{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T00:36:14Z","timestamp":1776299774130,"version":"3.50.1"},"reference-count":70,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T00:00:00Z","timestamp":1277769600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6,29]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this research is to examine the effect of flow experience on mobile social networking service (SNS) users' loyalty.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Based on 305 valid responses collected from a survey questionnaire, structural equation modeling (SEM) technology was employed to examine the research model.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results show that both information quality and system quality significantly affect users' trust and flow experiences, which further determine their loyalty. The results indicate that flow experience is the strongest determinant of users' loyalty.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Mobile SNS providers need to consider user experience when seeking users' loyalty. They should enhance information quality and system quality in order to improve user trust and flow experience.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Although much research has been conducted to explore the effects of extrinsic motivations, such as perceived usefulness, on mobile commerce user behavior, the effect of intrinsic motivations, such as flow experience, is seldom tested. This research found the effect of flow experience on mobile SNS users' loyalty to be significant.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571011055126","type":"journal-article","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T19:29:47Z","timestamp":1278876587000},"page":"930-946","source":"Crossref","is-referenced-by-count":232,"title":["The effect of flow experience on mobile SNS users' loyalty"],"prefix":"10.1108","volume":"110","author":[{"given":"Tao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hongxiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012720280261400_b1","doi-asserted-by":"crossref","unstructured":"Agarwal, R. and Karahanna, E. (2000), \u201cTime flies when you are having fun: cognitive absorption and beliefs about information technology usage\u201d, MIS Quarterly, Vol. 24 No. 4, pp. 665\u201094.","DOI":"10.2307\/3250951"},{"key":"key2022012720280261400_b2","doi-asserted-by":"crossref","unstructured":"Anderson, J.C. and Gerbing, D.W. (1988), \u201cStructural equation modeling in practice: a review and recommended two\u2010step approach\u201d, Psychological bulletin, Vol. 103 No. 3, pp. 411\u201023.","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"key2022012720280261400_b3","doi-asserted-by":"crossref","unstructured":"Chae, M., Kim, J., Kim, H. and Ryu, H. (2002), \u201cInformation quality for mobile internet services: a theoretical model with empirical validation\u201d, Electronic Markets, Vol. 12 No. 1, pp. 38\u201046.","DOI":"10.1080\/101967802753433254"},{"key":"key2022012720280261400_b4","doi-asserted-by":"crossref","unstructured":"Chen, K., Yen, D.C., Hung, S.\u2010Y. and Huang, A.H. (2008), \u201cAn exploratory study of the selection of communication media: the relationship between flow and communication outcomes\u201d, Decision Support Systems, Vol. 45 No. 4, pp. 822\u201032.","DOI":"10.1016\/j.dss.2008.02.002"},{"key":"key2022012720280261400_b5","unstructured":"CNNIC (2010), \u201c25th Statistical Survey Report on the Internet Development in China\u201d, China Internet Network Information Center, available at: www.cnnic.cn."