{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T16:34:46Z","timestamp":1723048486624},"reference-count":89,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1016\/j.chb.2016.01.011","type":"journal-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T20:50:58Z","timestamp":1454100658000},"page":"443-453","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"special_numbering":"C","title":["Leveraging social networks in the adoption of mobile technologies for collaboration"],"prefix":"10.1016","volume":"58","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8963-3776","authenticated-orcid":false,"given":"Iris","family":"Reychav","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4223-7175","authenticated-orcid":false,"given":"Martin","family":"Ndicu","sequence":"additional","affiliation":[]},{"given":"Dezhi","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib1","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1287\/isre.11.4.418.11876","article-title":"Research report: the evolving relationship between general and specific computer self-efficacy\u2014An empirical assessment","volume":"11","author":"Agarwal","year":"2000","journal-title":"Information Systems Research"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1287\/mnsc.49.1.21.12756","article-title":"Individual centrality and performance in virtual R&D groups: an empirical study","volume":"49","author":"Ahuja","year":"2003","journal-title":"Management Science"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"10.1016\/j.chb.2016.01.011_bib4","series-title":"Constructing a TPB questionnaire: Conceptual and methodological considerations","author":"Ajzen","year":"2002"},{"key":"10.1016\/j.chb.2016.01.011_bib5","series-title":"Michael Allen's guide to e-learning: Building interactive, fun, and effective learning programs for any company","author":"Allen","year":"2003"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","article-title":"Self-efficacy: toward a unifying theory of behavioral change","volume":"84","author":"Bandura","year":"1977","journal-title":"Psychological Review"},{"key":"10.1016\/j.chb.2016.01.011_bib7","series-title":"Social foundations of thought and action","author":"Bandura","year":"1986"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib8","doi-asserted-by":"crossref","first-page":"211","DOI":"10.17705\/1jais.00126","article-title":"Quo vadis TAM?","volume":"8","author":"Benbasat","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib9","doi-asserted-by":"crossref","first-page":"229","DOI":"10.2307\/25148634","article-title":"Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test","volume":"28","author":"Bhattacherjee","year":"2004","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2016.01.011_bib10","series-title":"Testing structural equation models","author":"Bollen","year":"1993"},{"issue":"5","key":"10.1016\/j.chb.2016.01.011_bib11","doi-asserted-by":"crossref","first-page":"547","DOI":"10.2307\/2093450","article-title":"A\u00a0theory of ethnic antagonism: the split labor market","volume":"37","author":"Bonacich","year":"1972","journal-title":"American Sociological Review"},{"issue":"5","key":"10.1016\/j.chb.2016.01.011_bib12","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1086\/228631","article-title":"Power and centrality: a family of measures","volume":"37","author":"Bonacich","year":"1987","journal-title":"American Journal of Sociology"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib13","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.socnet.2007.04.002","article-title":"Some unique properties of eigenvector centrality","volume":"29","author":"Bonacich","year":"2007","journal-title":"Social Networks"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.socnet.2004.11.008","article-title":"Centrality and network flow","volume":"27","author":"Borgatti","year":"2005","journal-title":"Social Networks"},{"key":"10.1016\/j.chb.2016.01.011_bib15","doi-asserted-by":"crossref","first-page":"518","DOI":"10.2307\/2392937","article-title":"Being in the right place: a structural analysis of individual influence in an organization","author":"Brass","year":"1984","journal-title":"Administrative Science Quarterly"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib16","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.im.2010.03.001","article-title":"To give or to receive? Factors influencing members' knowledge sharing and community promotion in professional virtual communities","volume":"47","author":"Chen","year":"2010","journal-title":"Information & Management"},{"issue":"7","key":"10.1016\/j.chb.2016.01.011_bib18","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.im.2008.06.007","article-title":"Social network, social trust and shared goals in organizational knowledge sharing","volume":"45","author":"Chow","year":"2008","journal-title":"Information & Management"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib19","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: development of a measure and initial