{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T14:54:54Z","timestamp":1777647294504,"version":"3.51.4"},"reference-count":42,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to identify the factors affecting continuance usage of mobile payment. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Based on the valid responses collected from a survey questionnaire, structural equation modeling (SEM) technology was employed to examine the research model. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The results indicated that performance expectancy, trust in mobile payment and flow affect continuance usage. Among them, flow has a relatively larger effect. In addition, system quality has strong effects on performance expectancy and flow. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 This research is conducted in China, where mobile internet is still in its early stage. Thus, the results need to be generalized to other countries that have developed mobile internet. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 Extant research has mainly focussed on the effects of instrumental beliefs such as perceived usefulness on mobile payment user behavior, and has seldom considered the effect of flow experience. This research tries to fill the gap.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/imds-02-2014-0068","type":"journal-article","created":{"date-parts":[[2014,7,10]],"date-time":"2014-07-10T20:08:44Z","timestamp":1405022924000},"page":"936-948","source":"Crossref","is-referenced-by-count":116,"title":["Understanding the determinants of mobile payment continuance usage"],"prefix":"10.1108","volume":"114","author":[{"given":"Tao","family":"Zhou","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020123105064091300_b1","doi-asserted-by":"crossref","unstructured":"Anderson, J.C.\n                and \n                  Gerbing, D.W.\n                (1988), \u201cStructural equation modeling in practice: a review and recommended two-step approach\u201d, Psychological bulletin, Vol. 103 No. 3, pp. 411-423.","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"key2020123105064091300_b2","doi-asserted-by":"crossref","unstructured":"Beldad, A.\n               , \n                  de Jong, M.\n                and \n                  Steehouder, M.\n                (2010), \u201cHow shall I trust the faceless and the intangible? A literature review on the antecedents of online trust\u201d, Computers in Human Behavior, Vol. 26 No. 5, pp. 857-869.","DOI":"10.1016\/j.chb.2010.03.013"},{"key":"key2020123105064091300_b3","doi-asserted-by":"crossref","unstructured":"Bhattacherjee, A.\n                (2001), \u201cUnderstanding information systems continuance: an expectation-confirmation model\u201d, MIS Quarterly, Vol. 25 No. 3, pp. 351-370.","DOI":"10.2307\/3250921"},{"key":"key2020123105064091300_b4","doi-asserted-by":"crossref","unstructured":"Carlson, J.\n                and \n                  O'Cass, A.\n                (2011), \u201cCreating commercially compelling website-service encounters: an examination of the effect of website-service interface performance components on flow experiences\u201d, Electronic Markets, Vol. 21 No. 4, pp. 237-253.","DOI":"10.1007\/s12525-011-0073-z"},{"key":"key2020123105064091300_b5","doi-asserted-by":"crossref","unstructured":"Chandra, S.\n               , \n                  Srivastava, S.C.\n                and \n                  Theng, Y.-L.\n                (2010), \u201cEvaluating the role of trust in consumer adoption of mobile payment systems: an empirical analysis\u201d, Communications of the Association for Information Systems, Vol. 27 No. 29, pp. 561-588.","DOI":"10.17705\/1CAIS.02729"},{"key":"key2020123105064091300_b6","doi-asserted-by":"crossref","unstructured":"Chen, L.\n               , \n                  Meservy, T.O.\n                and \n                  Gillenson, M.\n                (2012), \u201cUnderstanding information systems continuance for information-oriented mobile applications\u201d, Communications of AIS, Vol. 30, pp. 127-146.","DOI":"10.17705\/1CAIS.03009"},{"key":"key2020123105064091300_b7","unstructured":"CNNIC\n                (2014), 33rd Statistical Survey Report on the Internet Development in China, China Internet Network Information Center, Beijing."},{"key":"key2020123105064091300_b8","doi-asserted-by":"crossref","unstructured":"Csikszentmihalyi, M.\n                and \n                  Csikszentmihalyi, I.S.