{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T17:59:16Z","timestamp":1719079156616},"reference-count":62,"publisher":"Elsevier BV","issue":"3","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Telematics and Informatics"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1016\/j.tele.2013.11.002","type":"journal-article","created":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T18:13:05Z","timestamp":1385057585000},"page":"422-433","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":73,"title":["Ubiquitous use of mobile social network services"],"prefix":"10.1016","volume":"31","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0029-5852","authenticated-orcid":false,"given":"Shahrokh","family":"Nikou","sequence":"first","affiliation":[]},{"given":"Harry","family":"Bouwman","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.tele.2013.11.002_b0005","series-title":"Action Control: From Cognition to Behavior","first-page":"11","article-title":"From Intentions to Actions: A Theory of Planned Behavior","author":"Ajzen","year":"1985"},{"issue":"3","key":"10.1016\/j.tele.2013.11.002_b0010","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/0308-5961(88)90024-9","article-title":"New telecommunications services: network externalities and critical mass","volume":"12","author":"Allen","year":"1988","journal-title":"Telecommunications Policy"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b9000","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/014492900118803","article-title":"An exploratory investigation of the antecedents and impact of internet usage: An individual perspective","volume":"19","author":"Anandarajan","year":"2000","journal-title":"Behaviour & Information Technology"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0015","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","article-title":"On the evaluation of structural equation models","volume":"16","author":"Bagozzi","year":"1988","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0020","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1177\/0049124187016001004","article-title":"Practical issues in structural modeling","volume":"16","author":"Bentler","year":"1987","journal-title":"Sociological Methods and Research"},{"key":"10.1016\/j.tele.2013.11.002_b0025","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1057\/jit.2008.36","article-title":"Copper context and conjoints: a reassessment of TAM","volume":"24","author":"Bouwman","year":"2009","journal-title":"Journal of Information Technology"},{"key":"10.1016\/j.tele.2013.11.002_b0030","unstructured":"Browne, M. W., Cudeck, R., 1993. Alternative ways of assessing model fit. In Testing Structural Equation Model Fit. Sage Focus Edition, 154, 136.162."},{"issue":"2","key":"10.1016\/j.tele.2013.11.002_b0035","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/h0046016","article-title":"Convergent and discriminant validation by the multitrait-multimethod matrix","volume":"56","author":"Campbell","year":"1959","journal-title":"Psychological bulletin"},{"issue":"2013","key":"10.1016\/j.tele.2013.11.002_b0040","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.tele.2012.10.006","article-title":"Examining users\u2019 intention to continue using social network games: a flow experience perspective","volume":"30","author":"Chang","year":"2013","journal-title":"Telematics & Informatics"},{"key":"10.1016\/j.tele.2013.11.002_b0045","unstructured":"CNNIC. (2012). Statistical Report on Internet Development in China, January 2013. Available at: (retrived 19.4.2013)."},{"key":"10.1016\/j.tele.2013.11.002_b0050","unstructured":"CNNIC (China Internet Network Information Center), 2011. Statistical Report on Internet Development in China (July 2011). Available from: http:\/\/www.cnnic.cn\/dtygg\/dtgg\/201107\/W020110719521725234632.pdf> (retrieved July 14, 2013)."},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0055","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1287\/isre.1120.0423","article-title":"Generalizability of information systems research using student \u2013 a reflection on our practices and recommendations for feature research","volume":"23","author":"Compeau","year":"2013","journal-title":"Information Systems Research"},{"key":"10.1016\/j.tele.2013.11.002_b0060","first-page":"247","article-title":"Understanding m-commerce: a consumer-centric model","volume":"3","author":"Coursaris","year":"2002","journal-title":"Quarterly journal of electronic commerce"},{"key":"10.1016\/j.tele.2013.11.002_b0065","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS quarterly"},{"issue":"14","key":"10.1016\/j.tele.2013.11.002_b0070","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","article-title":"Extrinsic and intrinsic motivation to use computers in the workplace1","volume":"22","author":"Davis","year":"1992","journal-title":"Journal of Applied Social Psychology"},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0075","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","article-title":"The benefits of Facebook \u201cfriends:\u201d Social capital and college students\u2019 use of online social network sites","volume":"12","author":"Ellison","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10.1016\/j.tele.2013.11.002_b0080","unstructured":"Facebook Report, 2013. Available at: (retrieved 19.4.2013)."},{"key":"10.1016\/j.tele.2013.11.002_b0085","series-title":"Belief, Attitude, Intention, and Behaviour: An Introduction to Theory and Research","author":"Fishbein","year":"1975"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0090","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0095","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.1997.tb00062.x","article-title":"Studying online social networks","volume":"3","author":"Garton","year":"1997","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10.1016\/j.tele.2013.11.002_b0100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00008","article-title":"The relative importance of perceived ease of use in IS adoption: a study of e-commerce adoption","volume":"1","author":"Gefen","year":"2000","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"10.1016\/j.tele.2013.11.002_b0105","first-page":"1","article-title":"An Exploration of Social Networking Sites (SNS) adoption in malaysia using technology acceptance Model (TAM), Theory of Planned Behavior (TPB) and Intrinsic Motivation","volume":"16","author":"Goh","year":"2004","journal-title":"Journal of Internet Banking and Commerce"},{"issue":"3","key":"10.1016\/j.tele.2013.11.002_b0110","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1177\/0049124183011003003","article-title":"The analysis of covariance structures goodness of fit","volume":"11","author":"Hoelter","year":"1983","journal-title":"Sociological Methods and Research"},{"key":"10.1016\/j.tele.2013.11.002_b0115","unstructured":"Hofstede, G. H., 1984. Culture\u2019s consequences: International differences in work-related values (Vol. 5): Sage Publications Inc."