{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T23:39:58Z","timestamp":1722814798936},"reference-count":42,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T00:00:00Z","timestamp":1393286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2,25]]},"abstract":"\n Purpose<\/jats:title>\n \u2013 Based on social conformity and social value perspectives, the authors aim to empirically examine the critical role of social influences on Twitter user behaviour. <\/jats:p>\n <\/jats:sec>\n \n Design\/methodology\/approach<\/jats:title>\n \u2013 An integrative structural model is developed to explain how social influences, which are divided into social conformity and social values, work with other salient factors such as the utilitarian and hedonic values to affect the use of Twitter. The partial least square method was used to verify the proposed model with usable data from 204 adult Korean Twitter users. <\/jats:p>\n <\/jats:sec>\n \n Findings<\/jats:title>\n \u2013 Social conformity positively affects the frequent use of Twitter and it is mediated through perceived values such as the hedonic, utilitarian and social appearance values associated with Twitter use. While social appearance negatively affected the trustworthiness of information shared on Twitter, the social capital effect on Twitter use was insignificant. <\/jats:p>\n <\/jats:sec>\n \n Research limitations\/implications<\/jats:title>\n \u2013 This study has some limitations for general applicability of the results: the samples include only adult users in Korea, and it is a cross-sectional study for a specific social networking service. This study theoretically disentangles the complicated nature of social influences by proposing two distinct constructs (social conformity and social values) and empirically verifying their significant roles in Twitter use. <\/jats:p>\n <\/jats:sec>\n \n Practical implications<\/jats:title>\n \u2013 Practitioners should recognise that the hedonic value of Twitter is the key factor that affects both the quantity and quality of information shared on Twitter. In addition user motivations for pursuing social appearance in SNSs might cause a user to distort the information that they produce. <\/jats:p>\n <\/jats:sec>\n \n Originality\/value<\/jats:title>\n \u2013 This study provides unique implications related to the role of social conformity, social values and user behaviour on Twitter.<\/jats:p>\n <\/jats:sec>","DOI":"10.1108\/oir-11-2012-0210","type":"journal-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T17:58:01Z","timestamp":1394733481000},"page":"265-283","source":"Crossref","is-referenced-by-count":54,"title":["Why people use Twitter: social conformity and social value perspectives"],"prefix":"10.1108","volume":"38","author":[{"given":"Jaeheung","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Saesol","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Munkee","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jaejeung","family":"Rho","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010321295052000_b1","doi-asserted-by":"crossref","unstructured":"Adler, P.S.\n and \n Kwon, S.W.\n (2002), \u201cSocial capital: prospects for a new concept\u201d, Academy of Management Review, Vol. 27 No. 1, pp. 17-40.","DOI":"10.5465\/amr.2002.5922314"},{"key":"key2021010321295052000_b2","doi-asserted-by":"crossref","unstructured":"Baker, R.K.\n and \n White, K.M.\n (2010), \u201cPredicting adolescents' use of social networking sites from an extended theory of planned behaviour perspective\u201d, Computers in Human Behavior, Vol. 26 No. 6, pp. 1591-1597.","DOI":"10.1016\/j.chb.2010.06.006"},{"key":"key2021010321295052000_b3","unstructured":"Bulearca, M.\n and \n Bulearca, S.\n (2010), \u201cTwitter: a viable marketing tool for SMEs?\u201d, Global Business and Management, Vol. 2 No. 4, pp. 296-309."},{"key":"key2021010321295052000_b4","doi-asserted-by":"crossref","unstructured":"Chang, H.H.\n and \n Chuang, S.S.