{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T04:34:33Z","timestamp":1721277273834},"reference-count":71,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1016\/j.chb.2017.04.045","type":"journal-article","created":{"date-parts":[[2017,4,22]],"date-time":"2017-04-22T04:45:35Z","timestamp":1492836335000},"page":"188-195","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["The role of intentions in facebook usage among educated youth in Pakistan: An extension of the theory of planned behavior"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1746-7446","authenticated-orcid":false,"given":"Jawad","family":"Tariq","sequence":"first","affiliation":[]},{"given":"Amal","family":"Sajjad","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Usman","sequence":"additional","affiliation":[]},{"given":"Aaisha","family":"Amjad","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib1","doi-asserted-by":"crossref","first-page":"201","DOI":"10.5465\/AMR.2009.36982613","article-title":"The case for formal theory","volume":"34","author":"Adner","year":"2009","journal-title":"Academy of Management Review"},{"key":"10.1016\/j.chb.2017.04.045_bib68","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.chb.2015.12.027","article-title":"Association of demographics, motives and intensity of using Social Networking Sites with the formation of bonding and bridging social capital in Pakistan","volume":"57","author":"Ahmad","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib2","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1146\/annurev.psych.52.1.27","article-title":"Nature and operation of attitudes","volume":"52","author":"Ajzen","year":"2001","journal-title":"Annual Review of Psychology"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib3","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1080\/01490409109513137","article-title":"Prediction of leisure participation from behavioral, normative, and control beliefs: An application of the theory of planned behavior","volume":"13","author":"Ajzen","year":"1991","journal-title":"Leisure Sciences"},{"key":"10.1016\/j.chb.2017.04.045_bib4","first-page":"1","article-title":"Using online social networking: Students' purposes of Facebook usage at the University of Turkey","volume":"3","author":"Akyildiz","year":"2012","journal-title":"Journal of Technology Research"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib6","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1089\/109493102753770507","article-title":"\u201cOn the Internet no one knows I'm an introvert\u201d: Extroversion, neuroticism, and Internet interaction","volume":"5","author":"Amichai-Hamburger","year":"2002","journal-title":"CyberPsychology & Behavior"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib7","doi-asserted-by":"crossref","first-page":"496","DOI":"10.5465\/amr.1989.4308374","article-title":"Organizational theories: Some criteria for evaluation","volume":"14","author":"Bacharach","year":"1989","journal-title":"Academy of Management Review"},{"key":"10.1016\/j.chb.2017.04.045_bib8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.chb.2014.11.021","article-title":"Political mobilization through social network sites: The mobilizing power of political messages received from SNS friends","volume":"44","author":"Baek","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"10.1016\/j.chb.2017.04.045_bib9","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1016\/j.chb.2010.06.006","article-title":"Predicting adolescents' use of social networking sites from an extended theory of planned behavior perspective","volume":"26","author":"Baker","year":"2010","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib10","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1037\/0033-2909.117.3.497","article-title":"The need to belong: Desire for interpersonal attachments as a fundamental human motivation","volume":"117","author":"Baumeister","year":"1995","journal-title":"Psychological Bulletin"},{"issue":"7","key":"10.1016\/j.chb.2017.04.045_bib11","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1097\/00043764-199007000-00013","article-title":"The prediction of intention to smoke only in designated work site areas","volume":"32","author":"Boissonneault","year":"1990","journal-title":"Journal of Occupational and Environmental Medicine"},{"issue":"5","key":"10.1016\/j.chb.2017.04.045_bib12","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1037\/0278-6133.10.5.336","article-title":"Predicting attempts and sustained cessation of smoking after the introduction of workplace smoking bans","volume":"10","author":"Borland","year":"1991","journal-title":"Health Psychology"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib13","first-page":"1","article-title":"Ajzen's theory of planned behavior and social media use by college students","volume":"8","author":"Cameron","year":"2012","journal-title":"American Journal of Psychological Research"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib14","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1177\/1065912913482758","article-title":"Is social media changing how we understand political engagement? An analysis of Facebook and the 2008 presidential election","volume":"66","author":"Carlisle","year":"2013","journal-title":"Political Research Quarterly"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib15","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1089\/cpb.2008.0226","article-title":"Information disclosure and control on facebook: Are they two sides of the same coin or two different processes?","volume":"12","author":"Christofides","year":"2009","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2017.04.045_bib16","series-title":"Social psychology and health: European perspectives","first-page":"1","article-title":"Comparing the health