},{"key":"key2022012720280261400_b6","doi-asserted-by":"crossref","unstructured":"Csikszentmihalyi, M. and Csikszentmihalyi, I.S. (1988), Optimal Experience: Psychological Studies of Flow in Consciousness, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511621956"},{"key":"key2022012720280261400_b7","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1992), \u201cExtrinsic and intrinsic motivation to use computers in the workplace\u201d, Journal of Applied Social Psychology, Vol. 22 No. 14, pp. 1111\u201032.","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"key2022012720280261400_b8","doi-asserted-by":"crossref","unstructured":"DeLone, W.H. and McLean, E.R. (2003), \u201cThe DeLone and McLean model of information systems success: a ten\u2010year update\u201d, Journal of Management Information Systems, Vol. 19 No. 4, pp. 9\u201030.","DOI":"10.1080\/07421222.2003.11045748"},{"key":"key2022012720280261400_b9","doi-asserted-by":"crossref","unstructured":"DeLone, W.H. and McLean, E.R. (2004), \u201cMeasuring e\u2010commerce success: applying the DeLone and McLean information systems success model\u201d, International Journal of Electronic Commerce, Vol. 9 No. 1, pp. 31\u201047.","DOI":"10.1080\/10864415.2004.11044317"},{"key":"key2022012720280261400_b10","doi-asserted-by":"crossref","unstructured":"Finneran, C.M. and Zhang, P. (2005), \u201cFlow in computer\u2010mediated environments: promises and challenges\u201d, Communications of the Association for Information Systems, Vol. 15, pp. 82\u2010101.","DOI":"10.17705\/1CAIS.01504"},{"key":"key2022012720280261400_b11","doi-asserted-by":"crossref","unstructured":"Fogel, J. and Nehmad, E. (2009), \u201cInternet social network communities: risk taking, trust, and privacy concerns\u201d, Computers in Human Behavior, Vol. 25 No. 1, pp. 153\u201060.","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"key2022012720280261400_b12","doi-asserted-by":"crossref","unstructured":"Gefen, D. (2002), \u201cCustomer loyalty in e\u2010commerce\u201d, Journal of the AIS, Vol. 3, pp. 27\u201051.","DOI":"10.17705\/1jais.00022"},{"key":"key2022012720280261400_b13","doi-asserted-by":"crossref","unstructured":"Gefen, D. (2003), \u201cAssessing unidimensionality through LISREL: an explanation and example\u201d, Communications of the AIS, Vol. 12, pp. 23\u201047.","DOI":"10.17705\/1CAIS.01202"},{"key":"key2022012720280261400_b14","doi-asserted-by":"crossref","unstructured":"Gefen, D., Karahanna, E. and Straub, D.W. (2003), \u201cTrust and TAM in online shopping: an integrated model\u201d, MIS Quarterly, Vol. 27 No. 1, pp. 51\u201090.","DOI":"10.2307\/30036519"},{"key":"key2022012720280261400_b15","doi-asserted-by":"crossref","unstructured":"Gefen, D., Straub, D.W. and Boudreau, M.C. (2000), \u201cStructural equation modeling and regression: guidelines for research practice\u201d, Communications of the Association for Information Systems, Vol. 4 No. 7, pp. 1\u201070.","DOI":"10.17705\/1CAIS.00407"},{"key":"key2022012720280261400_b16","doi-asserted-by":"crossref","unstructured":"Guo, Y.M. and Klein, B.D. (2009), \u201cBeyond the test of the four channel model of flow in the context of online shopping\u201d, Communications of the AIS, Vol. 24, pp. 837\u201056.","DOI":"10.17705\/1CAIS.02448"},{"key":"key2022012720280261400_b17","doi-asserted-by":"crossref","unstructured":"Guo, Y.M. and Poole, M.S. (2009), \u201cAntecedents of flow in online shopping: a test of alternative models\u201d, Information Systems Journal, Vol. 19 No. 4, pp. 369\u201090.","DOI":"10.1111\/j.1365-2575.2007.00292.x"},{"key":"key2022012720280261400_b18","doi-asserted-by":"crossref","unstructured":"Gupta, R. and Kabadayi, S. (2010), \u201cThe relationship between trusting beliefs and web site loyalty: the moderating role of consumer motives and flow\u201d, Psychology & Marketing, Vol. 27 No. 2, pp. 166\u201085.","DOI":"10.1002\/mar.20325"},{"key":"key2022012720280261400_b19","doi-asserted-by":"crossref","unstructured":"Hausman, A.V. and Siekpe, J.S. (2009), \u201cThe effect of web interface features on consumer online purchase intentions\u201d, Journal of Business Research, Vol. 62 No. 1, pp. 5\u201013.","DOI":"10.1016\/j.jbusres.2008.01.018"},{"key":"key2022012720280261400_b20","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L. and Novak, T.P. (1996), \u201cMarketing in hypermedia computer\u2010mediated environments: conceptual foundations\u201d, Journal of Marketing, Vol. 60 No. 3, pp. 50\u201068.","DOI":"10.1177\/002224299606000304"},{"key":"key2022012720280261400_b21","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L. and Novak, T.P. (2009), \u201cFlow online: lessons learned and future prospects\u201d, Journal of Interactive Marketing, Vol. 23 No. 1, pp. 23\u201034.","DOI":"10.1016\/j.intmar.2008.10.003"},{"key":"key2022012720280261400_b22","doi-asserted-by":"crossref","unstructured":"Hsu, C.