\n (2011), \u201cSocial capital and individual motivations on knowledge sharing: participant involvement as a moderator\u201d, Information and Management, Vol. 48 No. 1, pp. 9-18.","DOI":"10.1016\/j.im.2010.11.001"},{"key":"key2021010321295052000_b5","doi-asserted-by":"crossref","unstructured":"Chen, G.M.\n (2011), \u201cTweet this: a uses and gratifications perspective on how active Twitter use gratifies a need to connect with others\u201d, Computers in Human Behavior, Vol. 27 No. 2, pp. 755-762.","DOI":"10.1016\/j.chb.2010.10.023"},{"key":"key2021010321295052000_b6","doi-asserted-by":"crossref","unstructured":"Cialdini, R.B.\n and \n Goldstein, N.J.\n (2004), \u201cSocial influence: compliance and conformity\u201d, Annual Review of Psychology, Vol. 55, pp. 591-621.","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"key":"key2021010321295052000_b7","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319-339.","DOI":"10.2307\/249008"},{"key":"key2021010321295052000_b8","doi-asserted-by":"crossref","unstructured":"Fischer, E.\n and \n Reuber, A.R.\n (2010), \u201cSocial interaction via new social media: (how) can interactions on Twitter affect effectual thinking and behavior?\u201d, Journal of Business Venturing, Vol. 26 No. 1, pp. 1-18.","DOI":"10.1016\/j.jbusvent.2010.09.002"},{"key":"key2021010321295052000_b9","doi-asserted-by":"crossref","unstructured":"Gefen, D.\n and \n Straub, D.\n (2005), \u201cA practical guide to factorial validity using PLS-GRAPH: tutorial and annotated example\u201d, Communications of the Association for Information Systems, Vol. 16, pp. 91-109.","DOI":"10.17705\/1CAIS.01605"},{"key":"key2021010321295052000_b10","doi-asserted-by":"crossref","unstructured":"Hsiao, K.L.\n (2011), \u201cWhy internet users are willing to pay for social networking services\u201d, Online Information Review, Vol. 35 No. 5, pp. 770-788.","DOI":"10.1108\/14684521111176499"},{"key":"key2021010321295052000_b11","doi-asserted-by":"crossref","unstructured":"Hsu, C.\n and \n Lin, J.\n (2008), \u201cAcceptance of blog usage: the roles of technology acceptance, social influence and knowledge sharing motivation\u201d, Information and Management, Vol. 45 No. 1, pp. 65-74.","DOI":"10.1016\/j.im.2007.11.001"},{"key":"key2021010321295052000_b12","doi-asserted-by":"crossref","unstructured":"Huang, J.H.\n and \n Chen, Y.F.\n (2006), \u201cHerding in online product choice\u201d, Psychology and Marketing, Vol. 23 No. 5, pp. 413-428.","DOI":"10.1002\/mar.20119"},{"key":"key2021010321295052000_b13","doi-asserted-by":"crossref","unstructured":"Jansen, B.J.\n and \n Zhang, M.\n (2009), \u201cTwitter power: tweets as electronic word of mouth\u201d, Journal of the American Society for Information Science, Vol. 60 No. 11, pp. 2169-2188.","DOI":"10.1002\/asi.21149"},{"key":"key2021010321295052000_b14","doi-asserted-by":"crossref","unstructured":"Kang, Y.\n , \n Hong, S.\n and \n Lee, H.\n (2009), \u201cExploring continued online service usage behavior: the roles of self-image congruity and regret\u201d, Computers in Human Behavior, Vol. 25 No. 1, pp. 111-122.","DOI":"10.1016\/j.chb.2008.07.009"},{"key":"key2021010321295052000_b15","doi-asserted-by":"crossref","unstructured":"Kim, Y.\n , \n Sohn, D.\n and \n Choi, S.M.\n (2011), \u201cCultural difference in motivations for using social network sites: a comparative study of American and Korean college students\u201d, Computers in Human Behavior, Vol. 27 No. 1, pp. 365-372.","DOI":"10.1016\/j.chb.2010.08.015"},{"key":"key2021010321295052000_b16","doi-asserted-by":"crossref","unstructured":"Kulviwat, S.\n , \n Bruner, G.C. II\n and \n Al-Shuridah, O.\n (2009), \u201cThe role of social influence on adoption of high tech innovations: the moderating effect of public\/private consumption\u201d, Journal of Business Research, Vol. 62 No. 7, pp. 706-712.","DOI":"10.1016\/j.jbusres.2007.04.014"},{"key":"key2021010321295052000_b17","doi-asserted-by":"crossref","unstructured":"Lee, D.\n , \n Park, J.Y.\n , \n Kim, J.\n and \n Moon, J.