belief model and the theory of planned behavior in health screening","author":"Conner","year":"1994"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1006\/pmed.1994.1023","article-title":"Self-efficacy as an important determinant of quitting among pregnant women who smoke: The \u00d8-pattern","volume":"23","author":"Devries","year":"1994","journal-title":"Preventive Medicine"},{"issue":"5","key":"10.1016\/j.chb.2017.04.045_bib19","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1089\/cpb.2007.9964","article-title":"Shyness, Internet use, and personality","volume":"10","author":"Ebeling-Witte","year":"2007","journal-title":"CyberPsychology and Behavior"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib20","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: Definition, history, and scholarship","volume":"13","author":"Ellison","year":"2007","journal-title":"Journal of Computer Mediated Communication"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib21","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1111\/j.1083-6101.2006.00020.x","article-title":"Managing impressions online: Self-presentation processes in the online dating environment","volume":"11","author":"Ellison","year":"2006","journal-title":"Journal of Computer-mediated Communication"},{"key":"10.1016\/j.chb.2017.04.045_bib22","first-page":"1","article-title":"Spatially bounded online social networks and social capital","volume":"36","author":"Ellison","year":"2006","journal-title":"International Communication Association"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib23","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","article-title":"The benefits of facebook \u2018\u2018friends:\u2019\u2019 Social capital and college students use of online social network sites","volume":"12","author":"Ellison","year":"2007","journal-title":"Journal of Computer-mediated Communication"},{"issue":"6","key":"10.1016\/j.chb.2017.04.045_bib24","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1177\/1461444810385389","article-title":"Connection strategies: Social capital implications of Facebook-enabled communication practices","volume":"13","author":"Ellison","year":"2011","journal-title":"New Media & Society"},{"key":"10.1016\/j.chb.2017.04.045_bib69","series-title":"Proceedings of the SIGCHI conference on human factors in computing systems","first-page":"211","article-title":"Predicting tie strength with social media","author":"Gilbert","year":"2009"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib25","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1097\/00007435-199303000-00008","article-title":"University students' intention to seek medical care promptly if symptoms of sexually transmitted diseases were suspected","volume":"20","author":"Godin","year":"1993","journal-title":"Sexually Transmitted Diseases"},{"key":"10.1016\/j.chb.2017.04.045_bib26","series-title":"The presentation of self in everyday life","author":"Goffman","year":"1959"},{"issue":"9","key":"10.1016\/j.chb.2017.04.045_bib27","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1089\/cyber.2010.0087","article-title":"Manifestations of personality in online social networks: Self-reported Facebook-related behaviors and observable profile information","volume":"14","author":"Gosling","year":"2011","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.chb.2017.04.045_bib28","series-title":"Proceedings of the 2005 ACM workshop on Privacy in the electronic society","first-page":"71","article-title":"Information revelation and privacy in online social networks","author":"Gross","year":"2005"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib29","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1108\/17508611211226557","article-title":"The importance of theory in social enterprise research","volume":"8","author":"Haugh","year":"2012","journal-title":"Social Enterprise Journal"},{"key":"10.1016\/j.chb.2017.04.045_bib30","series-title":"Proceedings of the SIGCHI conference on human factors in computing systems","first-page":"1027","article-title":"Looking at, looking up or keeping up with people?: motives and use of facebook","author":"Joinson","year":"2008"},{"issue":"9","key":"10.1016\/j.chb.2017.04.045_bib31","doi-asserted-by":"crossref","first-page":"3528","DOI":"10.3390\/ijerph8093528","article-title":"Online social networking and addiction\u2014a review of the psychological literature","volume":"8","author":"Kuss","year":"2011","journal-title":"International Journal of Environmental Research and Public Health"},{"key":"10.1016\/j.chb.2017.04.045_bib32","series-title":"Proceedings of the SIGCHI conference on Human factors in computing systems","first-page":"435","article-title":"A\u00a0familiar face (book): Profile elements as signals in an online social network","author":"Lampe","year":"2007"},{"key":"10.1016\/j.chb.2017.04.045_bib33","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1146\/annurev.psych.58.110405.085658","article-title":"Motivational and emotional aspects of the self","volume":"58","author":"Leary","year":"2007","journal-title":"Annual Review of Psychology"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib34","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1037\/0022-3514.68.3.518","article-title":"Self-esteem as an interpersonal monitor: The sociometer hypothesis","volume":"68","author":"Leary","year":"1995","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib70","doi-asserted-by":"crossref","first-page":"252","DOI":"10.2466\/21.02.17.PR0.112.1.252-265","article-title":"The moderating role of attachment anxiety on Social network Site use intensity and Social Capital","volume":"112","author":"Liu","year":"2013","journal-title":"Psychological Reports"},{"key":"10.1016\/j.chb.2017.04.045_bib35","series-title":"Legal effects of link sharing in