{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:30:22Z","timestamp":1773455422954,"version":"3.50.1"},"reference-count":58,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T00:00:00Z","timestamp":1436140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7,6]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to examine the effect of network externality on users\u2019 continuance of mobile social network sites (SNS). <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Based on the 230 valid responses collected from a survey, structural equation modeling was employed to examine the research model. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The results indicated that network externality, which includes referent network size and perceived complementarity, has a significant effect on perceived usefulness and flow. Privacy concern affects perceived usefulness, flow and privacy risk. These three factors determine continued use. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 Previous research has focussed on the effects of motivations such as perceived value on user adoption of SNS. The effect of network externality on user continuance has seldom been examined. This research tries to fill the gap.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/prog-10-2014-0078","type":"journal-article","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T09:34:10Z","timestamp":1434965650000},"page":"289-304","source":"Crossref","is-referenced-by-count":23,"title":["The effect of network externality on mobile social network site continuance"],"prefix":"10.1108","volume":"49","author":[{"given":"Tao","family":"Zhou","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122300443215100_b1","doi-asserted-by":"crossref","unstructured":"Anderson, J.C.\n                and \n                  Gerbing, D.W.\n                (1988), \u201cStructural equation modeling in practice: a review and recommended two-step approach\u201d, \n                  Psychological Bulletin\n               , Vol. 103 No. 3, pp. 411-423.","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"key2020122300443215100_b2","doi-asserted-by":"crossref","unstructured":"Angst, C.M.\n                and \n                  Agarwal, R.\n                (2009), \u201cAdoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion\u201d, \n                  MIS Quarterly\n               , Vol. 33 No. 2, pp. 339-370.","DOI":"10.2307\/20650295"},{"key":"key2020122300443215100_b3","doi-asserted-by":"crossref","unstructured":"Animesh, A.\n               , \n                  Pinsonneault, A.\n               , \n                  Yang, S.B.\n                and \n                  Oh, W.\n                (2011), \u201cAn odyssey into virtual worlds: exploring the impacts of technological and spatial environments on intention to purchase virtual products\u201d, \n                  MIS Quarterly\n               , Vol. 35 No. 3, pp. 789-810.","DOI":"10.2307\/23042809"},{"key":"key2020122300443215100_b4","doi-asserted-by":"crossref","unstructured":"Bansal, G.\n               , \n                  Zahedi, F.M.\n                and \n                  Gefen, D.\n                (2010), \u201cThe impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online\u201d, \n                  Decision Support Systems\n               , Vol. 49 No. 2, pp. 138-150.","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"key2020122300443215100_b5","doi-asserted-by":"crossref","unstructured":"Bhattacherjee, A.\n                (2001), \u201cUnderstanding information systems continuance: an expectation-confirmation model\u201d, \n                  MIS Quarterly\n               , Vol. 25 No. 3, pp. 351-370.","DOI":"10.2307\/3250921"},{"key":"key2020122300443215100_b6","doi-asserted-by":"crossref","unstructured":"Chang, I.C.\n               , \n                  Liu, C.-C.\n                and \n                  Chen, K.\n                (2014), \u201cThe push, pull and mooring effects in virtual migration for social networking sites\u201d, \n                  Information Systems Journal\n               , Vol. 24 No. 4, pp. 323-346.","DOI":"10.1111\/isj.12030"},{"key":"key2020122300443215100_b7","unstructured":"CNNIC\n                (2015), \n                  35th Statistical Survey Report on the Internet Development in China\n               , China Internet Network Information Center, Beijing."