\u2010L. and Lu, H.\u2010P. (2004), \u201cWhy do people play online games? An extended TAM with social influences and flow experience\u201d, Information & Management, Vol. 41 No. 7, pp. 853\u201068.","DOI":"10.1016\/j.im.2003.08.014"},{"key":"key2022012720280261400_b23","doi-asserted-by":"crossref","unstructured":"Hsu, C.\u2010L., Lu, H.\u2010P. and Hsu, H.\u2010H. (2007), \u201cAdoption of the mobile internet: an empirical study of multimedia message service (MMS)\u201d, Omega, Vol. 35 No. 6, pp. 715\u201026.","DOI":"10.1016\/j.omega.2006.03.005"},{"key":"key2022012720280261400_b24","doi-asserted-by":"crossref","unstructured":"Huang, M.\u2010H. (2006), \u201cFlow, enduring, and situational involvement in the web environment: a tripartite second\u2010order examination\u201d, Psychology & Marketing, Vol. 23 No. 5, pp. 383\u2010411.","DOI":"10.1002\/mar.20118"},{"key":"key2022012720280261400_b25","unstructured":"iResearch (2009), China Mobile Internet Market Report: 2008\u20102009, available at: www.iresearch.com.cn."},{"key":"key2022012720280261400_b26","doi-asserted-by":"crossref","unstructured":"Jiang, Z. and Benbasat, I. (2004), \u201cVirtual product experience: effects of visual and functional control of products on perceived diagnosticity and flow in electronic shopping\u201d, Journal of Management Information Systems, Vol. 21 No. 3, pp. 111\u201047.","DOI":"10.1080\/07421222.2004.11045817"},{"key":"key2022012720280261400_b27","doi-asserted-by":"crossref","unstructured":"Jung, Y., Perez\u2010Mira, B. and Wiley\u2010Patton, S. (2009), \u201cConsumer adoption of mobile TV: examining psychological flow and media content\u201d, Computers in Human Behavior, Vol. 25 No. 1, pp. 123\u20109.","DOI":"10.1016\/j.chb.2008.07.011"},{"key":"key2022012720280261400_b30","doi-asserted-by":"crossref","unstructured":"Junglas, I.A. and Watson, R.T. (2008), \u201cLocation\u2010based services\u201d, Communications of the ACM, Vol. 51 No. 3, pp. 65\u20109.","DOI":"10.1145\/1325555.1325568"},{"key":"key2022012720280261400_b28","doi-asserted-by":"crossref","unstructured":"Junglas, I., Abraham, C. and Watson, R.T. (2008a), \u201cTask\u2010technology fit for mobile locatable information systems\u201d, Decision Support Systems, Vol. 45 No. 4, pp. 1046\u201057.","DOI":"10.1016\/j.dss.2008.02.007"},{"key":"key2022012720280261400_b29","doi-asserted-by":"crossref","unstructured":"Junglas, I.A., Johnson, N.A. and Spitzmuller, C. (2008b), \u201cPersonality traits and concern for privacy: an empirical study in the context of location\u2010based services\u201d, European Journal of Information Systems, Vol. 17 No. 4, pp. 387\u2010402.","DOI":"10.1057\/ejis.2008.29"},{"key":"key2022012720280261400_b31","doi-asserted-by":"crossref","unstructured":"Kim, D.J., Ferrin, D.L. and Rao, H.R. (2008), \u201cA trust\u2010based consumer decision\u2010making model in electronic commerce: the role of trust, perceived risk, and their antecedents\u201d, Decision Support Systems, Vol. 44 No. 2, pp. 544\u201064.","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"key2022012720280261400_b32","doi-asserted-by":"crossref","unstructured":"Kim, G., Shin, B. and Lee, H.G. (2009), \u201cUnderstanding dynamics between initial trust and usage intentions of mobile banking\u201d, Information Systems Journal, Vol. 19 No. 3, pp. 283\u2010311.","DOI":"10.1111\/j.1365-2575.2007.00269.x"},{"key":"key2022012720280261400_b33","doi-asserted-by":"crossref","unstructured":"Kofod\u2010Petersen, A., Gransaether, P.A. and Krogstie, J. (2010), \u201cAn empirical investigation of attitude towards location\u2010aware social network service\u201d, International Journal of Mobile Communications, Vol. 8 No. 1, pp. 53\u201070.","DOI":"10.1504\/IJMC.2010.030520"},{"key":"key2022012720280261400_b34","doi-asserted-by":"crossref","unstructured":"Koufaris, M. (2002), \u201cApplying the technology acceptance model and flow theory to online consumer behavior\u201d, Information Systems Research, Vol. 13 No. 2, pp. 205\u201023.","DOI":"10.1287\/isre.13.2.205.83"},{"key":"key2022012720280261400_b35","doi-asserted-by":"crossref","unstructured":"Kuo, Y.