{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:54:57Z","timestamp":1767650097657,"version":"3.41.2"},"reference-count":76,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5,10]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>Online knowledge communities make great contributions to global knowledge sharing and innovation. Resource tagging approaches have been widely adopted in such communities to describe, annotate and organize knowledge resources mainly through users\u2019 participation. However, it is unclear what causes the adoption of a particular resource tagging approach. The purpose of this paper is to identify factors that drive users to use a hybrid social tagging approach.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>Technology acceptance model and social cognitive theory are adopted to support an integrated model proposed in this paper. Zhihu, one of the most popular online knowledge communities in China, is taken as the survey context. A survey was conducted with a questionnaire and collected data were analyzed through structural equation model.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>A new hybrid social resource tagging approach was refined and described. The empirical results revealed that self-efficacy, perceived usefulness (PU) and perceived ease of use exert positive effect on users\u2019 attitude. Moreover, social influence, PU and attitude impact significantly on users\u2019 intention to use a hybrid social resource tagging approach.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>Theoretically, this study enriches the type of resource tagging approaches and recognizes factors influencing user adoption to use it. Regarding the practical parts, the results provide online information system providers and designers with referential strategies to improve the performance of the current tagging approaches and promote them.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/ajim-09-2018-0212","type":"journal-article","created":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T10:21:50Z","timestamp":1554114110000},"page":"155-175","source":"Crossref","is-referenced-by-count":13,"title":["User adoption of a hybrid social tagging approach in an online knowledge community"],"prefix":"10.1108","volume":"71","author":[{"given":"Chunxiu","family":"Qin","sequence":"first","affiliation":[{"name":"Xidian University School of Economics and Management, , Xian,","place":["China"]}]},{"given":"Yaxi","family":"Liu","sequence":"additional","affiliation":[{"name":"Xidian University School of Economics and Management, , Xian,","place":["China"]}]},{"given":"Jian","family":"Mou","sequence":"additional","affiliation":[{"name":"Xidian University School of Economics and Management, , Xian,","place":["China"]}]},{"given":"Jiangping","family":"Chen","sequence":"additional","affiliation":[{"name":"University of North Texas Department of Information Science, , Denton, Texas,","place":["USA"]}]}],"member":"140","published-online":{"date-parts":[[2019,4,1]]},"reference":[{"issue":"5","key":"2025072816191483800_ref001","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.ijinfomgt.2017.03.008","article-title":"The adoption of M-government services from the user\u2019s perspectives: empirical evidence from the United Arab Emirates","volume":"37","author":"Ahmad","year":"2017","journal-title":"International Journal of Information Management"},{"issue":"2","key":"2025072816191483800_ref002","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"volume-title":"Understanding Attitudes and Predicting Social Behavior","year":"1980","author":"Ajzen","key":"2025072816191483800_ref003"},{"issue":"3","key":"2025072816191483800_ref004","doi-asserted-by":"crossref","first-page":"57","DOI":"10.22452\/mjlis.vol21no3.4","article-title":"Students\u2019 adoption of Twitter as an information source: an exploratory study using the technology acceptance model","volume":"21","author":"Al-Daihani","year":"2016","journal-title":"Malaysian Journal of Library and Information Science"},{"issue":"6","key":"2025072816191483800_ref005","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1108\/AJIM-04-2017-0088","article-title":"The acceptance of corporate wiki use for knowledge diffusion purposes","volume":"69","author":"Alqahtani","year":"2017","journal-title":"Aslib Journal of Information Management"},{"issue":"2","key":"2025072816191483800_ref006","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.technovation.2008.07.004","article-title":"An investigation into the acceptance of online banking in Saudi Arabia","volume":"29","author":"Al-Somali","year":"2009","journal-title":"Technovation"},{"issue":"4","key":"2025072816191483800_ref007","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1037\/0278-6133.25.4.510","article-title":"Social-cognitive determinants of physical activity: the influence of social support, self-efficacy, outcome expectations, and self-regulation among participants in