{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T01:40:05Z","timestamp":1745372405809,"version":"3.40.4"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/icdim.2012.6360112","type":"proceedings-article","created":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T02:16:48Z","timestamp":1354328208000},"page":"297-302","source":"Crossref","is-referenced-by-count":1,"title":["An investigation of non-use and abandonment of microblogging"],"prefix":"10.1109","author":[{"given":"Yanru","family":"Guo","sequence":"first","affiliation":[]},{"given":"Dion Hoe-Lian","family":"Goh","sequence":"additional","affiliation":[]},{"given":"Kavita","family":"Ilangovan","sequence":"additional","affiliation":[]},{"given":"Shengnan","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Xiaotian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"567","DOI":"10.2307\/20650309","article-title":"Investigating user resistance to information systems implementation: A status quo bias perspective","volume":"33","author":"kim","year":"2009","journal-title":"MIS Quarterly"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.4.680"},{"key":"18","doi-asserted-by":"crossref","first-page":"155","DOI":"10.2307\/30036522","article-title":"Lateral influence behaviors: Gaining peers' commitment to strategic information systems","volume":"27","author":"enns","year":"2003","journal-title":"MIS Quarterly"},{"key":"15","first-page":"73","article-title":"Out of touch","volume":"40","author":"moisan","year":"2010","journal-title":"J Financial Planning"},{"key":"33","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0747-5632(99)00050-3","article-title":"Technophobia and personality subtypes in a sample of South African university students","volume":"16","author":"anthony","year":"2000","journal-title":"Computers in Human Behavior"},{"key":"16","first-page":"32","article-title":"Resistance is futile","volume":"36","author":"o'hanlon","year":"2009","journal-title":"T H E Journal"},{"key":"13","article-title":"Twitter acceptance: The Role of intrinsic motivation","volume":"10","author":"agrifoglio","year":"2010","journal-title":"Proc of ALPIS ItAIS Italy Sprouts Working Papers on Information Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721693"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348556"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753486"},{"key":"21","article-title":"Can we use Twitter for educational activities?","author":"grosseck","year":"0","journal-title":"Proc of the 4th International Scientific Conference ELearning and Software for Education 2008"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018416"},{"key":"22","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1089\/cyber.2010.0016","article-title":"In their own words: Why teenagers don't use social networking sites","volume":"14","author":"baker","year":"2011","journal-title":"Cyberpsychology Behavior and Social Networking"},{"key":"23","doi-asserted-by":"crossref","first-page":"435","DOI":"10.14742\/ajet.1245","article-title":"Bullying in the new playground: Research into cyberbullying and cyber victimisation","volume":"23","author":"li","year":"2007","journal-title":"Australasian Journal of Educational Technology"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1353\/bio.2003.0026"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","author":"festinger","year":"1957","journal-title":"A Theory of Cognitive Dissonance"},{"key":"26","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2307\/25148634","article-title":"Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test","volume":"28","author":"bhattacherjee","year":"2004","journal-title":"MIS Quarterly"},{"key":"27","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.elerap.2011.11.001","article-title":"On the network effect on Web 2.0 applications","volume":"11","author":"aggarwal","year":"2009","journal-title":"Electronic Commerce Research and Applications"},{"key":"28","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5210\/fm.v11i9.1394","article-title":"A privacy paradox: Social networking in the United States","volume":"11","author":"barnes","year":"2006","journal-title":"First Monday"},{"key":"29","first-page":"143","article-title":"Why people use social networking sites","author":"brandtz\ufffdg","year":"2009","journal-title":"Proc HCI Inte"},{"key":"3","article-title":"Gone Too Soon: Did twitter grieve for Michael Jackson?","author":"lee","year":"0","journal-title":"Online Information Review"},{"key":"2","first-page":"1","article-title":"Testing a model of continued usage for micro-blogging service: The case of Twitter","volume":"51","author":"barnes","year":"2011","journal-title":"Journal of Computer Information Systems"},{"journal-title":"Social Media and Young Adults","year":"2010","author":"lenhart","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145277"},{"key":"30","first-page":"129","article-title":"Tweeting the night away: Using twitter to enhance social presence","volume":"20","author":"dunlap","year":"2009","journal-title":"Journal of Information Systems Education"},{"key":"6","first-page":"56","article-title":"Why we Twitter: Understanding microblogging usage and communities","author":"song","year":"2007","journal-title":"Proc of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis"},{"journal-title":"Social Media and College Admissions The First Longitudinal Study","year":"2009","author":"mattson","key":"5"},{"key":"32","first-page":"178","article-title":"The dark side of information: Overload, anxiety and other paradoxes and pathologies","volume":"37","author":"bawden","year":"2011","journal-title":"Journal of Information Science"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-010-7077-0"},{"key":"4","first-page":"4","article-title":"Using social networking sites as student engagement tools","volume":"25","author":"harris","year":"2008","journal-title":"Diverse Issues in Higher Education"},{"journal-title":"Twitter Usage in America 2010","year":"2010","author":"webster","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/13691180801999050"}],"event":{"name":"2012 Seventh International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2012,8,22]]},"location":"Macau, Macao","end":{"date-parts":[[2012,8,24]]}},"container-title":["Seventh International Conference on Digital Information Management (ICDIM 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6341280\/6360086\/06360112.pdf?arnumber=6360112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T01:06:18Z","timestamp":1745370378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6360112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icdim.2012.6360112","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}