{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:04:48Z","timestamp":1740135888549,"version":"3.37.3"},"reference-count":86,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,2,2]],"date-time":"2015-02-02T00:00:00Z","timestamp":1422835200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2,2]]},"abstract":"Purpose<\/jats:title>\u2013 The purpose of this paper is to examine the factors associated with user satisfaction in the social network sites (SNSs), and to explore the moderating effects of gender on user satisfaction.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>\u2013 A research model was built upon the expectation disconfirmation model (EDM) with a focus on SNSs specific motivations (i.e. relationship maintenance and entertainment). The model was tested empirically with 221 experienced Facebook users using an online survey.<\/jats:p><\/jats:sec>Findings<\/jats:title>\u2013 The research model explained 40.5 percent of the variance in user satisfaction. In addition, the results showed that entertainment plays a more important role in determining user satisfaction with SNSs for male users, while relationship maintenance is more important in determining user satisfaction with SNSs for female users.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>\u2013 The current study enriched the theoretical understanding of user satisfaction in the context of SNSs. Particularly, perceptions and disconfirmations about the use of SNSs were identified and empirically tested. Furthermore, gender differences in terms of SNSs usage were empirically demonstrated.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>\u2013 The present study is one of the first few studies that attempts to explain user satisfaction with SNSs as well as examine the role of gender with a theoretical foundation. It complements the empirical research in the IS literature that addresses new social communication technologies.<\/jats:p><\/jats:sec>","DOI":"10.1108\/imds-08-2014-0234","type":"journal-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T14:27:33Z","timestamp":1421677653000},"page":"182-206","source":"Crossref","is-referenced-by-count":57,"title":["Gender differences in satisfaction with Facebook users"],"prefix":"10.1108","volume":"115","author":[{"given":"Tommy K. H.","family":"Chan","sequence":"first","affiliation":[]},{"given":"Christy M. K.","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"Na","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Matthew K. O.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"crossref","unstructured":"Assensoh-Kodua, A. and Lekhanya, L.M. (2014), \u201cA theoretic extension and empirical investigation of conducting business online social network: the continuance intention phenomenon\u201d, Journal of Economics and Behavioral Studies , Vol. 6 No. 5, pp. 373-385.","key":"key2020122622371102600_b1","DOI":"10.22610\/jebs.v6i5.500"},{"doi-asserted-by":"crossref","unstructured":"Baek, K. , Holton, A. , Harp, D. and Yaschur, C. (2011), \u201cThe links that bind: uncovering novel motivations for linking on Facebook\u201d, Computers in Human Behavior , Vol. 27 No. 6, pp. 2243-2248.","key":"key2020122622371102600_b2","DOI":"10.1016\/j.chb.2011.07.003"},{"unstructured":"Bailey, J.E. and Pearson, S.W. (1983), \u201cDevelopment of a tool for measuring and analyzing computer user satisfaction\u201d, Management Decision , Vol. 29 No. 5, pp. 530-545.","key":"key2020122622371102600_b3"},{"doi-asserted-by":"crossref","unstructured":"Baker, E.W. , Al-Gahtani, S.S. and Hubona, G.S. (2007), \u201cThe