},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0120","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.jbi.2009.07.002","article-title":"The technology acceptance model: its past and its future in health care","volume":"43","author":"Holden","year":"2010","journal-title":"Journal of biomedical informatics"},{"key":"10.1016\/j.tele.2013.11.002_b0125","unstructured":"Huang, Q., Liu, Y., 2009. On geo-social network services. In: Proceeding of 17th International Conference on Geoinformatics, 1\u20136."},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0130","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.im.2013.02.006","article-title":"An empirical test of three mediation models for the relationship between personal innovativeness and user acceptance of technology","volume":"50","author":"Jackson","year":"2013","journal-title":"Information and Management"},{"issue":"12","key":"10.1016\/j.tele.2013.11.002_b0135","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/953460.953485","article-title":"Mobile commerce at crossroads","volume":"46","author":"J\u00e4rvenp\u00e4\u00e4","year":"2003","journal-title":"Communications of the ACM"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0140","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","article-title":"Users of the world, unite! The challenges and opportunities of Social Media","volume":"53","author":"Kaplan","year":"2010","journal-title":"Business horizons"},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0145","first-page":"351","article-title":"Nomadicity: anytime, anywhere in a disconnected world","volume":"1","author":"Kleinrock","year":"1996","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0150","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s00779-006-0128-x","article-title":"The perceptions towards mobile services: an empirical analysis of the role of use facilitators","volume":"12","author":"Koivum\u00e4ki","year":"2008","journal-title":"Personal and Ubiquitous Computing"},{"key":"10.1016\/j.tele.2013.11.002_b0155","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.chb.2009.04.011","article-title":"An empirical study of the factors affecting social network service use","volume":"26","author":"Kwon","year":"2010","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0160","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1504\/IJMC.2011.041141","article-title":"Influence of individual characteristics, perceived usefulness and ease of use on mobile entertainment adoption","volume":"9","author":"Leong","year":"2011","journal-title":"International Journal of Mobile Communications"},{"key":"10.1016\/j.tele.2013.11.002_b0165","unstructured":"Li, L., 2011. Social network sites comparison between the united states and China: Case study on facebook and renren network. In: Procedding of the International Conference on Business Management and Electronic Information (BMEI), 825\u2013827, IEEE."},{"key":"10.1016\/j.tele.2013.11.002_b0170","first-page":"274","article-title":"Intention does not always matter: the contingent role of habit in IT usage behaviour","author":"Limayem","year":"2001","journal-title":"ECIS"},{"issue":"2","key":"10.1016\/j.tele.2013.11.002_b0175","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1177\/0165551506068174","article-title":"Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions","volume":"33","author":"Lin","year":"2007","journal-title":"Journal of Information Science"},{"issue":"3","key":"10.1016\/j.tele.2013.11.002_b0180","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1016\/j.chb.2010.12.009","article-title":"Why people use social networking sites: an empirical study integrating network externalities and motivation theory","volume":"27","author":"Lin","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10.1016\/j.tele.2013.11.002_b0185","first-page":"198","article-title":"TAM-based study on factors influencing the adoption of mobile payment","volume":"8","author":"Liu","year":"2011","journal-title":"China Communications"},{"issue":"6","key":"10.1016\/j.tele.2013.11.002_b0190","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.im.2008.05.001","article-title":"An assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models","volume":"45","author":"L\u00f3pez-Nicol\u00e1s","year":"2008","journal-title":"Information and Management"},{"issue":"3","key":"10.1016\/j.tele.2013.11.002_b0195","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.jsis.2005.07.003","article-title":"Personal innovativeness, social influences and adoption of wireless internet services via mobile technology","volume":"14","author":"Lu","year":"2005","journal-title":"The Journal of Strategic Information Systems"},{"issue":"3","key":"10.1016\/j.tele.2013.11.002_b0200","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1177\/0165551510363631","article-title":"Information sharing behavior on blogs in Taiwan: effects of interactivities and gender differences","volume":"36","author":"Lu","year":"2010","journal-title":"Journal of Information Science"},{"issue":"5","key":"10.1016\/j.tele.2013.11.002_b0205","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1177\/009365087014005003","article-title":"Toward a \u201ccritical mass\u201d theory of interactive media universal acess, interdependence and diffusion","volume":"14","author":"Markus","year":"1987","journal-title":"Communication