a church-based health promotion study","volume":"25","author":"Anderson","year":"2006","journal-title":"Health Psychology"},{"issue":"3","key":"2025072816191483800_ref008","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","article-title":"Structural equation modeling in practice: a review and recommended two-step approach","volume":"103","author":"Anderson","year":"1988","journal-title":"Psychological Bulletin"},{"issue":"4","key":"2025072816191483800_ref009","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10799-016-0270-8","article-title":"Customers perspectives on adoption of cloud computing in banking sector","volume":"18","author":"Asadi","year":"2016","journal-title":"Information Technology and Management"},{"issue":"2","key":"2025072816191483800_ref010","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/s12528-015-9095-4","article-title":"Assuring graduate competency: a technology acceptance model for course guide tools","volume":"27","author":"Atif","year":"2015","journal-title":"Journal of Computing in Higher Education"},{"issue":"3","key":"2025072816191483800_ref011","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1177\/002224378101800312","article-title":"Evaluating structural equation models with unobservable variables and measurement error: a comment","volume":"18","author":"Bagozzi","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"2025072816191483800_ref012","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","article-title":"On the evaluation of structural equation models","volume":"16","author":"Bagozzi","year":"1988","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"2","key":"2025072816191483800_ref013","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","article-title":"Self-efficacy: toward a unifying theory of behavioral change","volume":"84","author":"Bandura","year":"1977","journal-title":"Psychological Review"},{"issue":"2","key":"2025072816191483800_ref014","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1037\/0003-066X.37.2.122","article-title":"Self-efficacy mechanism in human agency","volume":"37","author":"Bandura","year":"1982","journal-title":"American Psychologist"},{"volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","year":"1986","author":"Bandura","key":"2025072816191483800_ref015"},{"key":"2025072816191483800_ref016","first-page":"121","volume-title":"Media Effects: Advances in Theory and research","author":"Bandura","year":"2001"},{"issue":"2","key":"2025072816191483800_ref017","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","article-title":"Trust and risk in e-government adoption","volume":"17","author":"B\u00e9langer","year":"2008","journal-title":"Journal of Strategic Information Systems"},{"issue":"3","key":"2025072816191483800_ref018","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1037\/0033-2909.88.3.588","article-title":"Significance tests and goodness of fit in the analysis of covariance structures","volume":"88","author":"Bentler","year":"1988","journal-title":"Psychological Bulletin"},{"issue":"2","key":"2025072816191483800_ref019","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1177\/0049124192021002005","article-title":"Alternative ways of assessing model fit","volume":"21","author":"Browne","year":"1992","journal-title":"Sociological Methods & Research"},{"volume-title":"Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming","year":"2010","author":"Byrne","key":"2025072816191483800_ref020"},{"issue":"7","key":"2025072816191483800_ref021","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1002\/asi.24013","article-title":"The role of online communities in reducing urban\u2013rural health disparities in China","volume":"69","author":"Cao","year":"2018","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"2025072816191483800_ref022","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-12035-0_4","article-title":"Social cognitive theory in IS research \u2013 literature review, criticism, and research Agenda","volume":"54","author":"Carillo","year":"2010","journal-title":"Communications in Computer and Information Science"},{"issue":"4","key":"2025072816191483800_ref023","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11628-013-0210-1","article-title":"Antecedents of intention to use CUSS system: moderating effects of self-efficacy","volume":"8","author":"Chen","year":"2014","journal-title":"Service Business"},{"issue":"2","key":"2025072816191483800_ref024","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1108\/AJIM-06-2017-0149","article-title":"Comparing the web and mobile platforms of a social QandA service from the user\u2019s perspective","volume":"70","author":"Chen","year":"2018","journal-title":"Aslib Journal of Information Management"},{"issue":"2","key":"2025072816191483800_ref025","doi-asserted-by":"crossref","first-page":"237","DOI":"10.2307\/249690","article-title":"On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution","volume":"19","author":"Chin","year":"1995","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025072816191483800_ref026","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2307\/249749","article-title":"Social