effects of gender and age on new technology implementation in a developing country: testing the theory of planned behavior\u201d, Information Technology & People , Vol. 20 No. 4, pp. 352-375.","key":"key2020122622371102600_b4","DOI":"10.1108\/09593840710839798"},{"doi-asserted-by":"crossref","unstructured":"Benbasat, I. and Zmud, R.W. (2003), \u201cThe identity crisis within the IS discipline: defining and communicating the discipline\u2019s core properties\u201d, MIS Quarterly , Vol. 27 No. 2, pp. 183-194.","key":"key2020122622371102600_b5","DOI":"10.2307\/30036527"},{"doi-asserted-by":"crossref","unstructured":"Bhattacherjee, A. (2001), \u201cUnderstanding information systems continuance: an expectation-confirmation model\u201d, MIS Quarterly , Vol. 25 No. 3, pp. 351-370.","key":"key2020122622371102600_b6","DOI":"10.2307\/3250921"},{"doi-asserted-by":"crossref","unstructured":"Chou, H.-K. , Lin, I.C. , Woung, L.-C. and Tsai, M.-T. (2012), \u201cEngagement in E-learning opportunities: an empirical study on patient education using expectation confirmation theory\u201d, Journal of Medical Systems , Vol. 36 No. 3, pp. 1697-1706.","key":"key2020122622371102600_b7","DOI":"10.1007\/s10916-010-9630-9"},{"doi-asserted-by":"crossref","unstructured":"Chou, S.-W. , Min, H.-T. , Chang, Y.-C. and Lin, C.-T. (2010), \u201cUnderstanding continuance intention of knowledge creation using extended expectation-confirmation theory: an empirical study of Taiwan and China online communities\u201d, Behaviour & Information Technology , Vol. 29 No. 6, pp. 557-570.","key":"key2020122622371102600_b8","DOI":"10.1080\/01449290903401986"},{"unstructured":"Cohen, J. (1988), Statistical Power Analysis for the Behavioral Sciences , Lawrence Erlbaum, Hillsdale, NJ.","key":"key2020122622371102600_b9"},{"doi-asserted-by":"crossref","unstructured":"Deaux, K. and Major, B. (1987), \u201cPutting gender into context: an interactive model of gender-related behavior\u201d, Psychological Review , Vol. 94 No. 3, pp. 369-389.","key":"key2020122622371102600_b11","DOI":"10.1037\/0033-295X.94.3.369"},{"unstructured":"Debrand, C.C. and Johnson, J.J. (2008), \u201cGender differences in email and instant messaging: a study of undergraduate business information systems students\u201d, Journal of Computer Information Systems , Vol. 48 No. 3, pp. 20-30.","key":"key2020122622371102600_b12"},{"doi-asserted-by":"crossref","unstructured":"Di Leonardo, M. (1987), \u201cThe female world of cards and holidays: women, families and the work of kinship\u201d, Signs: Journal of Women in Culture in Society , Vol. 12 No. 3, pp. 440-453.","key":"key2020122622371102600_b13","DOI":"10.1086\/494338"},{"doi-asserted-by":"crossref","unstructured":"Djamasbi, S. and Loiacono, E.T. (2008), \u201cDo men and women use feedback provided by their decision support systems (DSS) differently?\u201d, Decision Support Systems , Vol. 44 No. 4, pp. 854-869.","key":"key2020122622371102600_b14","DOI":"10.1016\/j.dss.2007.10.008"},{"doi-asserted-by":"crossref","unstructured":"Doll, W.J. and Torkzadeh, G. (1988), \u201cThe measurement of end-user computing satisfaction\u201d, MIS Quarterly , Vol. 12 No. 2, pp. 259-274.","key":"key2020122622371102600_b15","DOI":"10.2307\/248851"},{"doi-asserted-by":"crossref","unstructured":"Eagle, A. and Steffen, V. (1984), \u201cGender stereotypes stem from the distribution of women and men into social roles\u201d, Journal of Personality and Social Psychology , Vol. 46, pp. 735-754.","key":"key2020122622371102600_b16","DOI":"10.1037\/0022-3514.46.4.735"},{"unstructured":"Ellison, N. , Steinfield, C. and