{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:58:41Z","timestamp":1772042321399,"version":"3.50.1"},"reference-count":63,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T00:00:00Z","timestamp":1496620800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2017,6,5]]},"DOI":"10.1108\/intr-06-2016-0181","type":"journal-article","created":{"date-parts":[[2017,4,19]],"date-time":"2017-04-19T19:13:02Z","timestamp":1492629182000},"page":"520-537","source":"Crossref","is-referenced-by-count":85,"title":["How does media richness contribute to customer loyalty to mobile instant messaging?"],"prefix":"10.1108","volume":"27","author":[{"given":"Fan-Chen","family":"Tseng","sequence":"first","affiliation":[]},{"given":"T.C.E.","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ching-I","family":"Teng","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.04.005"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2010.2046082"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1002\/mar.10063"},{"key":"ref006","first-page":"360","volume":"14","author":"Bagdoniene L.","year":"2015","journal-title":"Economics and Management"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.12.001"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.2307\/257090"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.1057\/jibs.2009.88"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.048"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2014-0006"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.32.5.554"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.066"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1108\/10662241311313330"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.10.001"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415180104"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1177\/0893318907313712"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-11-2014-0331"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0202"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-11-2014-0295"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2012-0133"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1108\/13612021211203041"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045754"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.4018\/ijec.2015100101"},{"issue":"7","key":"ref028","doi-asserted-by":"crossref","first-page":"546","DOI":"10.17705\/1jais.00302","volume":"13","author":"Kock N.","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.11.008"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211214539"},{"issue":"1","key":"ref031","first-page":"65","volume":"17","author":"Liao G.Y.","year":"2016","journal-title":"Journal of Electronic Commerce Research"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2005.08.001"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0472"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2014-0018"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.11.002"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0134"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.064"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.026"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"issue":"4","key":"ref041","first-page":"105","volume":"78","author":"Reichheld F.F.","year":"2000","journal-title":"Harvard Business Review"},{"key":"ref042","volume-title":"The Mobile Mind Shift: Engineer Your Business to Win in the Mobile Moment","author":"Schadler T.","year":"2014"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1177\/009365091018004003"},{"key":"ref044","volume-title":"Consumption Values and Market Choice","author":"Sheth J.N.","year":"1991"},{"key":"ref045","volume-title":"Contingencies of Reinforcement: A Theoretical Analysis","author":"Skinner B.F.","year":"1969"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1080\/02500167.2014.875481"},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679150101"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1207\/s15327663jcp1602_5"},{"key":"ref050","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4359(01)00041-0"},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-03-2014-0065"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.08.001"},{"key":"ref053","doi-asserted-by":"publisher","DOI":"10.1287\/serv.1120.0016"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2012.01586.x"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.1177\/009365087014005006"},{"key":"ref056","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2015.070057"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2016.1171976"},{"key":"ref058","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12141"},{"issue":"4","key":"ref059","doi-asserted-by":"crossref","first-page":"695","DOI":"10.2307\/25148660","volume":"28","author":"van der Heijden H.","year":"2004","journal-title":"MIS Quarterly"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2015.1029358"},{"key":"ref061","doi-asserted-by":"publisher","DOI":"10.1089\/109493101753235223"},{"key":"ref062","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-04-2014-0111"},{"key":"ref063","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20030"},{"key":"ref064","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-11-2012-0210"},{"key":"ref065","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.11.013"},{"key":"ref066","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2015.067963"},{"key":"ref067","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0093"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-06-2016-0181","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IntR-06-2016-0181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:36:06Z","timestamp":1753392966000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/27\/3\/520-537\/185807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,5]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6,5]]}},"alternative-id":["10.1108\/IntR-06-2016-0181"],"URL":"https:\/\/doi.org\/10.1108\/intr-06-2016-0181","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2017,6,5]]}}}