\n (2011), \u201cUnderstanding music sharing behaviour on social network services\u201d, Online Information Review, Vol. 35 No. 5, pp. 716-733.","DOI":"10.1108\/14684521111176462"},{"key":"key2021010321295052000_b18","doi-asserted-by":"crossref","unstructured":"Li, P.P.\n (2007), \u201cSocial tie, social capital, and social behavior: toward an integrative model of informal exchange\u201d, Asia Pacific Journal of Management, Vol. 24 No. 2, pp. 227-246.","DOI":"10.1007\/s10490-006-9031-2"},{"key":"key2021010321295052000_b19","doi-asserted-by":"crossref","unstructured":"Lim, B.\n , \n Choi, M.\n and \n Park, M.C.\n (2003), \u201cThe late take-off phenomenon in the diffusion of telecommunication services: network effect and the critical mass\u201d, Information Economics and Policy, Vol. 15 No. 4, pp. 537-557.","DOI":"10.1016\/S0167-6245(03)00037-4"},{"key":"key2021010321295052000_b20","doi-asserted-by":"crossref","unstructured":"Lin, K.Y.\n and \n Lu, H.P.\n (2011), \u201cWhy people use social networking sites: an empirical study integrating network externalities and motivation theory\u201d, Computers in Human Behavior, Vol. 27 No. 3, pp. 1152-1161.","DOI":"10.1016\/j.chb.2010.12.009"},{"key":"key2021010321295052000_b21","doi-asserted-by":"crossref","unstructured":"M\u00e4ntym\u00e4ki, M.\n and \n Salo, J.\n (2011), \u201cTeenagers in social virtual worlds: continuous use and purchasing behavior in Habbo Hotel\u201d, Computers in Human Behavior, Vol. 27 No. 6, pp. 2088-2097.","DOI":"10.1016\/j.chb.2011.06.003"},{"key":"key2021010321295052000_b22","doi-asserted-by":"crossref","unstructured":"Nahapiet, J.\n and \n Ghoshal, S.\n (1998), \u201cSocial capital, intellectual capital and the organizational advantage\u201d, The Academy of Management Review, Vol. 23 No. 2, pp. 242-266.","DOI":"10.5465\/amr.1998.533225"},{"key":"key2021010321295052000_b23","doi-asserted-by":"crossref","unstructured":"Nosko, A.\n , \n Wood, E.\n and \n Molema, S.\n (2010), \u201cAll about me: disclosure in online social networking profiles: the case of Facebook\u201d, Computers in Human Behavior, Vol. 26 No. 3, pp. 406-418.","DOI":"10.1016\/j.chb.2009.11.012"},{"key":"key2021010321295052000_b24","doi-asserted-by":"crossref","unstructured":"Park, J.\n , \n Chung, H.\n and \n Rutherford, B.\n (2011), \u201cSocial perspectives of e-contact center for loyalty building\u201d, Journal of Business Research, Vol. 64 No. 1, pp. 34-38.","DOI":"10.1016\/j.jbusres.2009.09.017"},{"key":"key2021010321295052000_b25","doi-asserted-by":"crossref","unstructured":"Pfeil, U.\n , \n Arjan, R.\n and \n Zaphiris, P.\n (2009), \u201cAge differences in online social networking \u2013 a study of user profiles and the social capital divide among teenagers and older users in MySpace\u201d, Computers in Human Behavior, Vol. 25 No. 3, pp. 643-654.","DOI":"10.1016\/j.chb.2008.08.015"},{"key":"key2021010321295052000_b26","unstructured":"Pingdom\n (2012), \u201cReport: social network demographics in 2012\u201d, available at: http:\/\/royal.pingdom.com\/2012\/08\/21\/report-social-network-demographics-in-2012\/ (accessed 30 May 2013)."},{"key":"key2021010321295052000_b27","doi-asserted-by":"crossref","unstructured":"Rau, P.L.P.\n , \n Gao, Q.\n and \n Ding, Y.\n (2008), \u201cRelationship between the level of intimacy and lurking in online social network services\u201d, Computers in Human Behavior, Vol. 24 No. 6, pp. 2757-2770.","DOI":"10.1016\/j.chb.2008.04.001"},{"key":"key2021010321295052000_b28","unstructured":"Rogers, E.M.\n (1995), Diffusion of Innovations, The Free Press, New York, NY."},{"key":"key2021010321295052000_b29","doi-asserted-by":"crossref","unstructured":"Shang, R.A.\n , \n Chen, Y.C.\n and \n Shen, L.\n (2005), \u201cExtrinsic versus intrinsic motivations for consumers to shop online\u201d, Information and Management, Vol. 42 No. 3, pp. 401-413.","DOI":"10.1016\/j.im.2004.01.009"},{"key":"key2021010321295052000_b30","doi-asserted-by":"crossref","unstructured":"Shin, D.H.\n and \n Shin, Y.J.\n (2010), \u201cWhy do people play social network games?\u201d, Computers in Human Behavior, Vol. 27 No. 2, pp. 852-861.","DOI":"10.1016\/j.chb.2010.11.010"},{"key":"key2021010321295052000_b31","doi-asserted-by":"crossref","unstructured":"Song, J.