Lampe, C. (2006), \u201cSpatially bounded online social networks and social capital: the role of Facebook\u201d, paper presented at the Annual Conference of the International Communication Association, Dresden.","key":"key2020122622371102600_b17"},{"unstructured":"Fallows, D. (2005), \u201cHow women and men use the internet\u201d, available at: www.pewinternet.org\/\/media\/\/Files\/Reports\/2005\/PIP_:Women_:and_:Men_:online.pdf (accessed March 2, 2014).","key":"key2020122622371102600_b18"},{"doi-asserted-by":"crossref","unstructured":"Festinger, L. (1957), A Theory of Cognitive Dissonance , Stanford University, Stanford.","key":"key2020122622371102600_b19","DOI":"10.1515\/9781503620766"},{"doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D.F. (1981), \u201cEvaluating structural equation models with unobservable variables and measurement error\u201d, Journal of Marketing Research , Vol. 18 No. 1, pp. 39-50.","key":"key2020122622371102600_b20","DOI":"10.1177\/002224378101800104"},{"unstructured":"Fowler, F.J. (2009), Survey Research Methods, Vol. 1 , Sage Publications, Thousand Oaks, CA.","key":"key2020122622371102600_b21"},{"doi-asserted-by":"crossref","unstructured":"Gangadharbatla, H. (2008), \u201cFacebook me: collective self-esteem, need to belong, and internet self-efficacy as predictors of the igeneration\u2019s attitudes toward social networking sites\u201d, Journal of Interactive Advertising , Vol. 8 No. 2, pp. 1-28.","key":"key2020122622371102600_b22","DOI":"10.1080\/15252019.2008.10722138"},{"unstructured":"Hair, J.F. , Black, W.C. , Babin, B.J. , Anderson, R.E. and Tatham, R.L.H. (2006), Multivariate Data Analysis , Pearson, Prentice, NJ.","key":"key2020122622371102600_b23"},{"unstructured":"Hair, J.F. , Hult, G.T.M. , Sarstedt, M. and Ringle, C. (2014), A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) , SAGE Publications, Thousand Oaks, CA.","key":"key2020122622371102600_b24"},{"unstructured":"Hargittai, E. and Hsieh, Y.-l.P. (2010), \u201cPredictors and consequences of differentiated practices on social network sites\u201d, Information, Communication & Society , Vol. 13 No. 4, p. 515.","key":"key2020122622371102600_b25"},{"unstructured":"Harman, H.H. (1967), Modern Factor Analysis , University of Chicago Press, Chicago, IL.","key":"key2020122622371102600_b26"},{"doi-asserted-by":"crossref","unstructured":"Heriyati, P. and Siek, T.P. (2011), \u201cEffects of word of mouth communication and perceived quality on decision making moderated by gender: Jakarta Blackberry smartphone consumer\u2019s perspective\u201d, Contemporary Management Research , Vol. 7 No. 4, pp. 329-336.","key":"key2020122622371102600_b27","DOI":"10.7903\/cmr.9698"},{"doi-asserted-by":"crossref","unstructured":"Hong, S. , Thong, J.Y.L. and Tam, K.Y. (2006), \u201cUnderstanding continued information technology usage behavior: a comparison of three models in the context of mobile internet\u201d, Decision Support Systems , Vol. 42 No. 3, pp. 1819-1834.","key":"key2020122622371102600_b28","DOI":"10.1016\/j.dss.2006.03.009"},{"doi-asserted-by":"crossref","unstructured":"Hong, W. , Chan, F.K.Y. , Thong, J.Y.L. , Chasalow, L.C. and Dhillon, G. (2014), \u201cA framework and guidelines for context-specific theorizing in information systems research\u201d, Information Systems Research , Vol. 25 No. 1, pp. 111-136.","key":"key2020122622371102600_b29","DOI":"10.1287\/isre.2013.0501"},{"doi-asserted-by":"crossref","unstructured":"Huang, L.-Y. and Hsieh, Y.