{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T09:48:20Z","timestamp":1763977700223,"version":"3.41.2"},"reference-count":51,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T00:00:00Z","timestamp":1289865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,16]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Few library studies have investigated recommendation classifications for e\u2010book (electronic book) usage, while none have directly compared what recommendation sources (word\u2010of\u2010mouth, advertising, and expert recommendation) might influence e\u2010book usage intentions. To fill this gap in the literature, the main purposes of this study are to: examine how users perceive the influence of recommendations on the intention to use e\u2010books for academic purposes; and to measure the level of the perception of trust and perceived risk when users receive e\u2010book recommendations from peers, advertisers, and experts.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Data for this study were collected from 382 academic digital library users between the ages of 18 and 25. A multiple regression analysis was then conducted to identify the key causal relationships.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The comparison of three recommendation sources (word\u2010of\u2010mouth, advertising, and expert recommendations) revealed that word\u2010of\u2010mouth (WOM) played a more important role than other recommendations in determining the intention to use e\u2010books in an academic digital library. In addition, enhancing the perceived trust and reducing the risk towards the use of e\u2010books can mediate the relationship between recommendation sources and the behavioural intentions to use e\u2010books.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>This study assessed self\u2010reported behavioural intention as part of its survey and, as a result, could have introduced unintentional inaccuracies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Librarians should emphasise e\u2010book advantages (e.g. easy searching, easily accessible index) to get positive recommendation if users follow all of the recommendations of the source. They can also create online discussion forums to provide usage intention discussions, which can influence users' perceptions of trust and risk and increase the willingness of potential users to read e\u2010books.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Little has been written on the intentions of using e\u2010books. Therefore, this conceptual model is novel. This model is also useful in explaining how recommendations stimulate the intentions of using e\u2010books by enhancing the perceived trust and reducing the perceived risk; these findings may generally be applicable to librarians, current users, and potential users.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02640471011093534","type":"journal-article","created":{"date-parts":[[2010,11,20]],"date-time":"2010-11-20T07:09:59Z","timestamp":1290236999000},"page":"844-857","source":"Crossref","is-referenced-by-count":33,"title":["Recommendation sources on the intention to use e\u2010books in academic digital libraries"],"prefix":"10.1108","volume":"28","author":[{"given":"Chiun\u2010Sin","family":"Lin","sequence":"first","affiliation":[]},{"given":"Gwo\u2010Hshiung","family":"Tzeng","sequence":"additional","affiliation":[]},{"given":"Yang\u2010Chieh","family":"Chin","sequence":"additional","affiliation":[]},{"given":"Chiao\u2010Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022030820373006100_b1","unstructured":"Abdullah, N. and Gibb, F. (2006), \u201cA survey of e\u2010book awareness and usage amongst students in an academic library\u201d, Proceedings of International Conference of Multidisciplinary Information Sciences and Technologies, 25\u201028 September, Merida, pp. 115\u20109, available at: eprints.cdlr.strath.ac.uk\/2280\/01\/FGibb_survey_ebook.pdf (accessed 16 July 2007)."