-0064"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.03.001"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118841570.iejs0032"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.09.017"},{"key":"e_1_3_2_20_1","unstructured":"Boerger E. (2011). Moving from cloud computing to mobile cloud computing Agilis Solutions. May 23\u201326."},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6620-7_57"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/nc\/niz004"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.resourpol.2020.101750"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/TLO-08-2018-0143"},{"key":"e_1_3_2_25_1","first-page":"9","volume-title":"Proceedings of the ASIS Annual Meeting","volume":"28","author":"Brown M. E.","year":"1991","unstructured":"Brown, M. E. (1991). A general model of information-seeking behavior. In Proceedings of the ASIS Annual Meeting, 28 (pp. 9\u201314)."},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/SJME-04-2020-0074"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0046016"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.5294\/pacla.2014.17.4.10"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702486"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.02.006"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1108\/S2055-53772016"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-02-2019-0050"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.39"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1108\/JABS-05-2019-0142"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.2677"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8070768"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/\/0022-3514.49.5.1184"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/0965254X.2015.1095222"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1108\/EJM-03-2017-0182"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/admsci10040096"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2010.03.007"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1108\/EJM-09-2016-0511"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.021"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.9790\/0837-19190917"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.24425\/aoa.2020.133152"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100268"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1134"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2017.1375501"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44118.21.2.20040301\/80422.8"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.28945\/2259"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.3233\/HSM-150857"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.5937\/markt1804311G"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/ace.122"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/1069072714553080"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jik.2019.08.004"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100514"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJRDM-05-2018-0089"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/0042098011411948"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.3390\/joitmc6020041"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.05.025"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.78"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45819-5_10"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12283"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMDA.2017.087624"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0261-6"},{"key":"e_1_3_2_70_1","volume-title":"Designing interaction for the cloud workshop at CHI 2011","author":"H\u00e4kkil\u00e4 J.","year":"2011","unstructured":"H\u00e4kkil\u00e4, J., Kyt\u00f6korpi, K., & Karukka, M. (2011, May 7\u201312). Discussing the challenges of mobile interaction when \u2018the cloud\u2019 is coming \u2013 a position paper. In Designing interaction for the cloud workshop at CHI 2011."},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102040"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v6i11.632639"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2015-0382"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1108\/PRR-07-2018-0023"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0547"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616109"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10228098"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.02.012"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v9i2.30396"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.02.006"},{"issue":"1","key":"e_1_3_2_82_1","first-page":"1","article-title":"An application of uses and gratifications theory to compare consumer motivations for magazine and Internet usage among South African women\u2019s magazine readers","volume":"15","author":"Jere M. G.","year":"2011","unstructured":"Jere, M. G., & Davis, S. V. (2011). An application of uses and gratifications theory to compare consumer motivations for magazine and Internet usage among South African women\u2019s magazine readers. Southern African Business Review, 15(1), 1\u201327. https:\/\/hdl.handle.net\/10520\/EJC92921","journal-title":"Southern African Business Review,"},{"issue":"1","key":"e_1_3_2_83_1","first-page":"149","article-title":"Cloud computing \u2013 An overview","volume":"3","author":"Kilari N.","year":"2018","unstructured":"Kilari, N. (2018). Cloud computing \u2013 An overview. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(1), 149\u2013152. https:\/\/ijsrcseit.com\/paper\/CSEIT1833698.pdf","journal-title":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology,"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24106-2_34"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.07.002"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1108\/JHTT-02-2019-0041"},{"key":"e_1_3_2_87_1","unstructured":"Koole M. Letkeman McQuilkin J. & Ally M. (2010). Mobile learning in distance education: Utility or futility."},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.78"},{"issue":"2","key":"e_1_3_2_89_1","first-page":"5","article-title":"Information-seeking behavior: Patterns and concepts","volume":"19","author":"Krikelas J.","year":"1983","unstructured":"Krikelas, J. (1983). Information-seeking behavior: Patterns and concepts. Drexel Library Quarterly, 19(2), 5\u201320. https:\/\/eric.ed.gov\/?id=EJ298483","journal-title":"Drexel Library Quarterly,"},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315178103"},{"key":"e_1_3_2_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.089"},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/0008125619859317"},{"key":"e_1_3_2_93_1","first-page":"38","article-title":"Fostering integrative and interdisciplinary learning: A business law exercise in social entrepreneurship, global health innovation and cloud technology","volume":"18","author":"Lasprogata G. A.","year":"2016","unstructured":"Lasprogata, G. A., & Foster, T. N. (2016). Fostering integrative and interdisciplinary learning: A business law exercise in social entrepreneurship, global health innovation and cloud technology. Atlantic Law Journal, 18, 38\u201379. https:\/\/www.atlanticlawjournal.org\/volume-18.html","journal-title":"Atlantic Law Journal,"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.5465\/19416521003691287"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.6693"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.028"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.04.028"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAACS.2021.119124"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.12.009"},{"key":"e_1_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.06.004"},{"key":"e_1_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-014-0435-4"},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1603326"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.07.029"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195571"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2014.79"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.09.006"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2017.1189"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph18115684"},{"key":"e_1_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-09-2018-0213"},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjso.12251"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.1.71"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.31812\/123456789\/3270"},{"key":"e_1_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2017.1362022"},{"key":"e_1_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32689-4_56"},{"issue":"10","key":"e_1_3_2_115_1","first-page":"275","article-title":"State-of-the-art of mobile cloud computing towards its applications & computational synergy","volume":"11","author":"Nagendra K. V.","year":"2019","unstructured":"Nagendra, K. V., Kavya, M. C. K., & Lokesh, B. (2019). State-of-the-art of mobile cloud computing towards its applications & computational synergy. The International Journal of Analytical and Experimental Modal Analysis, 11(10), 275\u2013283. Retrieved January 28, 2022, from https:\/\/ijaema.com\/index.php\/volume-11-issue-10-october-2019-r\/","journal-title":"The International Journal of Analytical and Experimental Modal Analysis,"},{"key":"e_1_3_2_116_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.22-5-2020.164667"},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.020"},{"key":"e_1_3_2_118_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12124960"},{"key":"e_1_3_2_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.018"},{"key":"e_1_3_2_120_1","doi-asserted-by":"publisher","DOI":"10.3390\/app8040516"},{"key":"e_1_3_2_121_1","volume-title":"Psychometric theory 3E","author":"Nunnally J. C.","year":"1994","unstructured":"Nunnally, J. C. (1994). Psychometric theory 3E. Tata McGraw-Hill Education."