-J. (2011), \u201cPredicting online game loyalty based on need gratification and experiential motives\u201d, Internet Research , Vol. 21 No. 5, pp. 581-598.","key":"key2020122622371102600_b30","DOI":"10.1108\/10662241111176380"},{"doi-asserted-by":"crossref","unstructured":"Ilie, V. , Slyke, C.V. , Green, G. and Lou, H. (2005), \u201cGender differences in perceptions and use of communication technologies: a diffusion of innovation approach\u201d, Information Resources Management Journal , Vol. 18 No. 3, pp. 13-31.","key":"key2020122622371102600_b31","DOI":"10.4018\/irmj.2005070102"},{"unstructured":"InternetWorldStats (2013), \u201cFacebook stats for years\u201d, available at: www.internetworldstats.com\/facebook.htm (accessed March 2, 2014).","key":"key2020122622371102600_b32"},{"doi-asserted-by":"crossref","unstructured":"Jin, X.-L. , Zhou, Z. , Lee, M.K.O. and Cheung, C.M.K. (2013), \u201cWhy users keep answering questions in online question answering communities: a theoretical and empirical investigation\u201d, International Journal of Information Management , Vol. 33 No. 1, pp. 93-104.","key":"key2020122622371102600_b33","DOI":"10.1016\/j.ijinfomgt.2012.07.007"},{"doi-asserted-by":"crossref","unstructured":"Joiner, R. , Gavin, J. , Brosnan, M. , Cromby, J. , Gregory, H. , Guiller, J. and Moon, A. (2012), \u201cGender, internet experience, internet identification, and internet anxiety: a ten-year followup\u201d, Cyberpsychology, Behavior, and Social Networking , Vol. 15 No. 7, pp. 370-372.","key":"key2020122622371102600_b34","DOI":"10.1089\/cyber.2012.0033"},{"doi-asserted-by":"crossref","unstructured":"Joinson, A.N. (2008), \u201cLooking at\u2019, \u2018Looking up\u2019 or \u2018Keeping up with\u2019 people? Motives and uses of Facebook\u201d, paper presented at the 26th Annual CHI Conference on Human Factors in Computing Systems, Florence, April 5-10.","key":"key2020122622371102600_b35","DOI":"10.1145\/1357054.1357213"},{"doi-asserted-by":"crossref","unstructured":"Keil, M. , Wei, K. , Saarinen, T. , Tuunainen, V. and Wassenaar, A. (2009), \u201cA cross-cultural study on escalation of commitment behavior in software projects\u201d, MIS Quarterly , Vol. 24 No. 2, pp. 299-325.","key":"key2020122622371102600_b151","DOI":"10.2307\/3250940"},{"doi-asserted-by":"crossref","unstructured":"Kluemper, D.H. and Rosen, P.A. (2009), \u201cFuture employment selection methods: evaluating social networking web sites\u201d, Journal of Managerial Psychology , Vol. 24 No. 6, pp. 567-580.","key":"key2020122622371102600_b36","DOI":"10.1108\/02683940910974134"},{"doi-asserted-by":"crossref","unstructured":"Koivum\u00e4ki, T. , Ristola, A. and Kesti, M. (2008), \u201cThe effects of information quality of mobile information services on user satisfaction and service acceptance \u2013 empirical evidence from Finland\u201d, Behaviour & Information Technology , Vol. 27 No. 5, pp. 375-385.","key":"key2020122622371102600_b37","DOI":"10.1080\/01449290601177003"},{"doi-asserted-by":"crossref","unstructured":"Lampe, C. , Ellison, N. and Steinfield, C. (2006), \u201cA Face(book) in the crowd: social searching vs. social browsing\u201d, paper presented at The Computer Supported Cooperative Work Conference, Banff, Alberta.","key":"key2020122622371102600_b38","DOI":"10.1145\/1180875.1180901"},{"unstructured":"Lenhart, A. (2009), \u201cAdults and social network web sites\u201d, available at: www.pewinternet.org\/Reports\/2009\/Adults-and-Social-Network-Websites.aspx","key":"key2020122622371102600_b39"},{"doi-asserted-by":"crossref","unstructured":"Li, D.C. (2011), \u201cOnline