social networks","author":"Lopez","year":"2015"},{"issue":"6","key":"10.1016\/j.chb.2017.04.045_bib36","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1111\/j.1559-1816.2002.tb01434.x","article-title":"The influence of affective and instrumental beliefs on exercise intentions and behavior: A longitudinal analysis","volume":"32","author":"Lowe","year":"2002","journal-title":"Journal of Applied Social Psychology"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib37","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/17439880902923606","article-title":"Facebook, social integration and informal learning at university:\u2018It is more for socialising and talking to friends about work than for actually doing work\u2019","volume":"34","author":"Madge","year":"2009","journal-title":"Learning, Media and Technology"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib38","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/0277-9536(93)90459-H","article-title":"An application of Ajzen's theory of planned behaviour to predict mothers' intention to use oral rehydration therapy in a rural area of Benin","volume":"37","author":"Mahougb\u00e9Hounsa","year":"1993","journal-title":"Social Science & Medicine"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib39","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1037\/a0018452","article-title":"Using the theory of planned behavior to predict gambling behavior","volume":"24","author":"Martin","year":"2010","journal-title":"Psychology of Addictive Behaviors"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib40","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1111\/j.1559-1816.1988.tb00009.x","article-title":"Predicting the performance of dental hygiene Behaviors: An examination of the fishbein and ajzen model and self-efficacy expectations","volume":"18","author":"McCaul","year":"1988","journal-title":"Journal of Applied Social Psychology"},{"key":"10.1016\/j.chb.2017.04.045_bib41","series-title":"Approaches to the study of social structure","first-page":"21","article-title":"Structural analysis in sociology","author":"Merton","year":"1976"},{"key":"10.1016\/j.chb.2017.04.045_bib42","series-title":"Social psychology and health: European perspectives","first-page":"47","article-title":"Addictive behaviours: Predictors of abstinence intentions and expectations in the theory of planned behaviour","author":"Morojele","year":"1994"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib43","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/S1071-5819(03)00114-9","article-title":"Predicting the use of web-based information systems: Self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model","volume":"59","author":"Mun","year":"2003","journal-title":"International Journal of Human-computer Studies"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib44","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.paid.2011.11.007","article-title":"Why do people use Facebook?","volume":"52","author":"Nadkarni","year":"2012","journal-title":"Personality and Individual Differences"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib45","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1111\/1467-7660.00110","article-title":"Shifting ties: Social networks in the surgical instrument cluster of Sialkot, Pakistan","volume":"30","author":"Nadvi","year":"1999","journal-title":"Development and Change"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib46","first-page":"318","article-title":"From borrowing to blending: Rethinking the processes of organizational theory building","volume":"36","author":"Oswick","year":"2011","journal-title":"Academy of Management Review"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib47","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1111\/j.2044-8309.1995.tb01053.x","article-title":"Extending the theory of planned behaviour: The role of personal norm","volume":"34","author":"Parker","year":"1995","journal-title":"British Journal of Social Psychology"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib48","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1037\/0021-9010.77.1.94","article-title":"Intention to commit driving violations: An application of the theory of planned behavior","volume":"77","author":"Parker","year":"1992","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib49","first-page":"240","article-title":"What drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behavior","volume":"3","author":"Pavlou","year":"2002","journal-title":"Journal of Electronic Commerce Research"},{"issue":"6","key":"10.1016\/j.chb.2017.04.045_bib50","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1089\/cpb.2009.0109","article-title":"The theory of planned behavior applied to young people's use of social networking websites","volume":"12","author":"Pelling","year":"2009","journal-title":"CyberPsychology & Behavior"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib51","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1089\/cpb.2007.9927","article-title":"Social networking profiles: An examination of student attitudes regarding use and appropriateness of content","volume":"11","author":"Peluchette","year":"2008","journal-title":"CyberPsychology & Behavior"},{"issue":"6","key":"10.1016\/j.chb.2017.04.045_bib71","doi-asserted-by":"crossref","first-page":"2788","DOI":"10.1016\/j.chb.2013.07.016","article-title":"Internal and external influences on social networking site usage in Thailand","volume":"29","author":"Pornsakulvanich","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib52","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1348\/135910700168810","article-title":"Application of the Theory of Planned Behavior to two dietary behaviors: Roles of perceived control and self-efficacy","volume":"5","author":"Povey","year":"2000","journal-title":"British