Research"},{"key":"10.1016\/j.tele.2013.11.002_b0210","doi-asserted-by":"crossref","unstructured":"McQuail, D. (2004). With more hindsight: conceptual problems and some ways forward for media use research. K. Renckstorf, D. McQuail, JE Rosenbaum, G. Schaap (red.). Action Theory and Communication Research: Recent Developments in Europe. Berlin: Mouton de Gruyter, 35\u201350.","DOI":"10.1515\/9783110197389.1.35"},{"issue":"9","key":"10.1016\/j.tele.2013.11.002_b0215","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MC.2003.1231193","article-title":"Context-aware mobile communication in hospitals","volume":"36","author":"Miguel","year":"2003","journal-title":"IEEE Computer"},{"issue":"2013","key":"10.1016\/j.tele.2013.11.002_b0220","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.tele.2013.04.002","article-title":"The influence of online forum and SNS use on online political discussion in China: assessing \u201cspirals of trust\u201d","volume":"30","author":"Mou","year":"2013","journal-title":"Telematics and Informatics"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0225","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1037\/0033-2909.124.1.54","article-title":"Habit and intention in everyday life: the multiple processes by which past behavior predicts future behavior","volume":"124","author":"Ouellette","year":"1988","journal-title":"Psychological Bulletine"},{"key":"10.1016\/j.tele.2013.11.002_b0230","doi-asserted-by":"crossref","DOI":"10.1007\/s00779-013-0670-2","article-title":"Driver acceptance of car navigation systems: integration of locational accuracy, processing speed, and service and display quality with technology acceptance model","author":"Park","year":"2013","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2\u20133","key":"10.1016\/j.tele.2013.11.002_b0235","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1080\/19331681003753420","article-title":"Online video \u201cfriends\u201d social networking: overlapping online public spheres in the 2008 US presidential election","volume":"7","author":"Robertson","year":"2010","journal-title":"Journal of Information Technology and Politics"},{"key":"10.1016\/j.tele.2013.11.002_b0240","series-title":"Diffusion of Innovations","author":"Rogers","year":"1995"},{"key":"10.1016\/j.tele.2013.11.002_b0245","series-title":"Information Rules: A Strategic Guide to the Network Economy","author":"Shapiro","year":"1999"},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0250","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/0144929X.2011.553740","article-title":"Personality and technology acceptance: the influence of personality factors on the core constructs of the Technology Acceptance Model","volume":"32","author":"Svendsen","year":"2013","journal-title":"Behaviour & Information Technology"},{"key":"10.1016\/j.tele.2013.11.002_b0255","unstructured":"Tencent QQ., 2012. About Tencent [R\/OL]. Available from: (retrieved 19.4.2013)."},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0260","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/S0305-0483(98)00028-0","article-title":"Intrinsic and extrinsic motivation in internet usage","volume":"27","author":"Teo","year":"1999","journal-title":"Omega"},{"key":"10.1016\/j.tele.2013.11.002_b0265","series-title":"Attitude and attitude change","author":"Triandis","year":"1971"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0270","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.tele.2008.01.002","article-title":"Would you share? Predicting the potential use of a new technology","volume":"26","author":"Van de Wijngaert","year":"2009","journal-title":"Telematics and Informatics"},{"issue":"2","key":"10.1016\/j.tele.2013.11.002_b0275","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: four longitudinal field studies","volume":"46","author":"Venkatesh","year":"2000","journal-title":"Management science"},{"key":"10.1016\/j.tele.2013.11.002_b0280","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0285","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2044-8309.1998.tb01160.x","article-title":"Habit versus planned behaviour: a field experiment","volume":"37","author":"Verplanken","year":"1987","journal-title":"British Journal of Social Pyschology"},{"issue":"2","key":"10.1016\/j.tele.2013.11.002_b0290","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.1365-2575.2006.00213.x","article-title":"Predicting consumer intention to use mobile service","volume":"16","author":"Wang","year":"2006","journal-title":"Information Systems Journal"},{"key":"10.1016\/j.tele.2013.11.002_b0295","unstructured":"Yuta, K., Ono, N., Fujiwara, Y., 2007. A gap in the community-size distribution of a large-scale social networking site. Arxiv, preprint physics\/0701168, arxiv.org."},{"issue":"4","key":"10.1016\/j.tele.2013.11.002_b0300","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1007\/s00779-012-0613-3","article-title":"Understanding the effect of flow on user adoption of mobile games","volume":"17","author":"Zhou","year":"2013","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"10.1016\/j.tele.2013.11.002_b0305","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s00779-011-0485-y","article-title":"An empirical examination of the determinants of mobile purchase","volume":"17","author":"Zhou","year":"2013","journal-title":"Personal and Ubiquitous Computing"}],"container-title":["Telematics and Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0736585313000695?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0736585313000695?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T08:43:33Z","timestamp":1688805813000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0736585313000695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["S0736585313000695"],"URL":"https:\/\/doi.org\/10.1016\/j.tele.2013.11.002","relation":{},"ISSN":["0736-5853"],"issn-type":[{"value":"0736-5853","type":"print"}],"subject":[],"published":{"date-parts":[[2014,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Ubiquitous use of mobile social network services","name":"articletitle","label":"Article Title"},{"value":"Telematics and Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.tele.2013.11.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}