{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:03:55Z","timestamp":1774368235089,"version":"3.50.1"},"reference-count":117,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T00:00:00Z","timestamp":1496620800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2017,6,5]]},"DOI":"10.1108\/intr-06-2016-0175","type":"journal-article","created":{"date-parts":[[2017,4,19]],"date-time":"2017-04-19T19:13:02Z","timestamp":1492629182000},"page":"586-607","source":"Crossref","is-referenced-by-count":123,"title":["A trust-risk perspective on social commerce use: an examination of the biasing role of habit"],"prefix":"10.1108","volume":"27","author":[{"given":"Samira","family":"Farivar","sequence":"first","affiliation":[]},{"given":"Ofir","family":"Turel","sequence":"additional","affiliation":[]},{"given":"Yufei","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1093\/her\/12.3.363"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1998.tb01681.x"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0602_02"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.9.1471"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1145\/353360.353371"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0295"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.07.012"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1066445"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1145\/1247001.1247026"},{"key":"ref012","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.7.5.1110"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(84)90018-X"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.04.001"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0364"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1086\/209386"},{"issue":"2","key":"ref020","doi-asserted-by":"crossref","first-page":"407","DOI":"10.25300\/MISQ\/2014\/38.2.04","volume":"38","author":"Fang Y.","year":"2014","journal-title":"MIS Quarterly"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2003070101"},{"issue":"1","key":"ref023","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"Gefen D.","year":"2003","journal-title":"MIS Quarterly"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.659218"},{"key":"ref025","first-page":"459","volume-title":"Proceedings of the 2008 International Conference on Digital Government Research, Digital Government Society of North America","author":"Gil-Garcia J.R.","year":"2008"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1109\/3468.852434"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1086\/209388"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1086\/210179"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.05.012"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.12.005"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1016\/j.appet.2005.04.005"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2013-0007"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.065"},{"key":"ref036","volume-title":"ICIS 2010 Proceedings","author":"Huang K.-Y.","year":"2010"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2012.12.003"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-009-0007-1"},{"issue":"3","key":"ref039","first-page":"382","volume":"3","author":"Jacoby J.","year":"1972","journal-title":"Advances in Consumer Research"},{"issue":"2","key":"ref040","first-page":"1","volume":"5","author":"Jarvenpaa S.L.","year":"1999","journal-title":"Journal of Computer Mediated Communication"},{"issue":"2","key":"ref041","first-page":"31","volume":"6","author":"Keisidou E.","year":"2011","journal-title":"International Journal of Business Science and Applied Management"},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2012.12.002"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1108\/09590551011027122"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.11.006"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1080\/10548408.2013.751249"},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211271554"},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2010.06.004"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2010.01360.x"},{"issue":"1","key":"ref050","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/10864415.2001.11044227","volume":"6","author":"Lee M.K.O.","year":"2001","journal-title":"International Journal of Electronic Commerce"},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1108\/JSM-04-2014-0129"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.12.004"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160201"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160204"},{"key":"ref056","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2006.09.001"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-4223(03)00025-5"},{"key":"ref058","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.005"},{"key":"ref059","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2010.490956"},{"issue":"3","key":"ref060","doi-asserted-by":"crossref","first-page":"65","DOI":"10.17705\/1jais.00030","volume":"4","author":"Limayem M.","year":"2003","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"ref061","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"Limayem M.","year":"2007","journal-title":"MIS Quarterly"},{"key":"ref062","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00020-3"},{"issue":"3","key":"ref063","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"Mayer R.C.","year":"1995","journal-title":"The Academy of Management Review"},{"key":"ref064","doi-asserted-by":"publisher","DOI":"10.1108\/00251749210013050"},{"key":"ref065","doi-asserted-by":"publisher","DOI":"10.1108\/03090569910249229"},{"key":"ref066","doi-asserted-by":"publisher","DOI":"10.2307\/1252059"},{"key":"ref067","doi-asserted-by":"publisher","DOI":"10.2307\/1252200"},{"key":"ref068","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.002"},{"key":"ref069","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0103"},{"key":"ref070","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.3.191"},{"key":"ref071","doi-asserted-by":"publisher","DOI":"10.1037\/a0019596"},{"key":"ref072","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.1.54"},{"key":"ref073","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2010.501115"},{"key":"ref074","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20080"},{"issue":"3","key":"ref075","first-page":"69","volume":"7","author":"Pavlou P.A.","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"key":"ref076","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"ref077","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0065"},{"key":"ref078","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.12.010"},{"key":"ref079","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.045"},{"key":"ref080","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415170303"},{"key":"ref081","doi-asserted-by":"publisher","DOI":"10.2307\/3150856"},{"key":"ref083","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(70)90039-8"},{"key":"ref084","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2014.10.009"},{"key":"ref085","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.01.003"},{"key":"ref087","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984997"},{"key":"ref088","doi-asserted-by":"publisher","DOI":"10.1108\/14684520710832324"},{"key":"ref089","doi-asserted-by":"publisher","DOI":"10.1007\/BF00846149"},{"key":"ref090","first-page":"365","volume-title":"International Conference on Enterprise Information Systems, Springer","author":"Shen J.","year":"2011"},{"key":"ref091","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-01-2015-0019"},{"key":"ref092","doi-asserted-by":"publisher","DOI":"10.1086\/208894"},{"key":"ref093","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.692167"},{"key":"ref094","doi-asserted-by":"publisher","DOI":"10.2307\/270723"},{"key":"ref095","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.47.2.215"},{"key":"ref096","doi-asserted-by":"publisher","DOI":"10.1177\/0149206305277792"},{"key":"ref097","first-page":"459","volume-title":"Proceedings of the 20th International Conference on Information Systems","author":"Stewart K.J.","year":"1999"},{"key":"ref098","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.1.5.12810"},{"key":"ref099","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2016.06.002"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.19"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-016-0002-5"},{"issue":"2016","key":"ref101","first-page":"1","volume":"7","author":"Turel O.","year":"2016","journal-title":"Frontiers in Psychology"},{"issue":"2016","key":"ref102","first-page":"1","volume":"7","author":"Turel O.","year":"2016","journal-title":"Frontiers in Psychology"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2016.12.005"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645666"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.1"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1267529"},{"issue":"4","key":"ref105","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.2307\/41409972","volume":"35","author":"Turel O.","year":"2011","journal-title":"MIS Quarterly"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240405"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.2307\/2937956"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/BF00122574"},{"issue":"3","key":"ref109","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"MIS Quarterly"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000644"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1080\/14792779943000035"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0992(199709\/10)27:5<539::AID-EJSP831>3.0.CO;2-A"},{"issue":"5","key":"ref114","first-page":"105","volume":"31","author":"Wang C.","year":"2012","journal-title":"Communications of the Association for Information Systems"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/0148-2963(89)90002-7"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.114.4.843"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.6.1281"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2005.06.009"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0127"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.07.005"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.04.001"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2015-0149"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-06-2016-0175","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IntR-06-2016-0175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:36:06Z","timestamp":1753392966000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/27\/3\/586-607\/185828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,5]]},"references-count":117,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6,5]]}},"alternative-id":["10.1108\/IntR-06-2016-0175"],"URL":"https:\/\/doi.org\/10.1108\/intr-06-2016-0175","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2017,6,5]]}}}