|
Ahmad, T., & Waheed, M. (2015). Cloud computing adoption issues and applications in developing countries : A qualitative approach. International Arab Journal of Information Technology, 4(2), 84–93. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. Akhlaq, A., & Ahmed, E. (2013). The effect of motivation on trust in the acceptance of internet banking in a low income country. International Journal of Bank Marketing, 31(2), 115–125. Al-Dala’in, T., Summons, P., & Luo, S. (2009). The relationship between a mobile device and a shopper’s trust for e-payment systems. Paper presented at 2009 1st International Conference on Information Science and Engineering (ICISE), Nanjing. Al-Debei, M. M., Akroush, M. N., & Ashouri, M. I. (2015). Consumer attitudes towards online shopping. Internet Research, 25(5), 707–733. Al-Debei, M. M., Al-Lozi, E., & Papazafeiropoulou, A. (2013). Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision Support Systems, 55(1), 43–54. Aloudat, A., Michael, K., Chen, X., & Al-Debei, M. M. (2014). Social acceptance of location-based mobile government services for emergency management. Telematics and Informatics, 31(1), 153–171. Arpaci, I. (2016). Understanding and predicting students’ intention to use mobile cloud storage services. Computers in Human Behavior, 58, 150–157. Aydin, S., & Özer, G. (2005). The analysis of antecedents of customer loyalty in the Turkish mobile telecommunication market. European Journal of Marketing, 39(7–8), 910–925. Ayeh, J. K., Au, N., & Law, R. (2013). “Do we believe in TripAdvisor?” Examining credibility perceptions and online travelers’ attitude toward using user-generated content. Journal of Travel Research, 52(4), 437–452. Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. Barclay, D., Higgins, C., & Thompson, R. (1995). The Partial Least Squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration. Technology studie, 2(2), 285–309. Beldad, A., DeJong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869. Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19(1), 211–242. Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230. Braun, M. T. (2013). Obstacles to social networking website use among older adults. Computers in Human Behavior, 29(3), 673–680. Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571–583. Bryman, A. (2012). Social Research Methods, United Kingdom: Oxford Unversity. Burgess, S., Sellitto, C., Cox, C., & Buultjens, J. (2011). Trust perceptions of online travel information by different content creators: Some social and legal implications. Information Systems Frontiers, 13(2), 221–235. Chang C. C., Hung, S. W., Cheng, M. J., & Wu, C. Y. (2015). Exploring the intention to continue using social networking sites: The case of Facebook. Technological Forecasting and Social Change, 95, 48–56. Chang, C. W., & Chen, G. M. (2014). College students’ disclosure of location-related information on Facebook. Computers in Human Behavior, 35, 33–38. Chang, E. C., & Tseng, Y. F. (2013). Research note: E-store image, perceived value and perceived risk. Journal of Business Research, 66(7), 864–870. Chang, I.-C., Liu, C.-C., & Chen, K. (2014). The effects of hedonic/utilitarian expectations and social influence on continuance intention to play online games. Internet Research, 24(1), 21–45. Chang, S. E. (2014). Tourism goes mobile: Using smartphone Apps to access tourism services on the go. International Journal of Commerce and Strategy, 6(1), 001–018. Chang, S. E., Jang, Y.-T. J., Shen, W.-C., & Su, W.-C. (2016). Cocktail: A service-oriented cloud storage architecture for enhancing service quality. International Journal of High Performance Computing and Networking, 9(1–2), 19-30. Chang, S. E., & Pan, Y.-H. V. (2011). Exploring factors influencing mobile users’ intention to adopt multimedia messaging service. Behaviour & Information Technology, 30(5), 659–672. Chang, S. E., Shen, W.-C., & Yeh, C.-H. (2016). A comparative study of user intention to recommend content on mobile social networks. Multimedia Tools and Applications, 61, 404–414. Chang S. E., Shen W. C., Jang, Y. T., & Lee, P. F. (2016). Building smartphone Apps by using free cloud services from Facebook , Dropbox and Google. Advances in Digital Technologies, 183–196. Chang, S. E., Shen, W., & Liu, A. Y. (2016). Why mobile users trust smartphone social networking services? A PLS-SEM approach. Journal of Business Research, 69, 4890–4895. Chau, P. Y. K., & Hu, P. J. H. (2002). Investigating healthcare professionals’ decisions to accept telemedicine technology: An empirical test of competing theories. Information & Management, 39(4), 297–311. Chemingui, H., & Lallouna, H. B. (2013). Resistance, motivations, trust and intention to use mobile financial services. International Journal of Bank Marketing, 31(7), 574–592. Chen, L., & Tsoi, H. K. (2011, September). Privacy concern and trust in using social network sites: A comparison between French and Chinese users. Paper presented at 13th IFIP TC13 Conference on Human-Computer Interaction, Lisbon. Chen, S.