social network acceptance: a social perspective\u201d, Internet Research , Vol. 21 No. 5, pp. 562-580.","key":"key2020122622371102600_b40","DOI":"10.1108\/10662241111176371"},{"doi-asserted-by":"crossref","unstructured":"Li\u00e9bana-Cabanillas, F. , Mu\u00f1oz-Leiva, F. and Rej\u00f3n-Guardia, F. (2013), \u201cThe determinants of satisfaction with e-banking\u201d, Industrial Management & Data Systems , Vol. 113 No. 5, pp. 750-767.","key":"key2020122622371102600_b41","DOI":"10.1108\/02635571311324188"},{"doi-asserted-by":"crossref","unstructured":"Lin, C. and Lekhawipat, W. (2014), \u201cFactors affecting online repurchase intention\u201d, Industrial Management & Data Systems , Vol. 114 No. 4, pp. 597-611.","key":"key2020122622371102600_b42","DOI":"10.1108\/IMDS-10-2013-0432"},{"doi-asserted-by":"crossref","unstructured":"Lin, C.S. , Wu, S. and Tsai, R.J. (2005), \u201cIntegrating perceived playfulness into expectation-con\ufb01rmation model for web portal context\u201d, Information & Management , Vol. 42 No. 5, pp. 683-693.","key":"key2020122622371102600_b43","DOI":"10.1016\/j.im.2004.04.003"},{"doi-asserted-by":"crossref","unstructured":"Lin, H. , Fan, W. and Chau, P.Y.K. (2014), \u201cDeterminants of users\u2019 continuance of social networking sites: a self-regulation perspective\u201d, Information & Management , Vol. 51 No. 5, pp. 595-603.","key":"key2020122622371102600_b44","DOI":"10.1016\/j.im.2014.03.010"},{"doi-asserted-by":"crossref","unstructured":"McKinney, V. , Yoon, K. and Zahedi, F.M. (2002), \u201cThe measurement of web-customer satisfaction: an expectation and disconfirmation approach\u201d, Information Systems Research , Vol. 13 No. 3, pp. 296-315.","key":"key2020122622371102600_b47","DOI":"10.1287\/isre.13.3.296.76"},{"doi-asserted-by":"crossref","unstructured":"Mansumitrchai, S. , Park, C.-H. and Chiu, C.L. (2012), \u201cFactors underlying the adoption of social network: a study of Facebook users in South Korea\u201d, International Journal of Business and Management , Vol. 7 No. 24, pp. 138-153.","key":"key2020122622371102600_b45","DOI":"10.5539\/ijbm.v7n24p138"},{"doi-asserted-by":"crossref","unstructured":"Maslow, A.H. (1943), \u201cA theory of human motivation\u201d, Psychological Review , Vol. 50 No. 4, pp. 370-396.","key":"key2020122622371102600_b46","DOI":"10.1037\/h0054346"},{"doi-asserted-by":"crossref","unstructured":"Matos, C.A. and Rossi, C.A.V. (2008), \u201cWord-of-mouth communications in marketing: a meta-analytic review of the antecedents and moderators\u201d, Journal of the Academy of Marketing Science , Vol. 36 No. 4, pp. 578-596.","key":"key2020122622371102600_b10","DOI":"10.1007\/s11747-008-0121-1"},{"unstructured":"Miller, R. , Parsons, K. and Lifer, D. (2010), \u201cStudents and social networking sites: the posting paradox\u201d, Behaviour & Information Technology , Vol. 29 No. 4, p. 377.","key":"key2020122622371102600_b48"},{"doi-asserted-by":"crossref","unstructured":"Morris, M.G. , Venkatesh, V. and Ackerman, P.L. (2005), \u201cGender and age differences in employee decisions about new technology: an extension to the theory of planned behavior\u201d, IEEE Transactions on Engineering Management , Vol. 52 No. 1, pp. 69-84.","key":"key2020122622371102600_b49","DOI":"10.1109\/TEM.2004.839967"},{"doi-asserted-by":"crossref","unstructured":"Norizan Mohd, K. and Ismail, S. (2009), \u201cInvestigating the complex drivers of loyalty in e-commerce settings\u201d, Measuring Business Excellence , Vol. 13 No. 1, pp. 56-71.","key":"key2020122622371102600_b50","DOI":"10.1108\/13683040910943054"},{"unstructured":"Nyland, R. and