{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:34:16Z","timestamp":1772120056310,"version":"3.50.1"},"reference-count":48,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T00:00:00Z","timestamp":1506902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2017,10,2]]},"DOI":"10.1108\/intr-07-2016-0200","type":"journal-article","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T07:10:14Z","timestamp":1505200214000},"page":"1227-1254","source":"Crossref","is-referenced-by-count":54,"title":["Integrated acceptance and sustainability evaluation of Internet of Medical Things"],"prefix":"10.1108","volume":"27","author":[{"given":"Donghee","family":"Shin","sequence":"first","affiliation":[{"name":"School of Media and Communication, Chung-Ang University, Seoul, Korea"}]},{"given":"Yujoing","family":"Hwang","sequence":"additional","affiliation":[{"name":"School of Accountancy and MIS, DePaul University, Chicago, Illinois, USA"},{"name":"College of International Studies, Kyung Hee University, Yongin-si, Republic of Korea"}]}],"member":"140","reference":[{"issue":"1","key":"ref001","first-page":"108","volume":"5","author":"Al-Mamary Y.H.","year":"2014","journal-title":"Journal of Business and Management Research"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2012.11.001"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2016.22.3.156"},{"key":"ref006","volume-title":"IAMOT 2015 Conference Proceedings","author":"Fanta G.","year":"2015"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.2307\/1251898"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1108\/APJML-06-2013-0061"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2015.9.11.31"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2012.049759"},{"key":"ref011","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach","author":"Hayes A.F.","year":"2013"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.06.009"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-11-2014-0295"},{"issue":"5","key":"ref014","first-page":"615","volume":"14","author":"Kilkki K.","year":"2008","journal-title":"Journal of Universal Computer Science"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0126"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0675"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2016.13"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.03.003"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2014-0173"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2014-0018"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.50"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1300\/J396v29n01_01"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.10.024"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-03-2014-0082"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20384"},{"issue":"1","key":"ref026","first-page":"25","volume":"157","author":"Petrakaki D.","year":"2010","journal-title":"Studies in Health Technology and Informatics"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v6i4.10546"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1108\/02656711311308394"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.05.004"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.05.001"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2014.063650"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2014.10.001"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1177277"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.02.006"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-12-2015-0334"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2012.03.003"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2010.08.002"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.007"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1136\/qshc.2010.042085"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.4018\/jitr.2012040101"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2013.845827"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.09.008"},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2007.00809.x"},{"key":"ref043","volume-title":"Proceedings of the 16th Pacific Asia Conference on Information Systems PACIS 2012","author":"Wang Z.","year":"2012"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2015-0015"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0140"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.5525"},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2012.01.004"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-07-2016-0200","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IntR-07-2016-0200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:36:17Z","timestamp":1753392977000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/27\/5\/1227-1254\/183360"}},"subtitle":["A dual-level analysis"],"short-title":[],"issued":{"date-parts":[[2017,10,2]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10,2]]}},"alternative-id":["10.1108\/IntR-07-2016-0200"],"URL":"https:\/\/doi.org\/10.1108\/intr-07-2016-0200","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2017,10,2]]}}}