Journal of Health Psychology"},{"key":"10.1016\/j.chb.2017.04.045_bib53","series-title":"The digital Economy: Social interaction technologies _ an overview","author":"Redondo","year":"2015"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib72","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.chb.2008.12.024","article-title":"Personality and motivations associated with Facebook use","volume":"25","author":"Ross","year":"2009","journal-title":"Computers in human behavior"},{"issue":"5","key":"10.1016\/j.chb.2017.04.045_bib54","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1016\/j.chb.2011.02.004","article-title":"Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage","volume":"27","author":"Ryan","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib55","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1037\/0022-3514.49.3.843","article-title":"Intention, perceived control, and weight loss: An application of the theory of planned behavior","volume":"49","author":"Schifter","year":"1985","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib56","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1027\/1864-1105.20.2.67","article-title":"The relationship between unwillingness-to-communicate and students' Facebook use","volume":"20","author":"Sheldon","year":"2008","journal-title":"Journal of Media Psychology"},{"issue":"1\u20132","key":"10.1016\/j.chb.2017.04.045_bib57","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1089\/cyber.2010.0049","article-title":"Contingencies of self-worth and social-networking-site behavior","volume":"14","author":"Stefanone","year":"2011","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"6","key":"10.1016\/j.chb.2017.04.045_bib58","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.appdev.2008.07.002","article-title":"Social capital, self-esteem, and use of online social network sites: A longitudinal analysis","volume":"29","author":"Steinfield","year":"2008","journal-title":"Journal of Applied Developmental Psychology"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib59","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1016\/j.jesp.2009.03.007","article-title":"Alone and without purpose: Life loses meaning following social exclusion","volume":"45","author":"Stillman","year":"2009","journal-title":"Journal of Experimental Social Psychology"},{"issue":"2","key":"10.1016\/j.chb.2017.04.045_bib60","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1037\/0022-3514.74.2.482","article-title":"The shifting basis of life satisfaction judgments across cultures: Emotions versus norms","volume":"74","author":"Suh","year":"1998","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"10.1016\/j.chb.2017.04.045_bib61","doi-asserted-by":"crossref","first-page":"371","DOI":"10.2307\/2393788","article-title":"What theory is not","volume":"40","author":"Sutton","year":"1995","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib62","first-page":"117","article-title":"Politics of defection in Struggling democracies","volume":"20","author":"Tariq","year":"2015","journal-title":"Pakistan Perspectives"},{"issue":"5","key":"10.1016\/j.chb.2017.04.045_bib63","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1057\/ejis.2012.1","article-title":"The benefits and dangers of enjoyment with social networking websites","volume":"21","author":"Turel","year":"2012","journal-title":"European Journal of Information Systems"},{"issue":"5","key":"10.1016\/j.chb.2017.04.045_bib73","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1089\/cpb.2006.9.584","article-title":"Friend networking sites and their relationship to adolescents' well-being and social self-esteem","volume":"9","author":"Valkenburg","year":"2006","journal-title":"CyberPsychology and Behavior"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib64","doi-asserted-by":"crossref","first-page":"486","DOI":"10.5465\/AMR.1989.4308370","article-title":"Nothing is quite so practical as a good theory","volume":"14","author":"Van de Ven","year":"1989","journal-title":"Academy of Management Review"},{"issue":"4","key":"10.1016\/j.chb.2017.04.045_bib65","doi-asserted-by":"crossref","first-page":"490","DOI":"10.2307\/258554","article-title":"What constitutes a theoretical contribution?","volume":"14","author":"Whetten","year":"1989","journal-title":"Academy of Management Review"},{"issue":"1","key":"10.1016\/j.chb.2017.04.045_bib66","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.chb.2008.06.002","article-title":"Exploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory","volume":"25","author":"Yaobin","year":"2009","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"10.1016\/j.chb.2017.04.045_bib67","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1016\/j.jesp.2005.10.007","article-title":"How long does it last? The persistence of the effects of ostracism in the socially anxious","volume":"42","author":"Zadro","year":"2006","journal-title":"Journal of Experimental Social Psychology"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S074756321730287X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S074756321730287X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T12:23:35Z","timestamp":1569068615000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S074756321730287X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":71,"alternative-id":["S074756321730287X"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2017.04.045","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2017,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The role of intentions in facebook usage among educated youth in Pakistan: An extension of the theory of planned behavior","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2017.04.045","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}