Near, C. (2007), \u201cJesus is my friend: religiosity as a mediating factor in internet social networking use\u201d, paper presented at the Association for Education in Journalism and Mass Communication (AEJMC) Midwinter Conference, Reno, NV.","key":"key2020122622371102600_b51"},{"doi-asserted-by":"crossref","unstructured":"Ong, C. and Lai, J. (2006), \u201cGender differences in perceptions and relationships among dominants of e-learning acceptance\u201d, Computers in Human Behavior , Vol. 22 No. 5, pp. 816-829.","key":"key2020122622371102600_b52","DOI":"10.1016\/j.chb.2004.03.006"},{"unstructured":"Pageviral (2013), \u201cStatistics & insights: Hong Kong\u201d, available at: www.pageviral.com\/facebook-stats.php?cc=hk (accessed March 2, 2014).","key":"key2020122622371102600_b53"},{"unstructured":"Palmgreen, P. , Wenner, L.A. and Rosengren, K.E. (1985), Uses and Gratifications Research: Current Perspectives , Sage, London.","key":"key2020122622371102600_b54"},{"doi-asserted-by":"crossref","unstructured":"Pavlou, P.A. , Huigang, L. and Yajiong, X. (2007), \u201cUnderstanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective\u201d, MIS Quarterly , Vol. 31 No. 11, pp. 105-136.","key":"key2020122622371102600_b55","DOI":"10.2307\/25148783"},{"unstructured":"PewInternet (2011), \u201cWhy Americans use social media\u201d, available at: www.pewinternet.org\/Reports\/2011\/Why-Americans-Use-Social-Media.aspx (accessed March 2, 2014).","key":"key2020122622371102600_b56"},{"unstructured":"PewInternet (2013), \u201cSocial media update 2013\u201d, available at: www.pewinternet.org\/2013\/12\/30\/social-media-update-2013\/ (accessed March 23, 2014).","key":"key2020122622371102600_b57"},{"doi-asserted-by":"crossref","unstructured":"Raacke, J. and Bonds-Raacke, J. (2008), \u201cMySpace and Facebook: applying the uses and gratifications theory to exploring friend-networking sites\u201d, CyberPsychology & Behavior , Vol. 11 No. 2, pp. 169-174.","key":"key2020122622371102600_b58","DOI":"10.1089\/cpb.2007.0056"},{"doi-asserted-by":"crossref","unstructured":"Riquelme, H.E. and Rios, R.E. (2010), \u201cThe moderating effect of gender in the adoption of mobile banking\u201d, The International Journal of Bank Marketing , Vol. 28 No. 5, pp. 328-341.","key":"key2020122622371102600_b59","DOI":"10.1108\/02652321011064872"},{"doi-asserted-by":"crossref","unstructured":"Rosenthal, C. (1985), \u201cKinkeeping in the familial division of labor\u201d, Journal of Marriage and the Family , Vol. 47 No. 4, pp. 965-974.","key":"key2020122622371102600_b60","DOI":"10.2307\/352340"},{"doi-asserted-by":"crossref","unstructured":"Ruth, R.D. (2012), \u201cConversation as a source of satisfaction and continuance in a question-and-answer site\u201d, European Journal of Information Systems , Vol. 21 No. 4, pp. 427-437.","key":"key2020122622371102600_b61","DOI":"10.1057\/ejis.2011.42"},{"doi-asserted-by":"crossref","unstructured":"San-Martin, S. and L\u00f3pez-Catal\u00e1n, B. (2013), \u201cHow can a mobile vendor get satisfied customers?\u201d, Industrial Management & Data Systems , Vol. 113 No. 2, pp. 156-170.","key":"key2020122622371102600_b62","DOI":"10.1108\/02635571311303514"},{"doi-asserted-by":"crossref","unstructured":"Shen, A.X.L. , Lee, M.K.O. , Cheung, C.M.K. and Chen, H-.P. (2010), \u201cGender differences in intentional social action: we-intention to engage in social network-facilitated team collaboration\u201d, Journal of Information Technology , Vol. 25 No. 2, pp. 152-169.","key":"key2020122622371102600_b63","DOI":"10.1057\/jit.2010.12"},{"doi-asserted-by":"crossref","unstructured":"Shiau, W.L. and Chau, P.Y.K. (2012), \u201cUnderstanding blog continuance: a model comparison approach\u201d, Industrial Management + Data Systems , Vol. 112 No. 4, pp. 663-682.","key":"key2020122622371102600_b64","DOI":"10.1108\/02635571211225530"},{"doi-asserted-by":"crossref","unstructured":"Shih, H.