test","volume":"19","author":"Compeau","year":"1995","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2016.01.011_bib20","series-title":"Strategies in social network formation, Jena economic research papers","author":"Conte","year":"2009"},{"issue":"3","key":"10.1016\/j.chb.2016.01.011_bib21","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/BF02310555","article-title":"Coefficient alpha and the internal structure of tests","volume":"16","author":"Cronbach","year":"1951","journal-title":"Psychometrika"},{"issue":"8","key":"10.1016\/j.chb.2016.01.011_bib22","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: a comparison of two theoretical models","volume":"35","author":"Davis","year":"1989","journal-title":"Management Science"},{"issue":"14","key":"10.1016\/j.chb.2016.01.011_bib23","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","article-title":"Extrinsic and intrinsic motivation to use computers in the workplace1","volume":"22","author":"Davis","year":"1992","journal-title":"Journal of Applied Social Psychology"},{"issue":"5","key":"10.1016\/j.chb.2016.01.011_bib24","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/0378-7206(92)90059-O","article-title":"Diagnosis of an information system failure: a framework and interpretive process","volume":"23","author":"Davis","year":"1992","journal-title":"Information & Management"},{"key":"10.1016\/j.chb.2016.01.011_bib25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1534-0856(00)03002-4","article-title":"Teams and technology: Interactions over time","volume":"3","author":"DeSanctis","year":"2000","journal-title":"Research on Managing Groups and Teams"},{"key":"10.1016\/j.chb.2016.01.011_bib26","series-title":"Learning together: Peer tutoring in higher education","author":"Falchikov","year":"2001"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib27","doi-asserted-by":"crossref","first-page":"73","DOI":"10.2753\/MIS0742-1222260104","article-title":"Engaging group e-learning in virtual worlds","volume":"26","author":"Franceschi","year":"2009","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10.1016\/j.chb.2016.01.011_bib28","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","article-title":"Centrality in social networks conceptual clarification","volume":"1","author":"Freeman","year":"1979","journal-title":"Social Networks"},{"issue":"3","key":"10.1016\/j.chb.2016.01.011_bib29","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.socnet.2013.03.003","article-title":"The role of reciprocation in social network formation, with an application to LiveJournal","volume":"35","author":"Gaudeul","year":"2013","journal-title":"Social Networks"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib30","doi-asserted-by":"crossref","first-page":"355","DOI":"10.3200\/JOEB.83.6.355-359","article-title":"Technology acceptance in an academic context: faculty acceptance of online education","volume":"83","author":"Gibson","year":"2008","journal-title":"Journal of Education for Business"},{"key":"10.1016\/j.chb.2016.01.011_bib31","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.chb.2015.06.019","article-title":"Structuring peer assessment: comparing the impact of the degree of structure on peer feedback content","volume":"52","author":"Gielen","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib32","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11211-008-0067-y","article-title":"Strong reciprocity and the roots of human morality","volume":"21","author":"Gintis","year":"2008","journal-title":"Social Justice Research"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib33","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1037\/0021-9010.74.6.884","article-title":"Effects of alternative training methods on self-efficacy and performance in computer software training","volume":"74","author":"Gist","year":"1989","journal-title":"Journal of Applied Psychology"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib34","first-page":"2259","article-title":"Tablets in education: outcome expectancy and anxiety of middle school students","volume":"14","author":"Gorhan","year":"2014","journal-title":"Educational Sciences: Theory and Practice"},{"key":"10.1016\/j.chb.2016.01.011_bib35","doi-asserted-by":"crossref","first-page":"161","DOI":"10.2307\/2092623","article-title":"The norm of reciprocity: a preliminary statement","author":"Gouldner","year":"1960","journal-title":"American Sociological Review"},{"key":"10.1016\/j.chb.2016.01.011_bib91","series-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","author":"Hair","year":"2013"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib36","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/0378-8733(78)90019-9","article-title":"The process of friendship formation","volume":"1","author":"Hallinan","year":"1979","journal-title":"Social Networks"},{"key":"10.1016\/j.chb.2016.01.011_bib37","series-title":"Proceedings of the Nineteenth Americas Conference on information systems. Chicago, illinois, August 15\u201317","article-title":"The need for BYOD mobile device security awareness and