\n and \n Kim, Y.J.\n (2006), \u201cSocial influence process in the acceptance of a virtual community service\u201d, Information Systems Frontiers, Vol. 8 No. 3, pp. 241-252.","DOI":"10.1007\/s10796-006-8782-0"},{"key":"key2021010321295052000_b32","unstructured":"StatisticBrain\n (2013), \u201cTwitter statistics\u201d, available at: www.statisticbrain.com\/twitter-statistics\/ (accessed 30 May 2013)."},{"key":"key2021010321295052000_b33","doi-asserted-by":"crossref","unstructured":"Stets, J.E.\n and \n Burke, P.J.\n (2000), \u201cIdentity theory and social identity theory\u201d, Social Psychology Quarterly, Vol. 63 No. 3, pp. 224-237.","DOI":"10.2307\/2695870"},{"key":"key2021010321295052000_b34","doi-asserted-by":"crossref","unstructured":"Sun, B.\n , \n Xie, J.\n and \n Cao, H.H.\n (2004), \u201cProduct strategy for innovators in markets with network effects\u201d, Marketing Science, Vol. 23 No. 2, pp. 243-254.","DOI":"10.1287\/mksc.1040.0058"},{"key":"key2021010321295052000_b35","doi-asserted-by":"crossref","unstructured":"Sweeney, J.C.\n and \n Soutar, G.N.\n (2001), \u201cConsumer perceived value: the development of a multiple item scale\u201d, Journal of Retailing, Vol. 77 No. 2, pp. 203-220.","DOI":"10.1016\/S0022-4359(01)00041-0"},{"key":"key2021010321295052000_b36","doi-asserted-by":"crossref","unstructured":"Thatcher, J.\n , \n Loughry, M.\n , \n Lim, J.\n and \n McKnight, D.\n (2007), \u201cInternet anxiety: an empirical study of the effects of personality, beliefs, and social support\u201d, Information and Management, Vol. 44 No. 4, pp. 353-363.","DOI":"10.1016\/j.im.2006.11.007"},{"key":"key2021010321295052000_b37","doi-asserted-by":"crossref","unstructured":"Turel, O.\n , \n Serenko, A.\n and \n Bontis, N.\n (2007), \u201cUser acceptance of wireless short messaging services: deconstructing perceived value\u201d, Information and Management, Vol. 44 No. 1, pp. 63-73.","DOI":"10.1016\/j.im.2006.10.005"},{"key":"key2021010321295052000_b38","doi-asserted-by":"crossref","unstructured":"Van der Heijden, H.\n (2004), \u201cUser acceptance of hedonic information systems\u201d, MIS Quarterly, Vol. 28 No. 4, pp. 695-704.","DOI":"10.2307\/25148660"},{"key":"key2021010321295052000_b39","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n and \n Davis, F.D.\n (2000), \u201cA theoretical extension of the technology acceptance model: four longitudinal field studies\u201d, Management Science, Vol. 46 No. 2, pp. 186-204.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"key2021010321295052000_b40","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n , \n Morris, M.G.\n , \n Davis, G.B.\n and \n Davis, F.D.\n (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.","DOI":"10.2307\/30036540"},{"key":"key2021010321295052000_b41","doi-asserted-by":"crossref","unstructured":"Wang, S.\n and \n Lin, J.C.C.\n (2011), \u201cThe effect of social influence on bloggers' usage intention\u201d, Online Information Review, Vol. 35 No. 1, pp. 50-65.","DOI":"10.1108\/14684521111113588"},{"key":"key2021010321295052000_b42","doi-asserted-by":"crossref","unstructured":"Wasko, M.M.\n and \n Faraj, S.\n (2005), \u201cWhy should I share? Examining social and knowledge capital contribution in electronic networks of practice\u201d, MIS Quarterly, Vol. 29 No. 1, pp. 35-57.","DOI":"10.2307\/25148667"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/OIR-11-2012-0210","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-11-2012-0210\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-11-2012-0210\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T21:30:58Z","timestamp":1609709458000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-11-2012-0210\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,25]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2,25]]}},"alternative-id":["10.1108\/OIR-11-2012-0210"],"URL":"https:\/\/doi.org\/10.1108\/oir-11-2012-0210","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2,25]]}}}