\u2010F. and Yen, S.\u2010N. (2009), \u201cTowards an understanding of the behavioral intention to use 3G mobile value\u2010added services\u201d, Computers in Human Behavior, Vol. 25 No. 1, pp. 103\u201010.","DOI":"10.1016\/j.chb.2008.07.007"},{"key":"key2022012720280261400_b36","doi-asserted-by":"crossref","unstructured":"Lee, K.C., Kang, I.W. and McKnight, D.H. (2007), \u201cTransfer from offline trust to key online perceptions: an empirical study\u201d, IEEE Transactions on Engineering Management, Vol. 54 No. 4, pp. 729\u201041.","DOI":"10.1109\/TEM.2007.906851"},{"key":"key2022012720280261400_b37","doi-asserted-by":"crossref","unstructured":"Lee, Y.E. and Benbasat, I. (2004), \u201cA framework for the study of customer interface design for mobile commerce\u201d, International Journal of Electronic Commerce, Vol. 8 No. 3, pp. 79\u2010102.","DOI":"10.1080\/10864415.2004.11044299"},{"key":"key2022012720280261400_b38","doi-asserted-by":"crossref","unstructured":"Lin, H.\u2010F. (2008), \u201cDeterminants of successful virtual communities: contributions from system characteristics and social factors\u201d, Information & Management, Vol. 45 No. 8, pp. 522\u20107.","DOI":"10.1016\/j.im.2008.08.002"},{"key":"key2022012720280261400_b39","doi-asserted-by":"crossref","unstructured":"Lin, H.H. and Wang, Y.S. (2006), \u201cAn examination of the determinants of customer loyalty in mobile commerce contexts\u201d, Information & Management, Vol. 43 No. 3, pp. 271\u201082.","DOI":"10.1016\/j.im.2005.08.001"},{"key":"key2022012720280261400_b40","doi-asserted-by":"crossref","unstructured":"Liu, Z., Min, Q. and Ji, S. (2010), \u201cAn empirical study of mobile securities management systems adoption: a task\u2010technology fit perspective\u201d, International Journal of Mobile Communications, Vol. 8 No. 2, pp. 230\u201043.","DOI":"10.1504\/IJMC.2010.031449"},{"key":"key2022012720280261400_b41","doi-asserted-by":"crossref","unstructured":"Maicas, J.P., Polo, Y. and Sese, F.J. (2009), \u201cThe role of (personal) network effects and switching costs in determining mobile users' choice\u201d, Journal of Information Technology, Vol. 24 No. 2, pp. 160\u201071.","DOI":"10.1057\/jit.2008.35"},{"key":"key2022012720280261400_b42","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K., Kim, S.S. and Patil, A. (2006), \u201cCommon method variance in IS research: a comparison of alternative approaches and a reanalysis of past research\u201d, Management Science, Vol. 52 No. 12, pp. 1865\u201083.","DOI":"10.1287\/mnsc.1060.0597"},{"key":"key2022012720280261400_b43","doi-asserted-by":"crossref","unstructured":"Nelson, R.R. and Todd, P.A. (2005), \u201cAntecedents of information and system quality: an empirical examination within the context of data warehousing\u201d, Journal of Management Information Systems, Vol. 21 No. 4, pp. 199\u2010235.","DOI":"10.1080\/07421222.2005.11045823"},{"key":"key2022012720280261400_b44","doi-asserted-by":"crossref","unstructured":"Ng, E.H. and Kwahk, K.\u2010Y. (2010), \u201cExamining the determinants of mobile internet service continuance: a customer relationship development perspective\u201d, International Journal of Mobile Communications, Vol. 8 No. 2, pp. 210\u201029.","DOI":"10.1504\/IJMC.2010.031448"},{"key":"key2022012720280261400_b45","doi-asserted-by":"crossref","unstructured":"Nicolaou, A.I. and McKnight, D.H. (2006), \u201cPerceived information quality in data exchanges: effects on risk, trust, and intention to use\u201d, Information Systems Research, Vol. 17 No. 4, pp. 332\u201051.","DOI":"10.1287\/isre.1060.0103"},{"key":"key2022012720280261400_b46","doi-asserted-by":"crossref","unstructured":"Novak, T.P., Hoffman, D.L. and Yung, Y.