training","author":"Harris","year":"2013"},{"key":"10.1016\/j.chb.2016.01.011_bib38","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1257\/aer.91.2.73","article-title":"In search of homo economicus: behavioral experiments in 15 small-scale societies","author":"Henrich","year":"2001","journal-title":"American Economic Review"},{"issue":"11","key":"10.1016\/j.chb.2016.01.011_bib39","doi-asserted-by":"crossref","first-page":"e1000968","DOI":"10.1371\/journal.pcbi.1000968","article-title":"Infectious disease modeling of social contagion in networks","volume":"6","author":"Hill","year":"2010","journal-title":"PLoS Computational Biology"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib40","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.jbi.2009.07.002","article-title":"The technology acceptance model: its past and its future in health care","volume":"43","author":"Holden","year":"2010","journal-title":"Journal of Biomedical Informatics"},{"issue":"9","key":"10.1016\/j.chb.2016.01.011_bib41","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1151030.1151034","article-title":"Mobile data service fuels the desire for uniqueness","volume":"49","author":"Hong","year":"2006","journal-title":"Communications of the ACM"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib42","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.elerap.2011.10.001","article-title":"The effects of a player's network centrality on resource accessibility, game enjoyment, and continuance intention: a study on online gaming communities","volume":"11","author":"Hsiao","year":"2012","journal-title":"Electronic Commerce Research and Applications"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib43","doi-asserted-by":"crossref","first-page":"1246","DOI":"10.1016\/j.compedu.2012.05.009","article-title":"An online game approach for improving students' learning performance in web-based problem-solving activities","volume":"59","author":"Hwang","year":"2012","journal-title":"Computers & Education"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib44","doi-asserted-by":"crossref","first-page":"56","DOI":"10.5465\/amr.1993.3997507","article-title":"Personal networks of women and minorities in management: a conceptual framework","volume":"18","author":"Ibarra","year":"1993","journal-title":"Academy of Management Review"},{"key":"10.1016\/j.chb.2016.01.011_bib45","doi-asserted-by":"crossref","first-page":"277","DOI":"10.2307\/2393414","article-title":"Power, social influence, and sense making: effects of network centrality and proximity on employee perceptions","author":"Ibarra","year":"1993","journal-title":"Administrative Science Quarterly"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib46","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/0305-0483(95)00035-6","article-title":"The effects of self-efficacy on computer usage","volume":"23","author":"Igbaria","year":"1995","journal-title":"Omega"},{"key":"10.1016\/j.chb.2016.01.011_bib47","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1146\/annurev.psych.56.091103.070250","article-title":"Teams in organizations: from input-process-output models to IMOI models","volume":"56","author":"Ilgen","year":"2005","journal-title":"Annual Review of Psychology"},{"key":"10.1016\/j.chb.2016.01.011_bib48","series-title":"Social and economic networks","author":"Jackson","year":"2008"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib49","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1287\/isre.11.4.402.11869","article-title":"Research report: the role of behavioral modeling in computer skills acquisition: toward refinement of the model","volume":"11","author":"Johnson","year":"2000","journal-title":"Information Systems Research"},{"issue":"10","key":"10.1016\/j.chb.2016.01.011_bib50","doi-asserted-by":"crossref","first-page":"585","DOI":"10.17705\/1jais.00344","article-title":"The social component of information systems\u2014How sociability contributes to technology acceptance","volume":"14","author":"Junglas","year":"2013","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib51","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1111\/j.1540-5915.1998.tb01583.x","article-title":"Effects of source and participant anonymity and difference in initial opinions in an EMS context\u2217","volume":"29","author":"Kahai","year":"1998","journal-title":"Decision Sciences"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib52","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.1111\/j.1467-8624.2007.01060.x","article-title":"Effects of naturally existing peer groups on changes in academic engagement in a cohort of sixth graders","volume":"78","author":"Kindermann","year":"2007","journal-title":"Child Development"},{"key":"10.1016\/j.chb.2016.01.011_bib53","series-title":"No contest: The case against competition","author":"Kohn","year":"1992"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib54","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1016\/j.chb.2009.03.008","article-title":"Fostering the determinants of knowledge sharing in professional virtual