-C., & Lin, C.-P. (2015). The impact of customer experience and perceived value on sustainable social relationship in blogs: An empirical study. Technological Forecasting and Social Change, 96, 40–50. Chen, S. C., & Dhillon, G. S. (2003). Interpreting dimensions of consumer trust in e-commerce. Information Technology and Management, 4, 303–318. Chengqi, G., Shim, J. P., & Otondo, R. (2010). Social network services in China: An integrated model of centrality, trust, and technology acceptance. Journal of Global Information Technology Management, 13, 76–99. Childers, T. L., Carr, C. L., Peck, J., & Carson, S. (2001). Hedonic and utilitarian motivations for online retail shopping behavior. Journal of Retailing, 77(4), 511–535. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295–336. Chin, W. W. (2010). Bootstrap cross-validation indices for PLS path model assessment. Handbook of Partial Least Squares, 83–97. Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption Study. Information Systems Research, 14(2), 189–217. Chiu, C. M., Hsu, M. H., Lai, H., & Chang, CM. (2012). Re-examining the influence of trust on online repeat purchase intention: The moderating role of habit and its antecedents. Decision Support Systems, 53(4), 835-845. Choi, J., & Kim, S. (2016). Is the smartwatch an IT product or a fashion product? A study on factors affecting the intention to use smartwatches. Computers in Human Behavior, 63, 777–786. Chung, N., & Koo, C. (2015). Telematics and informatics the use of social media in travel information search. Telematics and Informatics, 32(2), 215–229. Cisco. (2017). Cisco visual networking index: Global mobile data traffic forecast update, 2016–2021 White Paper. Retrieved from http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html Cooper, D. R., & Schindler, P. S. (2003). Business research methods (11th ed.). Columbus, OH: McGraw Hill Education. Compeau. D. R. & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly, 19(2), 189-211. Compeau, D. C., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145–158. Corbitt, B. J., Thanasankit, T., & Yi, H. (2003). Trust and e-commerce: A study of consumer perceptions. Electronic Commerce Research and Applications, 2, 203–215. Costa-Montenegro, E., Barragáns-Martínez, A. B., & Rey-López, M. (2012). Which App? A recommender system of applications in markets: Implementation of the service for monitoring users’ interaction. Expert Systems with Applications, 39(10), 9367–9375. Crespo, Á. H., del Bosque, I. R., & de los Salmones Sánchez, M. M. G. (2009). The influence of perceived risk on internet shopping behavior: a multidimensional perspective. Journal of Risk Research, 12(2), 259–277. Curras-Perez, R., Ruiz-Mafe, C., & Sanz-Blas, S. (2014). Determinants of user behaviour and recommendation in social networks. Industrial Management & Data Systems, 114(9), 1477–1498. Davies, P. (2006). Exploratory Research. The SAGE dictionary of social research methods. London: SAGE Publication. Davis, F. D. Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111–1132. DeSouza, Z., & Dick, G. N. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I'll show you mine”. International Journal of Information Management, 29(4), 255–261. DeWolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454. Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of price, brand, and store information on buyers’ product evaluations. Journal of Marketing Research, 28(3), 307–319. Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21(1), 119–134. Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886. Ponte, E. B., Carvajal-Trujillo, T., & Escobar-Rodríguez, T. (2015). Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents. Tourism Management, 47, 286–302. Emerson, R. M. (1976). Social exchange theory. Annual Review of Sociology, 2(1), 335–362. Ernst, C. P. H., Pfeiffer, J., & Rothlauf, F. (2013). The influence of perceived belonging on social network site adoption. Paper presented at Proceedings of the Nineteenth Americas Conference on Information Systems(AMCIS, 2013). Chicago. Facebook. (2012). Facebook Terms and Policies. Retrieved from https://www.facebook.com/policies/ Fang Y., Qureshi I., Sun H., Mccole P., Ramsey E., & Lim, K. H. (2014). Trust, satisfaction, and online repurchase intention: the moderating role of perceived effectiveness of e-commerce institutional mechanisms. MIS Quarterly, 38(2), 407–427. Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human Computer Studies, 59(4), 451–474. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behaviour: An introduction to theory and research. Boston: Addison-Wesley. Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153–160. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. Gan, H., Zhao, Y. F., & Wei, J. (2016). Impact of smartphone-delivered real-time multi-modal information. International Journal of Mobile Communications, 14(3), 244–255. Gao, L., & Bai, X. (2014). An empirical study on continuance intention of mobile social networking services. Asia Pacific Journal of Marketing and Logistics, 26(2), 168–189. Gao, L., & Waechter, K. A. (2015). Examining the role of initial trust in user adoption of mobile payment services: An empirical investigation. Information Systems Frontiers, 1–24. Gefen, D. (2000a). E-commerce: The role of familiarity and trust. Omega, 28(6), 725–737. Gefen, D. (2000b). Structural equation modeling and regression : Guidelines for research practice. Communication of the Association for Information System, 4(7). 2–77. Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90. Giaccardi, E., & Karana, E. (2015). Foundations of materials experience. Paper presented at Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York. Glover, S., & Benbasat, I. (2011). A comprehensive model of perceived risk of e-commerce transactions. International Journal of Electronic Commerce, 15(2), 47–78. Goode, S., Lin, C., Tsai, J. C., & Jiang, J. J. (2015). Rethinking the role of security in client satisfaction with Software-as-a-Service (SaaS) providers. Decision Support Systems, 70, 73–85. Goodhue, D. L., Lewis, W., & Thompson, R. (2012). Does PLS have advantages for small sample size or non-normal data?. MIS Quarterly, 36(3), 981–A16. Gu, J.-C., Lee, S.-C., & Suh, Y.-H. (2009). Determinants of behavioral intention to mobile banking. Expert Systems with Applications, 36(9), 11605–11616. Guo, X., Zhang, X., & Sun, Y. (2016). The privacy–personalization paradox in mHealth services acceptance of different age groups. Electronic Commerce Research and Applications, 16, 55–65. Gupta, B., Lyer, L. S., & Weisskirch, R. S. (2010). Facilitating global e-commerce: A comparison of consumers' willingness to disclose personal information online in the US and in India. Journal of Electronic Commerce Research, 11(1), 41–52. Hair, J.F., Ringle, C. M., & Sarstedt, M. (2005). SmartPLS - How to access version 2.0.M3. Retrieved from https://www.smartpls.com/smartpls2 Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2010). Multivariate Data Analysis. New Jersey: Prentice Hall. Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139–152. Han, M.-C. (2014). How social network characteristics affect users’ trust and purchase intention. International Journal of Business and Management, 9(8), 1–19. Heidemann, J., Klier, M., & Probst, F. (2012). Online social networks: A survey of a global phenomenon. Computer Networks, 56(18), 3866–3878. Herschel, R. T., & Andrews, P. H. (1997). Ethical implications of technological advances on business communication. Journal of Business Communication, 34(2), 160–170. Ho, C. I., Lin, M. H., & Chen, H. M. (2012). Web users’ behavioural patterns of tourism information search: From online to offline. Tourism Management, 33(6), 1468–1482. Ho, S. Y., & Chau, P. Y. K. (2013). The effects of location personalization on integrity trust and integrity distrust in mobile merchants. International Journal of Electronic Commerce, 17(4), 39–72. Holbrook, M. B., & Hirschman, E. C. (1982). The experiential aspects of consumption: consumer fantasies, feelings, and fun. Journal of Consumer Research, 9(2), 132. Holzer, A., & Ondrus, J. (2011). Mobile application market: A developer’s perspective. Telematics and Informatics, 28(1), 22–31. Hong, J.-C., Lin, P.-H., & Hsieh, P.-C. (2016). The effect of consumer innovativeness on perceived value and continuance intention to use smartwatch. Computers in Human Behavior, 67, 264–272. Hong, S., Thong, J. Y. L., & Tam, K. Y. (2006). Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet. Decision Support Systems, 42(3), 1819–1834. Hsiao, C. H., Chang, J. J., & Tang, K. Y. (2016). Exploring the influential factors in continuance usage of mobile social Apps: Satisfaction, habit, and customer value perspectives. Telematics and Informatics, 33(2), 342-355. Hsu, M. H., Chang, C. M., & Chuang, L. W. (2015). Understanding the determinants of online repeat purchase intention and moderating role of habit: The case of online group-buying in Taiwan, International Journal of Information Management, 35(1), 45-56. Hsu, C.-L., & Lin, J. C.-C. (2015). What drives purchase intention for paid mobile Apps? – An expectation confirmation model with perceived value. Electronic Commerce Research and Applications, 14(1), 46–57. Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23(5), 359–373. Hsu, M.-H., Chuang, L.-W., & Hsu, C.-S. (2014). Understanding online shopping intention: The roles of four types of trust and their antecedents. Internet Research, 24(3), 332–352. Hsu, M., Chang, C., & Yen, C.-H. (2011). Exploring the antecedents of trust in virtual communities. Behaviour & Information Technology, 30(5), 587–601. Hsu, Y. L. (2012). Facebook as international eMarketing strategy of Taiwan hotels. International Journal of Hospitality Management, 31(3), 972–980. Huang, Y., Basu, C., & Hsu, M. K. (2010). Exploring motivations of travel knowledge sharing on social network sites: An empirical investigation of U.S. college students. Journal of Hospitality Marketing & Management, 19(7), 717–734. Im, I., Kim, Y., & Han, H. J. (2008). The effects of perceived risk and technology type on users’ acceptance of technologies. Information & Management, 45(1), 1–9. ISO. (2010). Ergonomics of human-system interaction - Part 210: Human-centred design for interactive systems. International Standards Organisation, 1–32. Jabeur, N., Zeadally, S., & Sayed, B. (2013). Mobile social networking applications. Communications of the ACM, 56(3), 71–79. Jaeger, R. G., & Halliday, T. R. (1998). On confirmatory versus exploratory research. Herpetologica, 54, S64–S66. Jang, Y.-T., Chang, S. E., & Chen, P.-A. (2015). Exploring social networking sites for facilitating multi-channel retailing. Multimedia Tools and Applications, 74(1), 159–178. Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an internet store: A cross culture validation. Journal of Computer Mediated Communication, 5, 1–35. Jin, C. (2013). The perspective of a revised TRAM on social capital building: The case of Facebook usage. Information & Management, 50(4), 162–168. Kane, G. C., Fichman, R. G., Gallaugher, J., & Glaser, J. (2009). Community relations 2.0. Harvard Business Review, 87(11). Kang, H., Lee, M. J., & Lee, J. K. (2012). Are you still with us? A study of the post-adoption determinants of sustained use of mobile-banking services. Journal of Organizational Computing and Electronic Commerce. 22(2). 132-159. Karyda, M., Gritzalis, S., Park, J. H., & Kokolakis, S. (2009). Privacy and fair information practices in ubiquitous environments: Research challenges and future directions. Internet Research, 19(2), 194–208. Kim, B. (2010). An empirical investigation of mobile data service continuance: Incorporating the theory of planned behavior into the expectation-confirmation model. Expert Systems with Applications, 37(10), 7033–7039. Kim, G., Shin, B., & Lee, H. G. (2009). Understanding dynamics between initial trust and usage intentions of mobile banking. Information Systems Journal, 19(3), 283–311. Kim, J., Ahn, K., & Chung, N. (2012). Examining the factors affecting perceived enjoyment and usage intention of ubiquitous tour information services: A service quality perspective. Asia Pacific Journal of Tourism Research, 18(6), 598–617. Kim, J., Shim, J., & Ahn, K. (2011). Social networking service: Motivation, pleasure, and behavioral intention to use. Journal of Computer Information Systems, 51(4), 92–101. Kim, J., Park, Y., Kim, C., & Lee, H. (2014). Mobile application service networks: Apple's App Store. Service Business, 8(1), 1–27. Komiak, S., & Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941–960. Korgaonkar, P. K., & Wolin, L. D. (1999). A multivariate analysis of web usage. Journal of Advertising Research, 39(2), 53–68. Kujala, S., Roto, V., Väänänen-Vainio-Mattila, K., Karapanos, E., & Sinnelä, A. (2011). UX curve: A method for evaluating long-term user experience. Interacting with Computers, 23(5), 473–483. Kuo, Y.-F., Wu, C.-M., & Deng, W.