-P. (2004), \u201cAn empirical study on predicting user acceptance of e-shopping on the web\u201d, Information & Management , Vol. 41 No. 3, pp. 351-368.","key":"key2020122622371102600_b65","DOI":"10.1016\/S0378-7206(03)00079-X"},{"unstructured":"Sledgianowski, D. and Kulviwat, S. (2009), \u201cUsing social network sites: the effects of playfulness, critical mass and trust in a hedonic context\u201d, Journal of Computer Information Systems , Vol. 49 No. 4, p. 74.","key":"key2020122622371102600_b66"},{"unstructured":"SocialBakers (2013a), \u201cCandy Crush Saga Facebook page statistics\u201d, available at: www.socialbakers.com\/facebook-pages\/244944385603396-candy-crush-saga (accessed March 2, 2014).","key":"key2020122622371102600_b67"},{"unstructured":"SocialBakers (2013b), \u201cSpotify Facebook page statistics\u201d, available at: www.socialbakers.com\/facebook-pages\/6243987495-spotify (accessed March 2, 2014).","key":"key2020122622371102600_b68"},{"doi-asserted-by":"crossref","unstructured":"Special, W.P. and Li-Barber, K.T. (2012), \u201cSelf-disclosure and student satisfaction with facebook\u201d, Computers in Human Behavior , Vol. 28 No. 2, pp. 624-630.","key":"key2020122622371102600_b69","DOI":"10.1016\/j.chb.2011.11.008"},{"doi-asserted-by":"crossref","unstructured":"Sung, Y.C. and Hahn, M. (2007), \u201cNetwork externality and future usage of internet services\u201d, Internet Research , Vol. 17 No. 2, p. 156, doi: http:\/\/dx.doi.org\/10.1108\/10662240710737013.","key":"key2020122622371102600_b70","DOI":"10.1108\/10662240710737013"},{"doi-asserted-by":"crossref","unstructured":"Susarla, A. , Barua, A. and Whinston, A.B. (2003), \u201cUnderstanding the service component of application service provision: an empirical analysis of satisfaction with asp services\u201d, MIS Quarterly , Vol. 27 No. 1, pp. 91-123.","key":"key2020122622371102600_b71","DOI":"10.2307\/30036520"},{"doi-asserted-by":"crossref","unstructured":"Thelwall, M. (2009), \u201cMyspace comments\u201d, Online Information Review , Vol. 33 No. 1, pp. 58-76.","key":"key2020122622371102600_b72","DOI":"10.1108\/14684520910944391"},{"doi-asserted-by":"crossref","unstructured":"Van Slyke, C. , Ilie, V. , Lou, H. and Stafford, T. (2007), \u201cPerceived critical mass and the adoption of a communication technology\u201d, European Journal of Information Systems , Vol. 16 No. 3, pp. 270-283.","key":"key2020122622371102600_b73","DOI":"10.1057\/palgrave.ejis.3000680"},{"doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Morris, M. (2000), \u201cWhy don\u2019t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior\u201d, MIS Quarterly , Vol. 24 No. 1, pp. 115-139.","key":"key2020122622371102600_b74","DOI":"10.2307\/3250981"},{"doi-asserted-by":"crossref","unstructured":"Venkatesh, V. , Morris, M.G. , Davis, G.B. and Davis, F.D. (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly , Vol. 27 No. 3, pp. 425-478.","key":"key2020122622371102600_b75","DOI":"10.2307\/30036540"},{"doi-asserted-by":"crossref","unstructured":"Venkatesh, V. , Morris, M.G. , Sykes, T.A. and Ackerman, P.L. (2004), \u201cIndividual reactions to new technologies in the workplace: the