\n                (1988), Optimal Experience: Psychological Studies of Flow in Consciousness, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511621956"},{"key":"key2020123105064091300_b9","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n               , \n                  Bagozzi, R.P.\n                and \n                  Warshaw, P.R.\n                (1992), \u201cExtrinsic and intrinsic motivation to use computers in the workplace\u201d, Journal of Applied Social Psychology, Vol. 22 No. 14, pp. 1111-1132.","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"key2020123105064091300_b10","doi-asserted-by":"crossref","unstructured":"Gefen, D.\n                (2003), \u201cAssessing unidimensionality through LISREL: an explanation and example\u201d, Communications of the AIS, Vol. 12 No. 1, pp. 23-47.","DOI":"10.17705\/1CAIS.01202"},{"key":"key2020123105064091300_b11","doi-asserted-by":"crossref","unstructured":"Gefen, D.\n               , \n                  Karahanna, E.\n                and \n                  Straub, D.W.\n                (2003), \u201cTrust and TAM in online shopping: an integrated model\u201d, MIS Quarterly, Vol. 27 No. 1, pp. 51-90.","DOI":"10.2307\/30036519"},{"key":"key2020123105064091300_b12","doi-asserted-by":"crossref","unstructured":"Gefen, D.\n               , \n                  Straub, D.W.\n                and \n                  Boudreau, M.C.\n                (2000), \u201cStructural equation modeling and regression: guidelines for research practice\u201d, Communications of the Association for Information Systems, Vol. 4 No. 7, pp. 1-70.","DOI":"10.17705\/1CAIS.00407"},{"key":"key2020123105064091300_b13","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L.\n                and \n                  Novak, T.P.\n                (1996), \u201cMarketing in hypermedia computer-mediated environments: conceptual foundations\u201d, Journal of Marketing, Vol. 60 No. 3, pp. 50-68.","DOI":"10.1177\/002224299606000304"},{"key":"key2020123105064091300_b14","doi-asserted-by":"crossref","unstructured":"Jung, Y.\n               , \n                  Perez-Mira, B.\n                and \n                  Wiley-Patton, S.\n                (2009), \u201cConsumer adoption of mobile TV: examining psychological flow and media content\u201d, Computers in Human Behavior, Vol. 25 No. 1, pp. 123-129.","DOI":"10.1016\/j.chb.2008.07.011"},{"key":"key2020123105064091300_b15","doi-asserted-by":"crossref","unstructured":"Kim, C.\n               , \n                  Mirusmonov, M.\n                and \n                  Lee, I.\n                (2010), \u201cAn empirical examination of factors influencing the intention to use mobile payment\u201d, Computers in Human Behavior, Vol. 26 No. 3, pp. 310-322.","DOI":"10.1016\/j.chb.2009.10.013"},{"key":"key2020123105064091300_b16","doi-asserted-by":"crossref","unstructured":"Kim, D.J.\n               , \n                  Ferrin, D.L.\n                and \n                  Rao, H.R.\n                (2008), \u201cA trust-based consumer decision making model in electronic commerce: the role of trust, perceived risk, and their antecedents\u201d, Decision Support Systems, Vol. 44 No. 2, pp. 544-564.","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"key2020123105064091300_b17","unstructured":"Kim, G.\n               , \n                  Choe, D.\n               , \n                  Lee, J.\n               , \n                  Park, S.\n               , \n                  Jun, S.\n                and \n                  Jang, D.\n                (2013), \u201cThe technology acceptance model for playing console game in Korea\u201d, International Journal of Computer Science & Network Security, Vol. 13 No. 5, pp. 9-12."},{"key":"key2020123105064091300_b18","doi-asserted-by":"crossref","unstructured":"Kim, G.\n               , \n                  Shin, B.\n                and \n                  Lee, H.G.\n                (2009), \u201cUnderstanding dynamics between initial trust and usage intentions of mobile banking\u201d, Information Systems Journal, Vol. 19 No. 3, pp. 283-311.","DOI":"10.1111\/j.1365-2575.2007.00269.x"},{"key":"key2020123105064091300_b19","doi-asserted-by":"crossref","unstructured":"Kim, H.W.\n               , \n                  Xu, Y.\n                and \n                  Koh, J.\n                (2004), \u201cA comparison of online trust building factors between potential customers and repeat customers\u201d, Journal of the Association for Information Systems, Vol. 5 No. 10, pp. 392-420.","DOI":"10.17705\/1jais.00056"},{"key":"key2020123105064091300_b20","doi-asserted-by":"crossref","unstructured":"Kuan, H.