cognitive theory and individual reactions to computing technology: a longitudinal study","volume":"23","author":"Compeau","year":"1999","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025072816191483800_ref027","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: development of a measure and initial test","volume":"19","author":"Compeau","year":"1995","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025072816191483800_ref028","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Quarterly"},{"issue":"8","key":"2025072816191483800_ref029","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: a comparison of two theoretical models","volume":"35","author":"Davis","year":"1989","journal-title":"Management Science"},{"key":"2025072816191483800_ref030","first-page":"1","volume-title":"Common Method Variance Techniques","author":"Eichhorn","year":"2014"},{"issue":"6","key":"2025072816191483800_ref031","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","article-title":"E-commerce: the role of familiarity and trust","volume":"28","author":"Gefen","year":"2000","journal-title":"Omega"},{"issue":"2","key":"2025072816191483800_ref032","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1177\/0165551506062337","article-title":"Usage patterns of collaborative tagging approaches","volume":"32","author":"Golder","year":"2006","journal-title":"Journal of Information Science"},{"issue":"1","key":"2025072816191483800_ref033","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.websem.2007.11.011","article-title":"Collective knowledge systems: where the social web meets the semantic web","volume":"6","author":"Gruber","year":"2008","journal-title":"Journal of Web Semantics"},{"volume-title":"Multivariate Data Analysis","year":"1998","author":"Hair","key":"2025072816191483800_ref034"},{"key":"2025072816191483800_ref035","unstructured":"Hayman, S. and Lothian, N. (2007), \u201cTaxonomy directed folksonomies: integrating user tagging and controlled vocabularies for Australian education networks\u201d, paper presented at the World Library and Information Congress: Ifla General Conference and Council."},{"volume-title":"The Structural Equation Modeling Approach: Basic Concepts and Fundamental Issues","year":"1995","author":"Hoyle","key":"2025072816191483800_ref036"},{"issue":"1","key":"2025072816191483800_ref037","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.elerap.2010.06.002","article-title":"Law enforcement officers\u2019 acceptance of advanced e-government technology: a survey study of coplink mobile","volume":"10","author":"Hu","year":"2011","journal-title":"Electronic Commerce Research and Applications"},{"issue":"4","key":"2025072816191483800_ref038","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.ipm.2011.07.004","article-title":"Investigating effectiveness and user acceptance of semantic social tagging for knowledge sharing","volume":"48","author":"Huang","year":"2012","journal-title":"Information Processing and Management"},{"issue":"6","key":"2025072816191483800_ref039","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/0305-0483(95)00035-6","article-title":"The effects of self-efficacy on computer usage","volume":"23","author":"Igbaria","year":"1995","journal-title":"Omega"},{"issue":"2","key":"2025072816191483800_ref040","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1108\/AJIM-09-2017-0207","article-title":"Active users\u2019 knowledge-sharing continuance on social Q&A sites: motivators and hygiene factors","volume":"70","author":"Kang","year":"2018","journal-title":"Aslib Journal of Information Management"},{"issue":"5","key":"2025072816191483800_ref041","doi-asserted-by":"crossref","first-page":"6049","DOI":"10.1016\/j.eswa.2010.11.014","article-title":"TaxoFolk: a hybrid taxonomy\u2013folksonomy structure for knowledge classification and navigation","volume":"38","author":"Kiu","year":"2011","journal-title":"Expert Systems with Applications"},{"key":"2025072816191483800_ref042","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.indmarman.2016.01.001","article-title":"Usability perspective on social media sites\u2019 adoption in the B2B context","volume":"54","author":"Lacka","year":"2016","journal-title":"Industrial Marketing Management"},{"article-title":"Using WordNet to turn a folksonomy into a hierarchy of concepts","year":"2007","author":"Laniado","key":"2025072816191483800_ref043"},{"issue":"3","key":"2025072816191483800_ref044","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/S0167-9236(00)00076-2","article-title":"The technology acceptance model and the world wide web","volume":"29","author":"Lederer","year":"2000","journal-title":"Decision Support Systems"},{"issue":"3","key":"2025072816191483800_ref045","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0378-7206(01)00143-4","article-title":"Why do people use information technology?: a critical review of the technology acceptance model","volume":"40","author":"Legris","year":"2003","journal-title":"Information and Management"},{"key":"2025072816191483800_ref046","unstructured":"Lemieux, S.