{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:44:32Z","timestamp":1769024672896,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71804174"],"award-info":[{"award-number":["71804174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71601174"],"award-info":[{"award-number":["71601174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71571172"],"award-info":[{"award-number":["71571172"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018M632555"],"award-info":[{"award-number":["2018M632555"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2902905","type":"journal-article","created":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T22:33:48Z","timestamp":1553553228000},"page":"50380-50387","source":"Crossref","is-referenced-by-count":60,"title":["Mobile Payment With Alipay: An Application of Extended Technology Acceptance Model"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5664-863X","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6213-8959","authenticated-orcid":false,"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shanyong","family":"Wangh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8064-4249","authenticated-orcid":false,"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2017.08.030"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.032"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-018-9864-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2018.06.007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2017.08.013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-10-2013-0128"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.01.108"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2013.07.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/su8020147"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nclimate2728"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph15112394"},{"key":"ref16","first-page":"112","article-title":"Creating trust and reducing consumers&#x2019; risk perception in Internet shopping","volume":"12","author":"tian","year":"2018","journal-title":"J Marketing Dev Competitiveness"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11067-015-9312-8"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.4324\/9781315816456","author":"drennan","year":"2014","journal-title":"Risk and Crisis Management in the Public Sector"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2016-0027"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11116-018-9893-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2014.06.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-014-9138-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-014-0348-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.03.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.045"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.12.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2012.02.036"},{"key":"ref2","first-page":"4","article-title":"Value of information systems and products: Understanding the users&#x2019; perspective and values","volume":"9","author":"kujala","year":"2009","journal-title":"J Inf Technol Theory Appl"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.036"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1177\/152397210800800201","article-title":"Government transfers and inequality: An anatomy of political failure","volume":"8","author":"clark","year":"2008","journal-title":"Public Finance and Management"},{"key":"ref20","article-title":"2D barcode based mobile payment system with biometric security","volume":"2","author":"masalkar","year":"2015","journal-title":"Transportation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/IJCHM-09-2013-0413"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-04-2015-0035"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.03.009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0188"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2018.08.014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.07.009"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08673569.pdf?arnumber=8673569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T04:07:52Z","timestamp":1721102872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8673569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2902905","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}