},{"key":"key2020122300443215100_b8","unstructured":"Csikszentmihalyi, M.\n                (1975), \n                  Beyond Boredom and Anxiety\n               , Jossey-Bass, San Francisco, CA."},{"key":"key2020122300443215100_b9","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n                (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, \n                  MIS Quarterly\n               , Vol. 13 No. 3, pp. 319-340.","DOI":"10.2307\/249008"},{"key":"key2020122300443215100_b10","doi-asserted-by":"crossref","unstructured":"Dinev, T.\n                and \n                  Hart, P.\n                (2006), \u201cAn extended privacy calculus model for e-commerce transactions\u201d, \n                  Information Systems Research\n               , Vol. 17 No. 1, pp. 61-80.","DOI":"10.1287\/isre.1060.0080"},{"key":"key2020122300443215100_b11","doi-asserted-by":"crossref","unstructured":"Dinev, T.\n               , \n                  Xu, H.\n               , \n                  Smith, J.H.\n                and \n                  Hart, P.\n                (2013), \u201cInformation privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts\u201d, \n                  European Journal of Information Systems\n               , Vol. 22 No. 3, pp. 295-316.","DOI":"10.1057\/ejis.2012.23"},{"key":"key2020122300443215100_b12","doi-asserted-by":"crossref","unstructured":"Gefen, D.\n               , \n                  Straub, D.W.\n                and \n                  Boudreau, M.C.\n                (2000), \u201cStructural equation modeling and regression: guidelines for research practice\u201d, \n                  Communications of the Association for Information Systems\n               , Vol. 4 No. 7, pp. 1-70.","DOI":"10.17705\/1CAIS.00407"},{"key":"key2020122300443215100_b13","doi-asserted-by":"crossref","unstructured":"Goel, L.\n               , \n                  Johnson, N.\n               , \n                  Junglas, I.\n                and \n                  Ives, B.\n                (2013), \u201cPredicting users\u2019 return to virtual worlds: a social perspective\u201d, \n                  Information Systems Journal\n               , Vol. 23 No. 1, pp. 35-63.","DOI":"10.1111\/j.1365-2575.2011.00396.x"},{"key":"key2020122300443215100_b14","doi-asserted-by":"crossref","unstructured":"Guo, Y.M.\n                and \n                  Klein, B.D.\n                (2009), \u201cBeyond the test of the four channel model of flow in the context of online shopping\u201d, \n                  Communications of the AIS\n               , Vol. 24 No. 1, pp. 837-856.","DOI":"10.17705\/1CAIS.02448"},{"key":"key2020122300443215100_b15","doi-asserted-by":"crossref","unstructured":"Guo, Y.M.\n                and \n                  Poole, M.S.\n                (2009), \u201cAntecedents of flow in online shopping: a test of alternative models\u201d, \n                  Information Systems Journal\n               , Vol. 19 No. 4, pp. 369-390.","DOI":"10.1111\/j.1365-2575.2007.00292.x"},{"key":"key2020122300443215100_b16","doi-asserted-by":"crossref","unstructured":"Ha, I.\n               , \n                  Yoon, Y.\n                and \n                  Choi, M.\n                (2007), \u201cDeterminants of adoption of mobile games under mobile broadband wireless access environment\u201d, \n                  Information and Management\n               , Vol. 44 No. 3, pp. 276-286.","DOI":"10.1016\/j.im.2007.01.001"},{"key":"key2020122300443215100_b17","doi-asserted-by":"crossref","unstructured":"Hausman, A.V.\n                and \n                  Siekpe, J.S.\n                (2009), \u201cThe effect of web interface features on consumer online purchase intentions\u201d, \n                  Journal of Business Research\n               , Vol. 62 No. 1, pp. 5-13.","DOI":"10.1016\/j.jbusres.2008.01.018"},{"key":"key2020122300443215100_b18","doi-asserted-by":"crossref","unstructured":"Ho, L.-A.\n                and \n                  Kuo, T.-H.\n                (2010), \u201cHow can one amplify the effect of e-learning? An examination of high-tech employees\u2019 computer attitude and flow experience\u201d, \n                  Computers in Human Behavior\n               , Vol. 26 No. 1, pp. 23-31.","DOI":"10.1016\/j.chb.2009.07.007"},{"key":"key2020122300443215100_b19","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L.