communities","volume":"25","author":"Lin","year":"2009","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib55","doi-asserted-by":"crossref","first-page":"165","DOI":"10.2753\/MIS0742-1222270406","article-title":"Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures","volume":"27","author":"Lowry","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib56","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1111\/j.1365-2729.2005.00145.x","article-title":"Examining user acceptance of computer technology: an empirical study of student teachers","volume":"21","author":"Ma","year":"2005","journal-title":"Journal of Computer Assisted Learning"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib57","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1287\/isre.9.2.126","article-title":"The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research","volume":"9","author":"Marakas","year":"1998","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2016.01.011_bib58","doi-asserted-by":"crossref","first-page":"122","DOI":"10.2307\/2095397","article-title":"Core discussion networks of Americans","author":"Marsden","year":"1987","journal-title":"American Sociological Review"},{"key":"10.1016\/j.chb.2016.01.011_bib59","series-title":"Researching mobile learning: Interim report to BECTA, Period: April \u2013 December. Coventry","author":"McFarlane","year":"2008"},{"key":"10.1016\/j.chb.2016.01.011_bib60","series-title":"Who shall survive?: A new approach to the problem of human interrelations","author":"Moreno","year":"1934"},{"issue":"3\u20134","key":"10.1016\/j.chb.2016.01.011_bib61","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1023\/A:1026485807148","article-title":"Models of the small world","volume":"101","author":"Newman","year":"2000","journal-title":"Journal of Statistical Physics"},{"issue":"5","key":"10.1016\/j.chb.2016.01.011_bib62","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1108\/07363760510611671","article-title":"Explaining intention to use mobile chat services: moderating effects of gender","volume":"22","author":"Nysveen","year":"2005","journal-title":"Journal of Consumer Marketing"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib63","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1088\/1367-2630\/9\/6\/179","article-title":"Analysis of a large-scale weighted network of one-to-one human communication","volume":"9","author":"Onnela","year":"2007","journal-title":"New Journal of Physics"},{"issue":"3","key":"10.1016\/j.chb.2016.01.011_bib64","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","article-title":"Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model","volume":"7","author":"Pavlou","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"key":"10.1016\/j.chb.2016.01.011_bib65","doi-asserted-by":"crossref","first-page":"673","DOI":"10.2307\/2657354","article-title":"Resources and relationships: social networks and mobility in the workplace","author":"Podolny","year":"1997","journal-title":"American Sociological Review"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib66","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1057\/ejis.2010.15","article-title":"Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities","volume":"19","author":"Posey","year":"2010","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib67","doi-asserted-by":"crossref","first-page":"240","DOI":"10.2307\/3556658","article-title":"Network structure and knowledge transfer: the effects of cohesion and range","volume":"48","author":"Reagans","year":"2003","journal-title":"Administrative Science Quarterly"},{"key":"10.1016\/j.chb.2016.01.011_bib68","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1016\/j.chb.2015.04.019","article-title":"Mobile collaborative learning: the role of individual learning in groups through text and video content delivery in tablets","volume":"50","author":"Reychav","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib69","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0378-8733(79)90003-0","article-title":"Longitudinal analysis of friendship networks","volume":"2","author":"Runger","year":"1980","journal-title":"Social Networks"},{"issue":"4","key":"10.1016\/j.chb.2016.01.011_bib71","doi-asserted-by":"crossref","first-page":"13","DOI":"10.17705\/1jais.00123","article-title":"Looking forward: toward an understanding of the nature and definition of IT acceptance","volume":"8","author":"Schwarz","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib72","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1002\/asi.22977","article-title":"Collaborative information seeking","volume":"65","author":"Shah","year":"2014","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib73","first-page":"1","article-title":"Towards a theory of mobile learning","volume":"1","author":"Sharples","year":"2005","journal-title":"Proceedings of mLearn"},{"key":"10.1016\/j.chb.2016.01.011_bib74","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1086\/220534","article-title":"The sociology of sociability","author":"Simmel","year":"1949","journal-title":"American Journal of Sociology"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib75","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/0272-7358(88)90060-8","article-title":"Mood