\u2010F. (2000), \u201cMeasuring the customer experience in online environments: a structural modeling approach\u201d, Marketing Science, Vol. 19 No. 1, pp. 22\u201042.","DOI":"10.1287\/mksc.19.1.22.15184"},{"key":"key2022012720280261400_b47","unstructured":"Nunnally, J.C. (1978), Psychometric Theory, McGraw\u2010Hill, New York, NY."},{"key":"key2022012720280261400_b48","doi-asserted-by":"crossref","unstructured":"Palka, W., Pousttchi, K. and Wiedemann, D.G. (2009), \u201cMobile word\u2010of\u2010mouth \u2013 a grounded theory of mobile viral marketing\u201d, Journal of Information Technology, Vol. 24 No. 2, pp. 172\u201085.","DOI":"10.1057\/jit.2008.37"},{"key":"key2022012720280261400_b49","doi-asserted-by":"crossref","unstructured":"Palvia, P. (2009), \u201cThe role of trust in e\u2010commerce relational exchange: a unified model\u201d, Information & Management, Vol. 46 No. 4, pp. 213\u201020.","DOI":"10.1016\/j.im.2009.02.003"},{"key":"key2022012720280261400_b50","unstructured":"Park, J., Yang, S. and Lehto, X. (2007), \u201cAdoption of mobile technologies for Chinese consumers\u201d, Journal of Electronic Commerce Research, Vol. 8 No. 3, pp. 196\u2010206."},{"key":"key2022012720280261400_b51","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A., Liang, H. and Xue, Y. (2007), \u201cUnderstanding and mitigating uncertainty in online exchange relationships: a principal\u2010agent perspective\u201d, MIS Quarterly, Vol. 31 No. 1, pp. 105\u201036.","DOI":"10.2307\/25148783"},{"key":"key2022012720280261400_b52","doi-asserted-by":"crossref","unstructured":"Petter, S., Straub, D. and Rai, A. (2007), \u201cSpecifying formative constructs in information systems research\u201d, MIS Quarterly, Vol. 31 No. 4, pp. 623\u201056.","DOI":"10.2307\/25148814"},{"key":"key2022012720280261400_b53","doi-asserted-by":"crossref","unstructured":"Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003), \u201cCommon method biases in behavioral research: a critical review of the literature and recommended remedies\u201d, Journal of Applied Psychology, Vol. 88 No. 5, pp. 879\u2010903.","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"key2022012720280261400_b54","unstructured":"Reichheld, F.F. and Schefter, P. (2000), \u201cE\u2010loyalty: your secret weapon on the web\u201d, Harvard Business Review, Vol. 7\u20108, pp. 105\u201013."},{"key":"key2022012720280261400_b56","doi-asserted-by":"crossref","unstructured":"Shin, D.H. (2009), \u201cUnderstanding user acceptance of DMB in South Korea using the modified technology acceptance model\u201d, International Journal of Human\u2010Computer Interaction, Vol. 25 No. 3, pp. 173\u201098.","DOI":"10.1080\/10447310802629785"},{"key":"key2022012720280261400_b55","doi-asserted-by":"crossref","unstructured":"Shin, D.\u2010H. (2010), \u201cUbiquitous computing acceptance model: end user concern about security, privacy and risk\u201d, International Journal of Mobile Communications, Vol. 8 No. 2, pp. 169\u201086.","DOI":"10.1504\/IJMC.2010.031446"},{"key":"key2022012720280261400_b57","doi-asserted-by":"crossref","unstructured":"Shin, Y.M., Lee, S.C., Shin, B. and Lee, H.G. (2010), \u201cExamining influencing factors of post\u2010adoption usage of mobile internet: focus on the user perception of supplier\u2010side attributes\u201d, Information Systems Frontier (in press).","DOI":"10.1007\/s10796-009-9184-x"},{"key":"key2022012720280261400_b58","doi-asserted-by":"crossref","unstructured":"Siau, K. and Shen, Z. (2003), \u201cBuilding customer trust in mobile commerce\u201d, Communications of the ACM, Vol. 46 No. 4, pp. 91\u20104.","DOI":"10.1145\/641205.641211"},{"key":"key2022012720280261400_b59","unstructured":"Siekpe, J. (2005), \u201cAn examination of the multidimensionality of flow construct in a computer\u2010mediated environment\u201d, Journal of Electronic Commerce Research, Vol. 6 No. 1, pp. 31\u201043."