role of gender as a psychological construct\u201d, Journal of Applied Social Psychology , Vol. 34 No. 3, pp. 445-467.","key":"key2020122622371102600_b76","DOI":"10.1111\/j.1559-1816.2004.tb02556.x"},{"doi-asserted-by":"crossref","unstructured":"WeIlman, B. (1992), \u201cMen in networks: private communities, domestic friendships\u201d, in Nardi, O.M. (Ed.), Men's Friendships , Sega, London, pp. 74-114.","key":"key2020122622371102600_b77","DOI":"10.4135\/9781483325736.n5"},{"doi-asserted-by":"crossref","unstructured":"Weiser, E.B. (2000), \u201cGender differences in internet use patterns and internet application preferences: a two-sample comparison\u201d, CyberPsychology & Behavior , Vol. 3 No. 2, pp. 167-178.","key":"key2020122622371102600_b78","DOI":"10.1089\/109493100316012"},{"doi-asserted-by":"crossref","unstructured":"Wolin, L.D. and Korgaonkar, P. (2003), \u201cWeb advertising: gender differences in beliefs, attitudes and behavior\u201d, Internet Research , Vol. 13 No. 5, pp. 375-385.","key":"key2020122622371102600_b79","DOI":"10.1108\/10662240310501658"},{"unstructured":"Xiao, Q. , Zhuang, W. and Hsu, M.K. (2014), \u201cUsing social networking sites: what is the big attraction? Exploring a mediated moderation relationship\u201d, Journal of Internet Commerce , Vol. 13 No. 1, p. 45.","key":"key2020122622371102600_b80"},{"doi-asserted-by":"crossref","unstructured":"Yeh, J.-C. , Hsiao, K.-L. and Yang, W.-N. (2012), \u201cA study of purchasing behavior in Taiwan\u2019s online auction websites\u201d, Internet Research , Vol. 22 No. 1, pp. 98-115.","key":"key2020122622371102600_b81","DOI":"10.1108\/10662241211199988"},{"doi-asserted-by":"crossref","unstructured":"Yen, C.-H. and Lu, H.-P. (2008), \u201cFactors influencing online auction repurchase intention\u201d, Internet Research , Vol. 18 No. 1, pp. 7-25.","key":"key2020122622371102600_b82","DOI":"10.1108\/10662240810849568"},{"doi-asserted-by":"crossref","unstructured":"Zhang, K.Z.K. , Lee, M.K.O. , Cheung, C.M.K. and Chen, H. (2009), \u201cUnderstanding the role of gender in bloggers\u2019 switching behavior\u201d, Decision Support Systems , Vol. 47 No. 4, pp. 540-546.","key":"key2020122622371102600_b83","DOI":"10.1016\/j.dss.2009.05.013"},{"doi-asserted-by":"crossref","unstructured":"Zhou, T. (2013), \u201cUnderstanding continuance usage of mobile sites\u201d, Industrial Management & Data Systems , Vol. 113 No. 9, pp. 1286-1299.","key":"key2020122622371102600_b84","DOI":"10.1108\/IMDS-01-2013-0001"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Z. , Fang, Y. , Vogel, D.R. , Jin, X.-L. and Zhang, X. (2012), \u201cAttracted to or locked in? Predicting continuance intention in social virtual world services\u201d, Journal of Management Information Systems , Vol. 29 No. 1, pp. 273-306.","key":"key2020122622371102600_b85","DOI":"10.2753\/MIS0742-1222290108"}],"container-title":["Industrial Management & Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMDS-08-2014-0234","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-08-2014-0234\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-08-2014-0234\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T03:22:33Z","timestamp":1690860153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-08-2014-0234\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,2]]},"references-count":86,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2,2]]}},"alternative-id":["10.1108\/IMDS-08-2014-0234"],"URL":"https:\/\/doi.org\/10.1108\/imds-08-2014-0234","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2015,2,2]]}}}