and memory: evaluating the network theory of affect","volume":"8","author":"Singer","year":"1988","journal-title":"Clinical Psychology Review"},{"issue":"5","key":"10.1016\/j.chb.2016.01.011_bib76","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1007\/BF00992905","article-title":"The narrative constitution of identity: a relational and network approach","volume":"23","author":"Somers","year":"1994","journal-title":"Theory and Society"},{"issue":"1","key":"10.1016\/j.chb.2016.01.011_bib77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0378-7206(97)00026-8","article-title":"Testing the technology acceptance model across cultures: a three country study","volume":"33","author":"Straub","year":"1997","journal-title":"Information & Management"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib78","doi-asserted-by":"crossref","first-page":"371","DOI":"10.2307\/20650296","article-title":"Model of acceptance with peer support: a social network perspective to understand employees' system use","volume":"33","author":"Sykes","year":"2009","journal-title":"Mis Quarterly"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib79","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","article-title":"Understanding information technology usage: a test of competing models","volume":"6","author":"Taylor","year":"1995","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2016.01.011_bib80","series-title":"Technology acceptance in education","author":"Teo","year":"2011"},{"key":"10.1016\/j.chb.2016.01.011_bib81","series-title":"Measuring and assessing organizations","author":"Van de Ven","year":"1980"},{"key":"10.1016\/j.chb.2016.01.011_bib82","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.chb.2015.02.015","article-title":"Extending the theory of bounded generalized reciprocity: an explanation of the social benefits of cooperative video game play","volume":"48","author":"Velez","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib83","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","article-title":"Technology acceptance model 3 and a research agenda on interventions","volume":"39","author":"Venkatesh","year":"2008","journal-title":"Decision Sciences"},{"issue":"3","key":"10.1016\/j.chb.2016.01.011_bib84","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1111\/j.1540-5915.1996.tb01822.x","article-title":"A\u00a0model of the antecedents of perceived ease of use: development and test","volume":"27","author":"Venkatesh","year":"1996","journal-title":"Decision Sciences"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib85","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A\u00a0theoretical extension of the technology acceptance model: four longitudinal field studies","volume":"46","author":"Venkatesh","year":"2000","journal-title":"Management Science"},{"issue":"3","key":"10.1016\/j.chb.2016.01.011_bib86","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"},{"issue":"6","key":"10.1016\/j.chb.2016.01.011_bib87","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1006\/ijhc.1999.0367","article-title":"Creating an effective training environment for enhancing telework","volume":"52","author":"Venkatesh","year":"2000","journal-title":"International Journal of Human-Computer Studies"},{"issue":"8","key":"10.1016\/j.chb.2016.01.011_bib88","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1007\/s10802-010-9431-0","article-title":"Predicting change in early adolescent problem behavior in the middle school years: a mesosystemic perspective on parenting and peer experiences","volume":"38","author":"V\u00e9ronneau","year":"2010","journal-title":"Journal of Abnormal Child Psychology"},{"key":"10.1016\/j.chb.2016.01.011_bib89","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1146\/annurev.soc.30.020404.104342","article-title":"The \u2018new\u2019 science of networks","volume":"30","author":"Watts","year":"2004","journal-title":"Annual Review of Sociology"},{"issue":"2","key":"10.1016\/j.chb.2016.01.011_bib90","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1017\/S0265052503202119","article-title":"The paradox of group autonomy","volume":"20","author":"Wellman","year":"2003","journal-title":"Social Philosophy and Policy"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563216300115?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563216300115?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:17:07Z","timestamp":1567556227000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563216300115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":89,"alternative-id":["S0747563216300115"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2016.01.011","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2016,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Leveraging social networks in the adoption of mobile technologies for collaboration","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2016.01.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2016 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}