},{"key":"key2022012720280261400_b60","unstructured":"Sledgianowski, D. and Kulviwat, S. (2009), \u201cUsing social network sites: the effects of playfulness, critical mass and trust in a hedonic context\u201d, Journal of Computer Information Systems, Vol. 49 No. 4, pp. 74\u201083."},{"key":"key2022012720280261400_b61","doi-asserted-by":"crossref","unstructured":"Song, J. and Zahedi, F.M. (2007), \u201cTrust in health informediaries\u201d, Decision Support Systems, Vol. 43 No. 2, pp. 390\u2010407.","DOI":"10.1016\/j.dss.2006.11.011"},{"key":"key2022012720280261400_b62","doi-asserted-by":"crossref","unstructured":"Straub, D., Boudreau, M.\u2010C. and Gefen, D. (2004), \u201cValidation guidelines for IS positivist research\u201d, Communications of the AIS, Vol. 13, pp. 380\u2010427.","DOI":"10.17705\/1CAIS.01324"},{"key":"key2022012720280261400_b63","doi-asserted-by":"crossref","unstructured":"Vance, A., Christophe, E.\u2010D.\u2010C. and Straub, D.W. (2008), \u201cExamining trust in information technology artifacts: the effects of system quality and culture\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 73\u2010100.","DOI":"10.2753\/MIS0742-1222240403"},{"key":"key2022012720280261400_b64","doi-asserted-by":"crossref","unstructured":"Wang, L.C., Baker, J., Wagner, J.A. and Wakefield, K. (2007), \u201cCan a retail web site be social?\u201d, Journal of Marketing, Vol. 71 No. 3, pp. 143\u201057.","DOI":"10.1509\/jmkg.71.3.143"},{"key":"key2022012720280261400_b65","doi-asserted-by":"crossref","unstructured":"Wiedemann, D.G., Haunstetter, T. and Pousttchi, K. (2008), \u201cAnalyzing the basic elements of mobile viral marketing \u2013 an empirical study\u201d, paper presented at 7th International Conference on Mobile Business.","DOI":"10.1109\/ICMB.2008.41"},{"key":"key2022012720280261400_b66","doi-asserted-by":"crossref","unstructured":"Wixom, B.H. and Todd, P.A. (2005), \u201cA theoretical integration of user satisfaction and technology acceptance\u201d, Information Systems Research, Vol. 16 No. 1, pp. 85\u2010102.","DOI":"10.1287\/isre.1050.0042"},{"key":"key2022012720280261400_b67","doi-asserted-by":"crossref","unstructured":"Wu, J.\u2010J. and Chang, Y.\u2010S. (2005), \u201cTowards understanding members' interactivity, trust, and flow in online travel community\u201d, Industrial Management & Data Systems, Vol. 105 No. 7, pp. 937\u201054.","DOI":"10.1108\/02635570510616120"},{"key":"key2022012720280261400_b68","doi-asserted-by":"crossref","unstructured":"Xu, H. and Gupta, S. (2009), \u201cThe effects of privacy concerns and personal innovativeness on potential and experienced customers' adoption of location\u2010based services\u201d, Electronic Markets, Vol. 19, pp. 137\u201049.","DOI":"10.1007\/s12525-009-0012-4"},{"key":"key2022012720280261400_b69","doi-asserted-by":"crossref","unstructured":"Zahedi, F.M. and Song, J. (2008), \u201cDynamics of trust revision: using health infomediaries\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 225\u201048.","DOI":"10.2753\/MIS0742-1222240409"},{"key":"key2022012720280261400_b70","unstructured":"Zhang, Z. (2009), \u201cFeeling the sense of community in social networking usage\u201d, IEEE Transactions on Engineering Management, in press."}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571011055126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011055126\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011055126\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:23Z","timestamp":1753400303000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/110\/6\/930-946\/178962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,29]]},"references-count":70,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,6,29]]}},"alternative-id":["10.1108\/02635571011055126"],"URL":"https:\/\/doi.org\/10.1108\/02635571011055126","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2010,6,29]]}}}