\n                and \n                  Novak, T.P.\n                (1996), \u201cMarketing in hypermedia computer-mediated environments: conceptual foundations\u201d, \n                  Journal of Marketing\n               , Vol. 60 No. 3, pp. 50-68.","DOI":"10.1177\/002224299606000304"},{"key":"key2020122300443215100_b20","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L.\n                and \n                  Novak, T.P.\n                (2009), \u201cFlow online: lessons learned and future prospects\u201d, \n                  Journal of Interactive Marketing\n               , Vol. 23 No. 1, pp. 23-34.","DOI":"10.1016\/j.intmar.2008.10.003"},{"key":"key2020122300443215100_b21","doi-asserted-by":"crossref","unstructured":"Hong, W.\n                and \n                  Thong, J.Y.L.\n                (2013), \u201cInternet privacy concerns: an integrated conceptualization and four empirical studies\u201d, \n                  MIS Quarterly\n               , Vol. 37 No. 1, pp. 275-298.","DOI":"10.25300\/MISQ\/2013\/37.1.12"},{"key":"key2020122300443215100_b22","doi-asserted-by":"crossref","unstructured":"Jin, C.\n                (2013), \u201cThe perspective of a revised TRAM on social capital building: the case of facebook usage\u201d, \n                  Information & Management\n               , Vol. 50 No. 4, pp. 162-168.","DOI":"10.1016\/j.im.2013.03.002"},{"key":"key2020122300443215100_b23","doi-asserted-by":"crossref","unstructured":"Jung, Y.\n               , \n                  Perez-Mira, B.\n                and \n                  Wiley-Patton, S.\n                (2009), \u201cConsumer adoption of mobile TV: examining psychological flow and media content\u201d, \n                  Computers in Human Behavior\n               , Vol. 25 No. 1, pp. 123-129.","DOI":"10.1016\/j.chb.2008.07.011"},{"key":"key2020122300443215100_b24","doi-asserted-by":"crossref","unstructured":"Junglas, I.A.\n               , \n                  Johnson, N.A.\n                and \n                  Spitzmuller, C.\n                (2008), \u201cPersonality traits and concern for privacy: an empirical study in the context of location-based services\u201d, \n                  European Journal of Information Systems\n               , Vol. 17 No. 4, pp. 387-402.","DOI":"10.1057\/ejis.2008.29"},{"key":"key2020122300443215100_b25","unstructured":"Katz, M.L.\n                and \n                  Shapiro, C.\n                (1985), \u201cNetwork externalities, competition, and compatibility\u201d, \n                  American Economic Review\n               , Vol. 75 No. 3, pp. 424-440."},{"key":"key2020122300443215100_b26","doi-asserted-by":"crossref","unstructured":"Kim, H.-W.\n               , \n                  Gupta, S.\n                and \n                  Koh, J.\n                (2011), \u201cInvestigating the intention to purchase digital items in social networking communities: a customer value perspective\u201d, \n                  Information & Management\n               , Vol. 48 No. 6, pp. 228-234.","DOI":"10.1016\/j.im.2011.05.004"},{"key":"key2020122300443215100_b27","doi-asserted-by":"crossref","unstructured":"Koufaris, M.\n                (2002), \u201cApplying the technology acceptance model and flow theory to online consumer behavior\u201d, \n                  Information Systems Research\n               , Vol. 13 No. 2, pp. 205-223.","DOI":"10.1287\/isre.13.2.205.83"},{"key":"key2020122300443215100_b28","doi-asserted-by":"crossref","unstructured":"Ku, Y.-C.\n               , \n                  Chen, R.\n                and \n                  Zhang, H.\n                (2013), \u201cWhy do users continue using social networking sites? An exploratory study of members in the United States and Taiwan\u201d, \n                  Information & Management\n               , Vol. 50 No. 7, pp. 571-581.","DOI":"10.1016\/j.im.2013.07.011"},{"key":"key2020122300443215100_b29","doi-asserted-by":"crossref","unstructured":"Kumar, N.\n               , \n                  Mohan, K.\n                and \n                  Holowczak, R.