\n           (2009), \u201cHybrid approaches to taxonomy and folksonomy\u201d, paper presented at the Semantic Technology."},{"key":"2025072816191483800_ref047","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2014.07.050","volume-title":"Design and Application of Augmented Reality Query-Answering System in Mobile Phone Information Navigation","author":"Lin","year":"2015"},{"issue":"6","key":"2025072816191483800_ref048","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.im.2008.06.004","article-title":"Understanding knowledge management system usage antecedents: an integration of social cognitive theory and task technology fit","volume":"45","author":"Lin","year":"2008","journal-title":"Information and Management"},{"issue":"6","key":"2025072816191483800_ref049","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.im.2008.05.001","article-title":"An assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models","volume":"45","author":"L\u00f3pez-Nicol\u00e1s","year":"2008","journal-title":"Information and Management"},{"issue":"1","key":"2025072816191483800_ref050","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1108\/AJIM-05-2017-0133","article-title":"A document expansion framework for tag-based image retrieval","volume":"70","author":"Lu","year":"2018","journal-title":"Aslib Journal of Information Management"},{"key":"2025072816191483800_ref051","doi-asserted-by":"crossref","DOI":"10.1007\/11574620_38","article-title":"Ontologies are us: a unified model of social networks and semantics","author":"Mika","year":"2005"},{"key":"2025072816191483800_ref052","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.accinf.2017.09.001","article-title":"Does decentralized decision making increase company performance through its information technology infrastructure investment?","volume":"27","author":"Mohamad","year":"2017","journal-title":"International Journal of Accounting Information Systems"},{"issue":"2","key":"2025072816191483800_ref053","first-page":"1","article-title":"Understanding trust and perceived usefulness in the consumer acceptance of an e-service: a longitudinal investigation","volume":"36","author":"Mou","year":"2016","journal-title":"Behaviour & Information Technology"},{"article-title":"Browsing system for weblog articles based on automated folksonomy","year":"2006","author":"Ohkura","key":"2025072816191483800_ref054"},{"issue":"2","key":"2025072816191483800_ref055","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1108\/00330331311313762","article-title":"User acceptance of long-term evolution (LTE) services: an application of extended technology acceptance model","volume":"47","author":"Park","year":"2013","journal-title":"Program-electronic Library and Information Systems"},{"issue":"1","key":"2025072816191483800_ref056","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online environments: a principal-agent perspective","volume":"31","author":"Pavlou","year":"2007","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025072816191483800_ref057","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1080\/01449290410001669978","article-title":"Senior government executives\u2019 use of the internet: a Bruneian scenario","volume":"23","author":"Pijpers","year":"2004","journal-title":"Behaviour and Information Technology"},{"issue":"5","key":"2025072816191483800_ref058","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"2025072816191483800_ref059","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.giq.2015.02.002","article-title":"Citizen\u2019s adoption of an e-government system: Validating extended social cognitive theory (SCT)","volume":"32","author":"Rana","year":"2015","journal-title":"Government Information Quarterly"},{"key":"2025072816191483800_ref060","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.chb.2016.09.009","article-title":"Exploring students\u2019 awareness and perceptions: influencing factors and individual differences driving m-learning adoption","volume":"65","author":"Sabah","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"2025072816191483800_ref061","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.im.2008.06.002","article-title":"Examining the effects of information system characteristics and perceived usefulness on post adoption usage of information systems","volume":"45","author":"Saeed","year":"2008","journal-title":"Information and Management"},{"key":"2025072816191483800_ref062","first-page":"399","volume-title":"Latent Variables Analysis: Applications for Developmental Research","author":"Satorra","year":"1994"},{"issue":"4","key":"2025072816191483800_ref063","doi-asserted-by":"crossref","first-page":"517","DOI":"10.2307\/249590","article-title":"Re-examining