},{"key":"key2022030820373006100_b2","unstructured":"Ajzen, I. (1988), Attitudes, Personality, and Behavior, Dorsey Press, Chicago, IL."},{"key":"key2022030820373006100_b3","unstructured":"Andreasen, A.R. (1968), \u201cAttitudes and customer behavior: a decision model\u201d, in Kassarjian, H.H. and Robertson, T.S. (Eds), Perspectives in Consumer Behavior, Scott, Foresman and Company, Glenview, IL, pp. 498\u2010510."},{"key":"key2022030820373006100_b4","doi-asserted-by":"crossref","unstructured":"Anuradha, K.T. and Usha, H.S. (2005), \u201cUse of e\u2010books in an academic and research environment \u2013 a case study from the Indian Institute of Science\u201d, Program: Electronic Library and Information Systems, Vol. 40 No. 1, pp. 48\u201062.","DOI":"10.1108\/00330330610646807"},{"key":"key2022030820373006100_b5","doi-asserted-by":"crossref","unstructured":"Aqueveque, C. (2006), \u201cExtrinsic cue and perceived risk: the influence of consumption situation\u201d, Journal of Consumer Marketing, Vol. 23 No. 5, pp. 237\u201047.","DOI":"10.1108\/07363760610681646"},{"key":"key2022030820373006100_b6","doi-asserted-by":"crossref","unstructured":"Batra, R. and Sinha, I. (2000), \u201cConsumer\u2010level factors moderating the success of private label brands\u201d, Journal of Retailing, Vol. 76 No. 2, pp. 175\u201091.","DOI":"10.1016\/S0022-4359(00)00027-0"},{"key":"key2022030820373006100_b7","doi-asserted-by":"crossref","unstructured":"Bickart, B. and Schindler, R.M. (2001), \u201cInternet forums as influential sources of consumer information\u201d, Journal of Interactive Marketing, Vol. 15 No. 3, pp. 31\u201040.","DOI":"10.1002\/dir.1014"},{"key":"key2022030820373006100_b8","doi-asserted-by":"crossref","unstructured":"Campbell, M.C. and Goodstein, R.C. (2001), \u201cThe moderating effect of perceived risk on consumers' evaluations of product incongruity: preference for the norm\u201d, Journal of Consumer Research, Vol. 28 No. 3, pp. 439\u201049.","DOI":"10.1086\/323731"},{"key":"key2022030820373006100_b9","doi-asserted-by":"crossref","unstructured":"Churchill, G.A. (1979), \u201cA paradigm for developing better measures of marketing constructs\u201d, Journal of Marketing Research, Vol. 16 No. 1, pp. 64\u201073.","DOI":"10.1177\/002224377901600110"},{"key":"key2022030820373006100_b10","doi-asserted-by":"crossref","unstructured":"Connaway, L.S. and Wicht, H.L. (2007), \u201cWhat happened to the e\u2010book revolution? The gradual integration of e\u2010books into academic libraries\u201d, Journal of Electronic Publishing, Vol. 10 No. 3.","DOI":"10.3998\/3336451.0010.302"},{"key":"key2022030820373006100_b11","unstructured":"Cox, D.F. (1967), \u201cRisk taking and information handling in consumer behavior\u201d, in Cox, D.F. (Ed.), Risk Taking and Information Handling in Consumer Behavior, Boston University Press, Boston, MA, pp. 604\u201039."},{"key":"key2022030820373006100_b12","doi-asserted-by":"crossref","unstructured":"Davis, F., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022030820373006100_b13","doi-asserted-by":"crossref","unstructured":"Dholakia, U.M. (2001), \u201cA motivational process model of product involvement and consumer risk perception\u201d, European Journal of Marketing, Vol. 35 Nos 11\/12, pp. 1340\u201060.","DOI":"10.1108\/EUM0000000006479"},{"key":"key2022030820373006100_b14","doi-asserted-by":"crossref","unstructured":"Dillon, D. (2001), \u201cE\u2010books: the university of Texas experience, part 1\u201d, Library Hi Tech, Vol. 19 No. 