-J. (2009). The relationships among service quality, perceived value, customer satisfaction, and post-purchase intention in mobile value-added services. Computers in Human Behavior, 25(4), 887–896. Kwan, G. C. E., & Skoric, M. M. (2013). Facebook bullying: An extension of battles in school. Computers in Human Behavior, 29(1), 16–25. Kwon, S. J., Park, E., & Kim, K. J. (2014). What drives successful social networking services? A comparative analysis of user acceptance of Facebook and Twitter. The Social Science Journal, 51(4), 534–544. Lankton, N. K., & McKnight, D. H. (2011). What does it mean to trust Facebook? ACM SIGMIS Database, 42(2), 32–54. Lankton, N. K., McKnight, D. H., & Thatcher, J. B. (2012). The moderating effects of privacy restrictiveness and experience on trusting beliefs and habit: An empirical test of intention to continue using a social networking website. IEEE Transactions on Engineering Management, 59(4), 654–665. Law, R., Qi, S., & Buhalis, D. (2010). Progress in tourism management: A review of website evaluation in tourism research. Tourism Management, 31(3), 297–313. Lawshe, C. H. (1975). A quantitative approach to content validity. Personnel Psychology, 28(4), 563–575. Lee, K. S., Lee, H. S., & Kim, S. Y. (2007). Factors influencing the adoption behavior of mobile banking: A South Korean perspective. Journal of Internet Banking & Commerce, 12(2), 1–9. Lee, M. K. O., & Turban, E. (2001). A trust model for consumer internet shopping. International Journal of Electronics Commerce, 6(1), 75–91. Lee, M. R., Yen, D. C., & Hsiao, C. Y. (2014). Understanding the perceived community value of Facebook users. Computers in Human Behavior, 35, 350–358. Lee, T. (2005). The impact of perceptions of interactivity on customer trust and transaction intentions in mobile commerce. Journal of Electronic Commerce Research, 6(3), 165–180. Lewicki, R. J., McAllister, D. J., & Bies, R. J. (1998). Trust and distrust: New relationships and realities. Academy of Management Review, 23(3), 438–458. Li, X., Hess, T. J., & Valacich, J. S. (2006). Using attitude and social influence to develop an extended trust model for information systems. ACM SIGMIS Database, 37(2–3), 108–124. Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453–496. Liao, C., Liu, C.-C., & Chen, K. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications, 10(6), 702–715. Liébana-Cabanillas, F. J., Sánchez-Fernández, J., & Muñoz-Leiva, F. (2014). Role of gender on acceptance of mobile payment. Industrial Management and Data Systems, 114(2), 220–240. Lin, H. H., & Wang, Y. S. (2006). An examination of the determinants of customer loyalty in mobile commerce contexts. Information & Management, 43(3). 271–282. Lin, J., Lu, Y., Wang, B., & Wei, K. K. (2011). The role of inter-channel trust transfer in establishing mobile commerce trust. Electronic Commerce Research and Applications, 10(6), 615–625. Lippert, S. K. (2007). Investigating postadoption utilization: An examination into the role of interorganizational and technology trust. IEEE Transactions on Engineering Management, 54(3), 468–483. López-Nicolás, C., Molina-Castillo, F. J., & Bouwman, H. (2008). An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models. Information & Management, 45(6), 359-364. Lu, Y., Yang, S., Chau, P. Y. K., & Cao, Y. (2011). Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Information & Management, 48(8), 393–403. Luo, Q., & Zhong, D. (2015). Using social network analysis to explain communication characteristics of travel-related electronic word-of-mouth on social networking sites. Tourism Management, 46, 274–282. Lyu, S. O., & Hwang, J. (2015). Are the days of tourist information centers gone? effects of the ubiquitous information environment. Tourism Management, 48, 54–63. Malaquias, R. F., & Hwang, Y. (2016). An empirical study on trust in mobile banking: A developing country perspective. Computers in Human Behavior, 54, 453–461. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. Mamaghani, F. (2009). Impact of e-commerce on travel and tourism : An historical analysis. International Journal of Management, 26(3), 365–376. Martins, C., Oliveira, T., & Popovič, A. (2014). Understanding the internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. International Journal of Information Management, 34(1), 1–13. Mathieson. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173–191. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3). 