-H.\n                and \n                  Bock, G.-W.\n                (2007), \u201cTrust transference in brick and click retailers: an investigation of the before-online-visit phase\u201d, Information & Management, Vol. 44 No. 2, pp. 175-187.","DOI":"10.1016\/j.im.2006.12.002"},{"key":"key2020123105064091300_b21","doi-asserted-by":"crossref","unstructured":"Lee, K.C.\n               , \n                  Chung, N.\n                and \n                  Lee, S.\n                (2011), \u201cExploring the influence of personal schema on trust transfer and switching costs in brick-and-click bookstores\u201d, Information & Management, Vol. 48 No. 8, pp. 364-370.","DOI":"10.1016\/j.im.2011.09.002"},{"key":"key2020123105064091300_b22","doi-asserted-by":"crossref","unstructured":"Lee, K.C.\n               , \n                  Kang, I.W.\n                and \n                  McKnight, D.H.\n                (2007), \u201cTransfer from offline trust to key online perceptions: an empirical study\u201d, IEEE Transactions on Engineering Management, Vol. 54 No. 4, pp. 729-741.","DOI":"10.1109\/TEM.2007.906851"},{"key":"key2020123105064091300_b23","doi-asserted-by":"crossref","unstructured":"Li\u00e9bana-Cabanillas, F.J.\n               , \n                  S\u00e1nchez-Fern\u00e1ndez, J.\n                and \n                  Mu\u00f1oz-Leiva, F.\n                (2014), \u201cRole of gender on acceptance of mobile payment\u201d, Industrial Management & Data Systems, Vol. 114 No. 2, pp. 220-240.","DOI":"10.1108\/IMDS-03-2013-0137"},{"key":"key2020123105064091300_b24","doi-asserted-by":"crossref","unstructured":"Lu, Y.\n               , \n                  Yang, S.\n               , \n                  Chau, P.Y.K.\n                and \n                  Cao, Y.\n                (2011), \u201cDynamics between the trust transfer process and intention to use mobile payment services: a cross-environment perspective\u201d, Information & Management, Vol. 48 No. 8, pp. 393-403.","DOI":"10.1016\/j.im.2011.09.006"},{"key":"key2020123105064091300_b25","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K.\n               , \n                  Kim, S.S.\n                and \n                  Patil, A.\n                (2006), \u201cCommon method variance in IS research: a comparison of alternative approaches and a reanalysis of past research\u201d, Management Science, Vol. 52 No. 12, pp. 1865-1883.","DOI":"10.1287\/mnsc.1060.0597"},{"key":"key2020123105064091300_b26","doi-asserted-by":"crossref","unstructured":"Mallat, N.\n                (2007), \u201cExploring consumer adoption of mobile payments \u2013 a qualitative study\u201d, The Journal of Strategic Information Systems, Vol. 16 No. 4, pp. 413-432.","DOI":"10.1016\/j.jsis.2007.08.001"},{"key":"key2020123105064091300_b27","doi-asserted-by":"crossref","unstructured":"Mayer, R.C.\n               , \n                  Davis, J.H.\n                and \n                  Schoorman, F.D.\n                (1995), \u201cAn integrative model of organizational trust\u201d, The Academy of Management Review, Vol. 20 No. 3, pp. 709-734.","DOI":"10.5465\/amr.1995.9508080335"},{"key":"key2020123105064091300_b28","doi-asserted-by":"crossref","unstructured":"Nicolaou, A.I.\n                and \n                  McKnight, D.H.\n                (2006), \u201cPerceived information quality in data exchanges: effects on risk, trust, and intention to use\u201d, Information Systems Research, Vol. 17 No. 4, pp. 332-351.","DOI":"10.1287\/isre.1060.0103"},{"key":"key2020123105064091300_b29","unstructured":"Nunnally, J.C.\n                (1978), Psychometric Theory, McGraw-Hill, New York, NY."},{"key":"key2020123105064091300_b30","doi-asserted-by":"crossref","unstructured":"O'Cass, A.\n                and \n                  Carlson, J.\n                (2010), \u201cExamining the effects of website induced flow in professional sporting team websites\u201d, Internet Research, Vol. 20 No. 2, pp. 115-134.","DOI":"10.1108\/10662241011032209"},{"key":"key2020123105064091300_b31","doi-asserted-by":"crossref","unstructured":"Podsakoff, P.M.\n                and \n                  Organ, D.W.\n                (1986), \u201cSelf-reports in organizational research: problems and prospects\u201d, Journal of Management, Vol. 12 No. 4, pp. 531-544.","DOI":"10.1177\/014920638601200408"},{"key":"key2020123105064091300_b32","unstructured":"Reichheld, F.F.