{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T12:50:37Z","timestamp":1772542237803,"version":"3.50.1"},"reference-count":58,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T00:00:00Z","timestamp":1506902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2017,10,2]]},"DOI":"10.1108\/intr-04-2016-0087","type":"journal-article","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T07:10:14Z","timestamp":1505200214000},"page":"1170-1189","source":"Crossref","is-referenced-by-count":32,"title":["Why do people switch mobile platforms? The moderating role of habit"],"prefix":"10.1108","volume":"27","author":[{"given":"Kuan-Yu","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Information Networking and System Administration, Ling Tung University, Taichung, Taiwan"}]},{"given":"Yi-Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Applied Foreign Languanges, Ling Tung University, Taichung, Taiwan"}]},{"given":"Hsuan-Yu Sheila","family":"Hsu","sequence":"additional","affiliation":[{"name":"Wenzhou University, Wenzhou, China"}]}],"member":"140","reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.78.1.53"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.06.013"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00111-7"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1002\/9781118619179"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2012.10.006"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2009.02.008"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.11.011"},{"key":"ref010","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","edition":"2"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.037"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.10.008"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1108\/10662241111158335"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-06-2016-0175"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.014"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0114"},{"key":"ref024","volume-title":"Multivariate Data Analysis","author":"Hair J.F.","year":"1998","edition":"5"},{"key":"ref025","volume-title":"Structural Equation Modeling with LISREL","author":"Hayduck L.A.","year":"1987"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.007"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.08.014"},{"issue":"4","key":"ref028","first-page":"289","volume":"30","author":"Hsu J.S.C.","year":"2014","journal-title":"Decision Support Systems"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.09.002"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1108\/00251741311326590"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.038"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.019"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.009"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.03.003"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.06.004"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.005"},{"issue":"1","key":"ref038","doi-asserted-by":"crossref","first-page":"65","DOI":"10.17705\/1jais.00030","volume":"4","author":"Limayem M.","year":"2003","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"ref039","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"Limayem M.","year":"2007","journal-title":"MIS Quarterly"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-10-2014-0241"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2014-0018"},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.01.006"},{"issue":"3","key":"ref043","first-page":"238","volume":"13","author":"Lu H.P.","year":"2012","journal-title":"Journal of Electronic Commerce Research"},{"key":"ref044","volume-title":"Psychometric Theory","author":"Nunnally J.C.","year":"1978"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.2307\/1252099"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2010.11.007"},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1145\/206476.206484"},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.05.004"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2014.063650"},{"key":"ref050","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2014.10.001"},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1080\/14783363.2014.912037"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.1108\/10610420410538050"},{"key":"ref053","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2016-0117"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0136"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2011.03.013"},{"key":"ref056","doi-asserted-by":"publisher","DOI":"10.2307\/249678"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.12.030"},{"key":"ref058","doi-asserted-by":"publisher","DOI":"10.1002\/mar.10014"},{"key":"ref059","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.2007.00732.x"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0127"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.2307\/1251446"},{"key":"ref061","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.11.008"},{"key":"ref062","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.10.034"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-04-2016-0087","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IntR-04-2016-0087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:35:39Z","timestamp":1753392939000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/27\/5\/1170-1189\/183334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,2]]},"references-count":58,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10,2]]}},"alternative-id":["10.1108\/IntR-04-2016-0087"],"URL":"https:\/\/doi.org\/10.1108\/intr-04-2016-0087","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2017,10,2]]}}}