perceived ease of use and usefulness: a confirmatory factor analysis","volume":"17","author":"Segars","year":"1993","journal-title":"MIS Quarterly"},{"key":"2025072816191483800_ref064","first-page":"61","article-title":"\u2018Tagsonomy\u2019: easy Access to web sites through a combination of taxonomy and folksonomy","author":"Sommaruga","year":"2011"},{"key":"2025072816191483800_ref065","first-page":"1","article-title":"Towards a framework for socially influencing systems: meta-analysis of four PLS-SEM based studies","volume":"9072","author":"Stibe","year":"2015","journal-title":"Social Science Electronic Publishing"},{"issue":"4","key":"2025072816191483800_ref066","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1108\/02635571011039052","article-title":"Knowledge sharing behaviour and its predictors","volume":"110","author":"Tohidinia","year":"2010","journal-title":"Industrial Management and Data Systems"},{"issue":"12","key":"2025072816191483800_ref067","doi-asserted-by":"crossref","first-page":"8479","DOI":"10.1016\/j.eswa.2010.05.029","article-title":"Programmer perceptions of knowledge-sharing behavior under social cognitive theory","volume":"37","author":"Tsai","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"2025072816191483800_ref068","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.ipm.2009.05.009","article-title":"A concept\u2013relationship acquisition and inference approach for hierarchical taxonomy construction from tags","volume":"46","author":"Tsui","year":"2010","journal-title":"Information Processing and Management"},{"issue":"3","key":"2025072816191483800_ref069","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"6","key":"2025072816191483800_ref070","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1111\/j.1365-2575.2011.00373.x","article-title":"Extending the two-stage information systems continuance model: incorporating UTAUT predictors and the role of context","volume":"21","author":"Venkatesh","year":"2011","journal-title":"Information Systems Journal"},{"issue":"6","key":"2025072816191483800_ref071","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.ijinfomgt.2011.02.007","article-title":"Exploring decisive factors affecting an organization\u2019s SaaS adoption: a case study","volume":"31","author":"Wu","year":"2011","journal-title":"International Journal of Information Management"},{"issue":"1","key":"2025072816191483800_ref072","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.elerap.2014.11.002","article-title":"Understanding knowledge contribution in online knowledge communities: a model of community support and forum leader support","volume":"14","author":"Ye","year":"2015","journal-title":"Electronic Commerce Research and Applications"},{"issue":"5","key":"2025072816191483800_ref073","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1016\/j.chb.2010.02.005","article-title":"Determinants of users\u2019 intention to adopt wireless technology: an empirical study by integrating TTF with TAM","volume":"26","author":"Yen","year":"2010","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"2025072816191483800_ref074","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.lisr.2017.07.008","article-title":"Social scientists\u2019 data reuse behaviors: Exploring the roles of attitudinal beliefs, attitudes, norms, and data repositories","volume":"39","author":"Yoon","year":"2017","journal-title":"Library and Information Science Research"},{"article-title":"Familial influence on self-efficacy: exploring the relationship between perceived parenting style, current social support, and self-efficacy beliefs in a sample of nontraditonal college students","year":"2005","author":"Burke","key":"2025072816191483800_ref075"},{"issue":"3","key":"2025072816191483800_ref076","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1177\/002224378101800313","article-title":"Structural equation models with unobservable variables and measurement error: algebra and statistics","volume":"18","author":"Fornell","year":"1981","journal-title":"Journal of Marketing Research"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-09-2018-0212\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ajim\/article-pdf\/71\/2\/155\/217018\/ajim-09-2018-0212.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ajim\/article-pdf\/71\/2\/155\/217018\/ajim-09-2018-0212.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T20:19:25Z","timestamp":1753733965000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ajim\/article\/71\/2\/155\/37097\/User-adoption-of-a-hybrid-social-tagging-approach"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":76,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5,10]]}},"URL":"https:\/\/doi.org\/10.1108\/ajim-09-2018-0212","relation":{},"ISSN":["2050-3806","2050-3814"],"issn-type":[{"type":"print","value":"2050-3806"},{"type":"electronic","value":"2050-3814"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}