},{"key":"e_1_3_2_122_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2012.10.001"},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-016-9455-4"},{"key":"e_1_3_2_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2015.31"},{"key":"e_1_3_2_125_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12239930"},{"key":"e_1_3_2_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/RI2C48728.2019.8999888"},{"key":"e_1_3_2_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215350"},{"key":"e_1_3_2_128_1","doi-asserted-by":"publisher","DOI":"10.4172\/2165-7912.1000e124"},{"key":"e_1_3_2_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045111"},{"key":"e_1_3_2_130_1","doi-asserted-by":"publisher","DOI":"10.1515\/libri-2017-0041"},{"key":"e_1_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44038-1_99"},{"key":"e_1_3_2_132_1","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i2.421426"},{"key":"e_1_3_2_133_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2018.1451861"},{"key":"e_1_3_2_134_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12528-019-09206-1"},{"key":"e_1_3_2_135_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.04.015"},{"key":"e_1_3_2_136_1","first-page":"75","volume-title":"Proceedings of MCIS 2010","author":"Rotman D.","year":"2010","unstructured":"Rotman, D., & Preece, J. (2010). Intermittent participation: How sociability and usability shape mediated mobile interaction [Paper presentation]. In Proceedings of MCIS 2010, 75. https:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1078&context=mcis2010"},{"key":"e_1_3_2_137_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327825MCS0301_02"},{"key":"e_1_3_2_138_1","doi-asserted-by":"publisher","DOI":"10.1017\/gmh.2017.11"},{"issue":"8","key":"e_1_3_2_139_1","first-page":"1","article-title":"Cloud computing in mobile applications","volume":"2","author":"Sahu D.","year":"2012","unstructured":"Sahu, D., Sharma, S., Dubey, V., & Tripathi, A. (2012). Cloud computing in mobile applications. International Journal of Scientific and Research Publications, 2(8), 1\u20139. https:\/\/www.ijsrp.org\/research-paper-0812.php?rp=P0778","journal-title":"International Journal of Scientific and Research Publications,"},{"key":"e_1_3_2_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCN.2018.8748376"},{"key":"e_1_3_2_141_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.003"},{"key":"e_1_3_2_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810936"},{"key":"e_1_3_2_143_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-58802-2_1554"},{"key":"e_1_3_2_144_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cedpsych.2019.101832"},{"key":"e_1_3_2_145_1","doi-asserted-by":"publisher","DOI":"10.5120\/19908-1883"},{"key":"e_1_3_2_146_1","doi-asserted-by":"publisher","DOI":"10.3390\/en14071822"},{"key":"e_1_3_2_147_1","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v19i4.1411"},{"key":"e_1_3_2_148_1","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-12-2019-0258"},{"key":"e_1_3_2_149_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2019.100885"},{"key":"e_1_3_2_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.48"},{"key":"e_1_3_2_151_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044301"},{"key":"e_1_3_2_152_1","doi-asserted-by":"publisher","DOI":"10.34117\/bjdv6n8-203"},{"key":"e_1_3_2_153_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2017.03.019"},{"key":"e_1_3_2_154_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2102-7"},{"key":"e_1_3_2_155_1","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-04-2013-0082"},{"key":"e_1_3_2_156_1","doi-asserted-by":"publisher","DOI":"10.3968\/%25x"},{"key":"e_1_3_2_157_1","doi-asserted-by":"publisher","DOI":"10.1177\/1476127018765031"},{"key":"e_1_3_2_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2315297"},{"key":"e_1_3_2_159_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094670512448413"},{"key":"e_1_3_2_160_1","doi-asserted-by":"publisher","DOI":"10.13106\/jafeb.2019.vol6.no1.217"},{"key":"e_1_3_2_161_1","unstructured":"Zeal J. Smith S. P. & Scheepers R. (2010). Conceptualizing social influence in the ubiquitous computing era: Technology adoption and use in multiple use contexts. In Proceedings of ICIS 2010 261. https:\/\/aisel.aisnet.org\/icis2010_submissions\/261"},{"key":"e_1_3_2_162_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.069"},{"key":"e_1_3_2_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152397"},{"key":"e_1_3_2_164_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2015.067963"},{"key":"e_1_3_2_165_1","doi-asserted-by":"publisher","DOI":"10.1108\/DTA-09-2017-0063"},{"issue":"1","key":"e_1_3_2_166_1","first-page":"188","article-title":"Understanding social media adoption: The role of perceived media needs and technology characteristics","volume":"1","author":"Zolkepli I. A.","year":"2011","unstructured":"Zolkepli, I. A., & Kamarulzaman, Y. (2011). Understanding social media adoption: The role of perceived media needs and technology characteristics. World Journal of Social Sciences, 1(1), 188\u2013199. https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&type=pdf&doi=e3eeb9200b4e629e9cdc3bd381afbbeaad521bd0","journal-title":"World Journal of Social Sciences,"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2023.2247612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T10:52:24Z","timestamp":1728989544000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2023.2247612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,27]]},"references-count":165,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2024,10,17]]}},"alternative-id":["10.1080\/10447318.2023.2247612"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2023.2247612","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-11-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-03","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}