\n                (2008), \u201cLocking the door but leaving the computer vulnerable: factors inhibiting home users\u2019 adoption of software firewalls\u201d, \n                  Decision Support Systems\n               , Vol. 46 No. 1, pp. 254-264.","DOI":"10.1016\/j.dss.2008.06.010"},{"key":"key2020122300443215100_b30","doi-asserted-by":"crossref","unstructured":"Lee, K.C.\n               , \n                  Kang, I.W.\n                and \n                  McKnight, D.H.\n                (2007), \u201cTransfer from offline trust to key online perceptions: an empirical study\u201d, \n                  IEEE Transactions on Engineering Management\n               , Vol. 54 No. 4, pp. 729-741.","DOI":"10.1109\/TEM.2007.906851"},{"key":"key2020122300443215100_b31","doi-asserted-by":"crossref","unstructured":"Li, Y.\n                (2011), \u201cEmpirical studies on online information privacy concerns: literature review and an integrative framework\u201d, \n                  Communications of the Association for Information Systems\n               , Vol. 28 No. 1, pp. 453-496.","DOI":"10.17705\/1CAIS.02828"},{"key":"key2020122300443215100_b32","doi-asserted-by":"crossref","unstructured":"Lin, C.-P.\n                and \n                  Bhattacherjee, A.\n                (2008), \u201cElucidating individual intention to use interactive information technologies: the role of network externalities\u201d, \n                  International Journal of Electronic Commerce\n               , Vol. 13 No. 1, pp. 85-108.","DOI":"10.2753\/JEC1086-4415130103"},{"key":"key2020122300443215100_b33","doi-asserted-by":"crossref","unstructured":"Lin, H.\n               , \n                  Fan, W.\n                and \n                  Chau, P.Y.K.\n                (2014), \u201cDeterminants of users\u2019 continuance of social networking sites: a self-regulation perspective\u201d, \n                  Information & Management\n               , Vol. 51 No. 5, pp. 595-603.","DOI":"10.1016\/j.im.2014.03.010"},{"key":"key2020122300443215100_b34","doi-asserted-by":"crossref","unstructured":"Lin, K.-Y.\n                and \n                  Lu, H.-P.\n                (2011), \u201cWhy people use social networking sites: an empirical study integrating network externalities and motivation theory\u201d, \n                  Computers in Human Behavior\n               , Vol. 27 No. 3, pp. 1152-1161.","DOI":"10.1016\/j.chb.2010.12.009"},{"key":"key2020122300443215100_b35","doi-asserted-by":"crossref","unstructured":"Lowry, P.B.\n               , \n                  Cao, J.\n                and \n                  Everard, A.\n                (2011), \u201cPrivacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures\u201d, \n                  Journal of Management Information Systems\n               , Vol. 27 No. 4, pp. 163-200.","DOI":"10.2753\/MIS0742-1222270406"},{"key":"key2020122300443215100_b36","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K.\n               , \n                  Kim, S.S.\n                and \n                  Agarwal, J.\n                (2004), \u201cInternet users\u2019 information privacy concerns(IUIPC): the construct, the scale, and a causal model\u201d, \n                  Information Systems Research\n               , Vol. 15 No. 4, pp. 336-355.","DOI":"10.1287\/isre.1040.0032"},{"key":"key2020122300443215100_b37","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K.\n               , \n                  Kim, S.S.\n                and \n                  Patil, A.\n                (2006), \u201cCommon method variance in IS research: a comparison of alternative approaches and a reanalysis of past research\u201d, \n                  Management Science\n               , Vol. 52 No. 12, pp. 1865-1883.","DOI":"10.1287\/mnsc.1060.0597"},{"key":"key2020122300443215100_b38","unstructured":"Nunnally, J.C.\n                (1978), \n                  Psychometric Theory\n               , McGraw-Hill, New York, NY."},{"key":"key2020122300443215100_b39","unstructured":"Pew Research Center\n                (2013), \u201cThe demographics of social media users-2012\u201d, available at: http:\/\/pewinternet.org\/Reports\/2013\/Social-media-users.aspx (accessed September 10, 2014)."},{"key":"key2020122300443215100_b40","doi-asserted-by":"crossref","unstructured":"Podsakoff, P.M.\n                and \n                  Organ, D.W.