2, pp. 113\u201025.","DOI":"10.1108\/07378830110394826"},{"key":"key2022030820373006100_b15","doi-asserted-by":"crossref","unstructured":"Dowling, G.R. and Staelin, R. (1994), \u201cA model of perceived risk and intended risk\u2010handling activity\u201d, Journal of Consumer Research, Vol. 21 No. 1, pp. 119\u201034.","DOI":"10.1086\/209386"},{"key":"key2022030820373006100_b16","unstructured":"ebrary (2008), \u201c2008 global student e\u2010book survey sponsored by ebrary\u201d, www.ebrary.com.ezproxy.library.yorku.ca\/corp\/collateral\/en\/Survey\/ebrary_student_survey_2008.pdf."},{"key":"key2022030820373006100_b17","doi-asserted-by":"crossref","unstructured":"Feathermana, M. and Pavlou, P.A. (2003), \u201cPredicting e\u2010services adoption: a perceived risk facets perspective\u201d, International Journal of Human\u2010computer Studies, Vol. 59 No. 4, pp. 451\u201074.","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"key2022030820373006100_b18","doi-asserted-by":"crossref","unstructured":"George, J.F. (2002), \u201cInfluences on the intent to make internet purchases\u201d, Internet Research, Vol. 12 No. 2, pp. 165\u201080.","DOI":"10.1108\/10662240210422521"},{"key":"key2022030820373006100_b19","unstructured":"Gibbons, S., Peters, T.A. and Bryan, R. (2003), \u201cE\u2010book functionality: what libraries and their patrons want and expect from electronic books\u201d, LITA Guide, No. 10, LITA, Chicago, IL."},{"key":"key2022030820373006100_b20","doi-asserted-by":"crossref","unstructured":"Gilly, C.M., Graham, J.L., Wolfinbarger, M.R. and Yale, L.J. (1998), \u201cA dyadic study of interpersonal information search\u201d, Journal of the Academy of Marketing Science, Vol. 2 No. 2, pp. 83\u2010100.","DOI":"10.1177\/0092070398262001"},{"key":"key2022030820373006100_b21","doi-asserted-by":"crossref","unstructured":"Herther, N.K. (2005), \u201cThe e\u2010book industry today: a bumpy road becomes an evolutionary path to market maturity\u201d, The Electronic Library, Vol. 23 No. 1, pp. 45\u201053.","DOI":"10.1108\/02640470510582727"},{"key":"key2022030820373006100_b22","doi-asserted-by":"crossref","unstructured":"Hoorebeek, M.V. (2003), \u201cNapster clones turn their attention to academic e\u2010books\u201d, New Library World, Vol. 104 Nos 4\/5, pp. 142\u20108.","DOI":"10.1108\/03074800310475954"},{"key":"key2022030820373006100_b23","unstructured":"Jantz, R. (2001), \u201cE\u2010books and new library service models: an analysis of the impact of e\u2010book technology on academic libraries\u201d, Information Technology and Libraries, Vol. 20 No. 2, pp. 104\u201012."},{"key":"key2022030820373006100_b24","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.L., Tractinsky, N. and Vitale, M. (1999), \u201cConsumer trust in an internet store\u201d, Information Technology and Management, Vol. 2 No. 12, pp. 45\u201071.","DOI":"10.1023\/A:1019104520776"},{"key":"key2022030820373006100_b25","unstructured":"Jung, B.T. and Choi, H.J. (1999), Marketing Communication on the Internet: Theory and Strategy, Nanam, Seoul."},{"key":"key2022030820373006100_b26","doi-asserted-by":"crossref","unstructured":"Kanso, A.M. and Nelson, R.A. (2004), \u201cInternet and magazine advertising: integrated partnerships or not?\u201d, Journal of Advertising Research, Vol. 44 No. 4, pp. 317\u201026.","DOI":"10.1017\/S002184990404036X"},{"key":"key2022030820373006100_b27","doi-asserted-by":"crossref","unstructured":"Kim, M. and Lennon, S.J. (2000), \u201cTelevision shopping for apparel in the United States: effects of perceived amount of information on perceived risks and purchase intentions\u201d, Family and Consumer Sciences Research Journal, Vol. 28 No. 3, pp. 301\u201030.","DOI":"10.1177\/1077727X00283002"},{"key":"key2022030820373006100_b28","unstructured":"Kiran, R., Sharma, A. and Mittal, K.C. (2008), \u201cAttitudes, preferences and profile of online buyers in India: changing trends\u201d, South Asian Journal of Management, Vol. 15 No. 3, pp. 55\u201073."