\n                and \n                  Schefter, P.\n                (2000), \u201cE-loyalty: your secret weapon on the Web\u201d, Harvard Business Review, Vol. 78 No. 4, pp. 105-113."},{"key":"key2020123105064091300_b33","doi-asserted-by":"crossref","unstructured":"Schierz, P.G.\n               , \n                  Schilke, O.\n                and \n                  Wirtz, B.W.\n                (2010), \u201cUnderstanding consumer acceptance of mobile payment services: an empirical analysis\u201d, Electronic Commerce Research and Applications, Vol. 9 No. 3, pp. 209-216.","DOI":"10.1016\/j.elerap.2009.07.005"},{"key":"key2020123105064091300_b34","doi-asserted-by":"crossref","unstructured":"Shin, D.H.\n                (2010), \u201cModeling the interaction of users and mobile payment system: conceptual framework\u201d, International Journal of Human-Computer Interaction, Vol. 26 No. 10, pp. 917-940.","DOI":"10.1080\/10447318.2010.502098"},{"key":"key2020123105064091300_b35","doi-asserted-by":"crossref","unstructured":"Song, J.\n                and \n                  Zahedi, F.M.\n                (2007), \u201cTrust in health infomediaries\u201d, Decision Support Systems, Vol. 43 No. 2, pp. 390-407.","DOI":"10.1016\/j.dss.2006.11.011"},{"key":"key2020123105064091300_b36","doi-asserted-by":"crossref","unstructured":"Straub, D.\n               , \n                  Boudreau, M.-C.\n                and \n                  Gefen, D.\n                (2004), \u201cValidation guidelines for IS positivist research\u201d, Communications of the Association for Information Systems, Vol. 13 No. 1, pp. 380-427.","DOI":"10.17705\/1CAIS.01324"},{"key":"key2020123105064091300_b37","doi-asserted-by":"crossref","unstructured":"Thatcher, J.B.\n               , \n                  McKnight, D.H.\n               , \n                  Baker, E.W.\n               , \n                  Arsal, R.E.\n                and \n                  Roberts, N.H.\n                (2011), \u201cThe role of trust in post-adoption IT exploration: an empirical examination of knowledge management systems\u201d, IEEE Transactions on Engineering Management, Vol. 58 No. 1, pp. 56-70.","DOI":"10.1109\/TEM.2009.2028320"},{"key":"key2020123105064091300_b38","doi-asserted-by":"crossref","unstructured":"Vance, A.\n               , \n                  Christophe, E.-D.-C.\n                and \n                  Straub, D.W.\n                (2008), \u201cExamining trust in information technology artifacts: the effects of system quality and culture\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 73-100.","DOI":"10.2753\/MIS0742-1222240403"},{"key":"key2020123105064091300_b39","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n               , \n                  Morris, M.G.\n               , \n                  Davis, G.B.\n                and \n                  Davis, F.D.\n                (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.","DOI":"10.2307\/30036540"},{"key":"key2020123105064091300_b40","doi-asserted-by":"crossref","unstructured":"Yoon, C.\n                (2009), \u201cThe effects of national culture values on consumer acceptance of e-commerce: online shoppers in China\u201d, Information & Management, Vol. 46 No. 5, pp. 294-301.","DOI":"10.1016\/j.im.2009.06.001"},{"key":"key2020123105064091300_b41","doi-asserted-by":"crossref","unstructured":"Zahedi, F.M.\n                and \n                  Song, J.\n                (2008), \u201cDynamics of trust revision: using health infomediaries\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 225-248.","DOI":"10.2753\/MIS0742-1222240409"},{"key":"key2020123105064091300_b42","doi-asserted-by":"crossref","unstructured":"Zhou, T.\n                (2013), \u201cUnderstanding continuance usage of mobile sites\u201d, Industrial Management & Data Systems, Vol. 113 No. 9, pp. 1286-1299.","DOI":"10.1108\/IMDS-01-2013-0001"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMDS-02-2014-0068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-02-2014-0068\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-02-2014-0068\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:51:13Z","timestamp":1753393873000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/114\/6\/936-948\/174331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,6,3]]}},"alternative-id":["10.1108\/IMDS-02-2014-0068"],"URL":"https:\/\/doi.org\/10.1108\/imds-02-2014-0068","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2014,6,3]]}}}