\n                (1986), \u201cSelf-reports in organizational research: problems and prospects\u201d, \n                  Journal of Management\n               , Vol. 12 No. 4, pp. 531-544.","DOI":"10.1177\/014920638601200408"},{"key":"key2020122300443215100_b41","unstructured":"Reichheld, F.F.\n                and \n                  Schefter, P.\n                (2000), \u201cE-loyalty: your secret weapon on the Web\u201d, \n                  Harvard Business Review\n               , Vol. 78 No. 4, pp. 105-113."},{"key":"key2020122300443215100_b42","doi-asserted-by":"crossref","unstructured":"Slyke, C.V.\n               , \n                  Shim, J.T.\n               , \n                  Johnson, R.\n                and \n                  Jiang, J.\n                (2006), \u201cConcern for information privacy and online consumer purchasing\u201d, \n                  Journal of the AIS\n               , Vol. 7 No. 6, pp. 415-444.","DOI":"10.17705\/1jais.00092"},{"key":"key2020122300443215100_b43","doi-asserted-by":"crossref","unstructured":"Smith, H.J.\n               , \n                  Milberg, S.J.\n                and \n                  Burke, S.J.\n                (1996), \u201cInformation privacy: measuring individuals\u2019 concerns about organizational practices\u201d, \n                  MIS Quarterly\n               , Vol. 20 No. 2, pp. 167-196.","DOI":"10.2307\/249477"},{"key":"key2020122300443215100_b44","doi-asserted-by":"crossref","unstructured":"Stewart, K.A.\n                and \n                  Segars, A.H.\n                (2002), \u201cAn empirical examination of the concern for information privacy instrument\u201d, \n                  Information Systems Research\n               , Vol. 13 No. 1, pp. 36-49.","DOI":"10.1287\/isre.13.1.36.97"},{"key":"key2020122300443215100_b45","doi-asserted-by":"crossref","unstructured":"Strader, T.J.\n               , \n                  Ramaswami, S.N.\n                and \n                  Houle, P.A.\n                (2007), \u201cPerceived network externalities and communication technology acceptance\u201d, \n                  European Journal of Information Systems\n               , Vol. 16 No. 1, pp. 54-65.","DOI":"10.1057\/palgrave.ejis.3000657"},{"key":"key2020122300443215100_b46","doi-asserted-by":"crossref","unstructured":"Straub, D.\n               , \n                  Boudreau, M.-C.\n                and \n                  Gefen, D.\n                (2004), \u201cValidation guidelines for IS positivist research\u201d, \n                  Communications of the Association for Information Systems\n               , Vol. 13 No. 1, pp. 380-427.","DOI":"10.17705\/1CAIS.01324"},{"key":"key2020122300443215100_b47","unstructured":"Wang, C.C.\n               , \n                  Hsu, Y.\n                and \n                  Fang, W.\n                (2004), \u201cAcceptance of technology with network externalities: an empirical study of internet instant messaging services\u201d, \n                  Journal of Information Technology Theory and Application\n               , Vol. 6 No. 4, pp. 15-28."},{"key":"key2020122300443215100_b48","doi-asserted-by":"crossref","unstructured":"Wattal, S.\n               , \n                  Racherla, P.\n                and \n                  Mandviwalla, M.\n                (2010), \u201cNetwork externalities and technology use: a quantitative analysis of intraorganizational blogs\u201d, \n                  Journal of Management Information Systems\n               , Vol. 27 No. 1, pp. 145-173.","DOI":"10.2753\/MIS0742-1222270107"},{"key":"key2020122300443215100_b49","doi-asserted-by":"crossref","unstructured":"Xu, F.\n               , \n                  Michael, K.\n                and \n                  Chen, X.\n                (2013), \u201cFactors affecting privacy disclosure on social network sites: an integrated model\u201d, \n                  Electronic Commerce Research\n               , Vol. 13 No. 2, pp. 151-168.","DOI":"10.1007\/s10660-013-9111-6"},{"key":"key2020122300443215100_b50","doi-asserted-by":"crossref","unstructured":"Xu, H.\n               , \n                  Dinev, T.\n               , \n                  Smith, J.\n                and \n                  Hart, P.