},{"key":"key2022030820373006100_b29","doi-asserted-by":"crossref","unstructured":"Landoni, M. and Hanlon, G. (2006), \u201cE\u2010book reading groups: interacting with e\u2010books in public libraries\u201d, The Electronic Library, Vol. 25 No. 5, pp. 599\u2010612.","DOI":"10.1108\/02640470710829578"},{"key":"key2022030820373006100_b33","doi-asserted-by":"crossref","unstructured":"McDonald, D. and Ackerman, M. (2000), \u201cExpertise recommendation: a flexible recommendation system and architecture\u201d, Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW 2000), Philadelphia, PA, pp. 231\u201040.","DOI":"10.1145\/358916.358994"},{"key":"key2022030820373006100_b30","doi-asserted-by":"crossref","unstructured":"Mathieson, K., Peacock, E. and Chin, W.W. (2001), \u201cExtending the technology acceptance model: the influence of perceived user resources\u201d, DATA BASE for Advances in Information Systems, Vol. 32 No. 3, pp. 86\u2010112.","DOI":"10.1145\/506724.506730"},{"key":"key2022030820373006100_b31","unstructured":"Mattison, D. (2002), \u201cAlice in e\u2010book land: a primer for librarians\u201d, Computers in Libraries, Vol. 22 No. 9, pp. 14\u201021."},{"key":"key2022030820373006100_b32","doi-asserted-by":"crossref","unstructured":"Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), \u201cAn integrative model of organizational trust\u201d, Academy of Management Review, Vol. 20 No. 3, pp. 709\u201034.","DOI":"10.5465\/amr.1995.9508080335"},{"key":"key2022030820373006100_b34","doi-asserted-by":"crossref","unstructured":"Mourali, M. and Laroche, M. (2005), \u201cAntecedents of consumer relative preference for interpersonal information sources in pre\u2010purchase search\u201d, Journal of Consumer Behavior, Vol. 4 No. 5, pp. 307\u201018.","DOI":"10.1002\/cb.16"},{"key":"key2022030820373006100_b35","doi-asserted-by":"crossref","unstructured":"Mukherjee, A. and Nath, P. (2007), \u201cRole of electronic trust in online retailing: a re\u2010examination of the commitment\u2010trust theory\u201d, European Journal of Marketing, Vol. 41 Nos 9\/10, pp. 1173\u2010202.","DOI":"10.1108\/03090560710773390"},{"key":"key2022030820373006100_b36","doi-asserted-by":"crossref","unstructured":"Murray, K.B. (1991), \u201cA test of services marketing theory: consumer information acquisition activities\u201d, Journal of Marketing, Vol. 55 No. 3, pp. 10\u201025.","DOI":"10.1177\/002224299105500102"},{"key":"key2022030820373006100_b37","unstructured":"Nelson, M.R. (2008), \u201cE\u2010books in higher education: nearing the end of the era of hype?\u201d, EDUCAUSE Review, Vol. 43 No. 2, pp. 40\u201056, available at: connect.educause.edu\/ (accessed 11 June)."},{"key":"key2022030820373006100_b38","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A. (2003), \u201cConsumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model\u201d, International Journal of Electronic Commerce, Vol. 7 No. 3, pp. 101\u201034.","DOI":"10.1080\/10864415.2003.11044275"},{"key":"key2022030820373006100_b39","unstructured":"Primary Research Group (2003), Library Use of E\u2010books: A Report from Primary Research Group, Primary Research Group, New York, NY."},{"key":"key2022030820373006100_b40","doi-asserted-by":"crossref","unstructured":"Roca, J.C., Garc\u00eda, J.J. and de la Vega, J.J. (2009), \u201cThe importance of perceived trust, security and privacy in online trading systems\u201d, Information Management & Computer Security, Vol. 17 No. 2, pp. 96\u2010113.","DOI":"10.1108\/09685220910963983"},{"key":"key2022030820373006100_b41","doi-asserted-by":"crossref","unstructured":"Roselius, T. (1971), \u201cConsumer rankings of risk reduction methods\u201d, Journal of Marketing, Vol. 35 No. 1, pp. 56\u201061.","DOI":"10.1177\/002224297103500110"},{"key":"key2022030820373006100_b42","unstructured":"Rowland, I. (2007), Superbook: Planning for the eBook Revolution, University College London, London, available at: www.ucl.ac.uk\/slais\/research\/ciber\/superbook\/ (accessed 25 September 2008)."},{"key":"key2022030820373006100_b43","unstructured":"Selnes, F. and Gronhaug, K. (1986), \u201cSubjective and objective measures of product knowledge contrasted\u201d, Advances in Consumer Research, Vol. 13 No. 1, pp. 67\u201071."},{"key":"key2022030820373006100_b44","unstructured":"Shirattudin, N., Hassan, S. and Landoni, M. (2003), \u201cA usability study for promoting eContent in higher education\u201d, Educational Technology & Society, Vol. 6 No. 4, pp. 112\u201024."},{"key":"key2022030820373006100_b45","doi-asserted-by":"crossref","unstructured":"Smith, D., Menon, S. and Sivakumar, K. (2005), \u201cOnline peer and editorial recommendation, trust, and choice in virtual markets\u201d, Journal of Interactive Marketing, Vol. 19 No. 3, pp. 15\u201037.","DOI":"10.1002\/dir.20041"},{"key":"key2022030820373006100_b46","doi-asserted-by":"crossref","unstructured":"Stone, R.N. and Gronhaug, K. (1993), \u201cPerceived risk: further considerations for the marketing discipline\u201d, European Journal of Marketing, Vol. 27 No. 3, pp. 39\u201050.","DOI":"10.1108\/03090569310026637"},{"key":"key2022030820373006100_b48","doi-asserted-by":"crossref","unstructured":"\u0160ven\u010dionyt\u0119, V. (2005), \u201cAdvertising on library web sites: comparing library web sites in Europe and the USA\u201d, International Journal of Libraries and Information Services, Vol. 55 No. 4, pp. 198\u2010205.","DOI":"10.1515\/LIBR.2005.198"},{"key":"key2022030820373006100_b49","doi-asserted-by":"crossref","unstructured":"Tan, S.J. (1999), \u201cStrategies for reducing consumers' risk aversion in internet shopping\u201d, Journal of Consumer Marketing, Vol. 16 No. 2, pp. 163\u201080.","DOI":"10.1108\/07363769910260515"},{"key":"key2022030820373006100_b50","doi-asserted-by":"crossref","unstructured":"Wilson, R., Landoni, M. and Gibb, F. (2002), \u201cA user\u2010centred approach to e\u2010book design\u201d, The Electronic Library, Vol. 20 No. 4, pp. 322\u201030.","DOI":"10.1108\/02640470210438865"},{"key":"key2022030820373006100_b51","doi-asserted-by":"crossref","unstructured":"Yeung, R.M.W. and Yee, W.M.S. (2003), \u201cRisk reduction: an insight from the UK poultry industry\u201d, Nutrition & Food Science, Vol. 33 No. 5, pp. 219\u201029.","DOI":"10.1108\/00346650310499749"},{"key":"key2022030820373006100_frg1","doi-asserted-by":"crossref","unstructured":"Su, S.F. (2005), \u201cDesirable search features of web\u2010based scholarly e\u2010book systems\u201d, The Electronic Library, Vol. 23 No. 1, pp. 64\u201071.","DOI":"10.1108\/02640470510582745"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02640471011093534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471011093534\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471011093534\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:42:46Z","timestamp":1753400566000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/28\/6\/844-857\/85435"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,16]]},"references-count":51,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,11,16]]}},"alternative-id":["10.1108\/02640471011093534"],"URL":"https:\/\/doi.org\/10.1108\/02640471011093534","relation":{},"ISSN":["0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2010,11,16]]}}}