\n                (2011), \u201cInformation privacy concerns: linking individual perceptions with institutional privacy assurances\u201d, \n                  Journal of the Association for Information Systems\n               , Vol. 12 No. 12, pp. 798-824.","DOI":"10.17705\/1jais.00281"},{"key":"key2020122300443215100_b51","doi-asserted-by":"crossref","unstructured":"Xu, H.\n               , \n                  Teo, H.-H.\n               , \n                  Tan, B.C.Y.\n                and \n                  Agarwal, R.\n                (2009), \u201cThe role of push-pull technology in privacy calculus: the case of location-based services\u201d, \n                  Journal of Management Information Systems\n               , Vol. 26 No. 3, pp. 135-173.","DOI":"10.2753\/MIS0742-1222260305"},{"key":"key2020122300443215100_b52","doi-asserted-by":"crossref","unstructured":"Xu, H.\n               , \n                  Teo, H.-H.\n               , \n                  Tan, B.C.Y.\n                and \n                  Agarwal, R.\n                (2012), \u201cEffects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services\u201d, \n                  Information Systems Research\n               , Vol. 23 No. 4, pp. 1342-1363.","DOI":"10.1287\/isre.1120.0416"},{"key":"key2020122300443215100_b53","doi-asserted-by":"crossref","unstructured":"Zhang, Z.\n                (2010), \u201cFeeling the sense of community in social networking usage\u201d, \n                  IEEE Transactions on Engineering Management\n               , Vol. 57 No. 2, pp. 225-239.","DOI":"10.1109\/TEM.2009.2023455"},{"key":"key2020122300443215100_b54","doi-asserted-by":"crossref","unstructured":"Zhao, L.\n               , \n                  Lu, Y.B.\n                and \n                  Gupta, S.\n                (2012), \u201cDisclosure intention of location-related information in location-based social network services\u201d, \n                  International Journal of Electronic Commerce\n               , Vol. 16 No. 4, pp. 53-89.","DOI":"10.2753\/JEC1086-4415160403"},{"key":"key2020122300443215100_b55","doi-asserted-by":"crossref","unstructured":"Zhou, T.\n                (2011), \u201cUnderstanding mobile internet continuance usage from the perspectives of UTAUT and flow\u201d, \n                  Information Development\n               , Vol. 27 No. 3, pp. 207-218.","DOI":"10.1177\/0266666911414596"},{"key":"key2020122300443215100_b56","doi-asserted-by":"crossref","unstructured":"Zhou, T.\n                and \n                  Li, H.\n                (2014), \u201cUnderstanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern\u201d, \n                  Computers in Human Behavior\n               , Vol. 37 No. 1, pp. 283-289.","DOI":"10.1016\/j.chb.2014.05.008"},{"key":"key2020122300443215100_b57","doi-asserted-by":"crossref","unstructured":"Zhou, T.\n                and \n                  Lu, Y.\n                (2011), \u201cExamining mobile instant messaging user loyalty from the perspectives of network externalities and flow experience\u201d, \n                  Computers in Human Behavior\n               , Vol. 27 No. 2, pp. 883-889.","DOI":"10.1016\/j.chb.2010.11.013"},{"key":"key2020122300443215100_b58","doi-asserted-by":"crossref","unstructured":"Zhu, D.H.\n               , \n                  Chang, Y.P.\n               , \n                  Luo, J.J.\n                and \n                  Li, X.\n                (2014), \u201cUnderstanding the adoption of location-based recommendation agents among active users of social networking sites\u201d, \n                  Information Processing & Management\n               , Vol. 50 No. 5, pp. 675-682.","DOI":"10.1016\/j.ipm.2014.04.010"}],"container-title":["Program"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/PROG-10-2014-0078\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/PROG-10-2014-0078\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:57:38Z","timestamp":1753394258000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/dta\/article\/49\/3\/289-304\/323771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,6]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,7,6]]}},"alternative-id":["10.1108\/PROG-10-2014-0078"],"URL":"https:\/\/doi.org\/10.1108\/prog-10-2014-0078","relation":{},"ISSN":["0033-0337"],"issn-type":[{"value":"0033-0337","type":"print"}],"subject":[],"published":{"date-parts":[[2015,7,6]]}}}