709–734. McKnight, D. H. (2005). Trust in Information Technology. In G. B. Davis (Ed.), The Blackwell Encyclopedia of Management. Vol. 7 Management Information Systems (pp. 329-331), Malden, MA: Blackwell. McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359. McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3–4), 297–323. McKnight, D. H., Kacmar, C. J., & Choudhury, V. (2004). Dispositional trust and distrust distinctions in predicting high- and low-Risk internet expert advice site perceptions. E-Service Journal, 3(2), 35–58. Miltgen, C. L., & Smith, H. J. (2015). Exploring information privacy regulation, risks, trust, and behavior. Information & Management, 52(6), 741–759. Moon, J. W., & Kim, Y. G. (2001). Extending the TAM for a World-Wide-Web Context. Information & Management, 38(4), 217–230. Moore, G. C. & Benbasat, I. (1991). Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222. Moore, G. C., & Benbasat, I. (1996). Integrating diffusion of innovations and theory of reasoned action models to predict utilization of information technology by end-users. In J. Kautz, & K. Pries-Hege (Eds.), Diffusion and Adoption of Information Technology (pp. 132–146). London: Chapman and Hall. Mun, Y. Y., Yoon, J. J. , Davis, J. M., & Lee, T. T. (2013). Untangling the antecedents of initial trust in web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk. Decision Support Systems, 55(1), 284–295. Munar, A. M., & Jacobsen, J. K. S. (2013). Trust and involvement in tourism social media and web-based travel information sources. Scandinavian Journal of Hospitality and Tourism, 13(1), 1–19. Musser, J., & O'Reilly, T. (2006). Web 2.0: Principles and Best Practices. California: O'Reilly Media. Negash, S. (2011). Mobile banking adoption by under-banked communities in the United States: Adapting mobile banking features from low-income countries. Paper presented at 2011 10th International Conference on Mobile Business(ICMB), Paris. Nikou, S., & Bouwman, H. (2014). Ubiquitous use of mobile social network services. Telematics and Informatics, 31(3), 422–433. Okazaki, S., & Yagüe, M. J. (2012). Responses to an advergaming campaign on a mobile social networking site: An initial research report. Computers in Human Behavior, 28(1), 78–86. Oliveira, T., Faria, M., Thomas, M. A., & Popovič, A. (2014). Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM. International Journal of Information Management, 34(5), 689–703. Ortega Egea, J. M., & Román González, M. V. (2011). Explaining physicians’ acceptance of EHCR systems: An extension of TAM with trust and risk factors. Computers in Human Behavior, 27(1), 319–332. Ortiz, A. M., Hussein, D., Park, S., Han, S. N., & Crespi, N. (2014). The cluster between internet of things and social networks: Review and research challenges. IEEE Internet of Things Journal, 1(3), 206–215. Park, E., Baek, S., Ohm, J., & Chang, H. J. (2014). Determinants of player acceptance of mobile social network games: An application of extended technology acceptance model. Telematics and Informatics, 31(1), 3–15. Park, J., Lee, D., & Ahn, J. (2004). Risk-focused e-commerce adoption model: A cross-country study. Journal of Global Information Technology Management, 7(2), 6–30. Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption : An extension of the theory of planned behavior. MIS Quarterly Executive, 30(1), 115–143. Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37–59. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchnge relationships: A principle - Agent perspective. MIS Quarterly, 31(1), 105–136. Petter, S., & Straub, R. A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623–656. Pitt, L. F., Parent, M., Junglas, I., Chan, A., & Spyropoulou, S. (2011). Integrating the smartphone into a sound environmental information systems strategy: Principles, practices and a research agenda. Journal of Strategic Information Systems, 20(1), 27–37. Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. The Journal of Applied Psychology, 88(5), 879–903. Rauniar, R., Rawski, G., Yang, J., & Johnson, B. (2014). Technology Acceptance Model (TAM) and social media usage: An empirical study on Facebook. Journal of Enterprise Information Management, 27(1), 6–30. Riemenschneider, C. K., Harrison, D. A., & Mykytyn, P. P. (2003). Understanding it adoption decisions in small business: Integrating current theories. Information & Management, 40(4), 269–285. Ringle, C. M., & Sarstedt, M. (2016). Gain more insight from your PLS-SEM results. Industrial Management & Data Systems, 116(9), 1865–1886. Sabatier, M. (2007). Careerwise - Career coach. Personnel Today, 21(38). Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632–2639. Seckler, M., Heinz, S., Forde, S., Tuch, A. N., & Opwis, K. (2015). Trust and distrust on the web: User experiences and website characteristics. Computers in Human Behavior, 45, 39–50. See-To, E. W. K., & Ho, K. K. W. (2014). Value co-creation and purchase intention in social network sites: The role of electronic Word-of-Mouth and trust–A theoretical analysis. Computers in Human Behavior, 31(1), 182–189. Sheth, J. N., Newman, B. I., & Gross, B. L. (1991). Why we buy what we buy: A theory of consumption values. Journal of Business Research, 22(2). 159–170. Shiau, W.-L., & Luo, M. M. (2013). Continuance intention of blog users: The impact of perceived enjoyment, habit, user involvement and blogging time. Behaviour & Information Technology, 32(6), 570–538. Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438. Skrebowski, L. (2004). Attention deficit disorder. Interactions, 11(2), 81. Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. Journal of Computer Information Systems, 49(4), 74–83. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196. Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529. Suki, N. M. (2012). Correlations of perceived flow, perceived system quality, perceived information quality, and perceived user trust on mobile social networking service (SNS) users’ loyalty. Journal of Information Technology Research, 5(2), 1–14. Susanto, A., Chang, Y., & Ha, Y. (2016). Determinants of continuance intention to use the smartphone banking services. Industrial Management & Data Systems, 116(3), 508–525. Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior, 29(3), 821–826. Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2), 211–233. Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570. Teas, R. K., & Agarwal, S. (2000). The effects of extrinsic product cues on consumers’ perceptions of quality, sacrifice, and value. Journal of the Academy of Marketing Science, 28(2), 278–290. Ellacott, J. (2015). The global mobile application market will continue to experience strong growth, with a projected CAGR of 31.05 percent: Technavio. Retrieved from http://www.businesswire.com/news/home/20150323005051/en/Global-Mobile-Application-Market-Continue-Experience-Strong#.VcLe0Pmqqko Tenenhaus, M., Vinzi, V. E., Chatelin, Y.-M., & Lauro, C. (2005). PLS path modeling. Computational Statistics & Data Analysis, 48(1), 159–205. Teo, A.-C., Tan, G. W.-H., Ooi, K.-B., & Lin, B. (2015). Why consumers adopt mobile payment? A Partial Least Squares Structural Equation Modelling (PLS-SEM) approach. International Journal of Mobile Communications, 13(5), 478–497. Teo, T. S., Lim, V. K., & Lai, R. Y. (1999). Intrinsic and extrinsic motivation in Internet usage. Omega, 27(1), 25–37. Thakur, R. (2014). What keeps mobile banking customers loyal? International Journal of Bank Marketing, 32(7), 628–646. Thompson, R. L., Higgins, C. A., & Howell, J. . (1991). Personal computing : Toward a conceptual model of utilization. MIS Quarterly, 15(1), 124–143. Tojib, D., & Tsarenko, Y. (2012). Post-adoption modeling of advanced mobile service use. Journal of Business Research, 65(7), 922–928. Treadaway, C., & Smith, M. (2012). Facebook Marketing: An Hour a Day. Retrieved from https://books.google.com/books?hl=zh-TW&lr=&id=3BBoMLG83C8C&pgis=1 Turban, E., Bolloju N., & Liang, T.-P. (2011), Enterprise Social Networking: Opportunities, Adoption, and Risk Mitigation. Journal of Organizational Computing and Electronic Commerce, 21(3), 202-220. Turel, O., Serenko, A., & Bontis, N. (2007). User acceptance of wireless short messaging services: Deconstructing perceived value. Information & Management, 44(1), 63–73. Vallerand, R. J. (1997). Toward a hierarchical model of intrinsic and extrinsic motivation. Advances in Experimental Social Psychology. 29, 271–360. Venkatesh, V., & Brown, S. A. (1966). A longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges, 9(1), 197–207. Venkatesh, V., & Morris, G. M. (2000). Why don’t men ever stop to ask for direction? gender, social influence and their role in technology acceptance and usage behaviour. MIS Quarterly, 24(1), 115–139. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425–478. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. Verkasalo, H., López-Nicolás, C., Molina-Castillo, F. J., & Bouwman, H. (2010). Analysis of users and non-users of smartphone applications. Telematics and Informatics, 27(3), 242-255. Walker, H. M. (1940). Degrees of freedom. Journal of Educational Psychology, 31(4), 253–269. Wang, D., Xiang, Z., & Fesenmaier, D. R. (2014). Adapting to the mobile world: A model of smartphone use. Annals of Tourism Research, 48, 11–26. Wang, N., Shen, X.-L., & Sun, Y. (2013). Transition of electronic word-of-mouth services from web to mobile context: A trust transfer perspective. Decision Support Systems, 54(3), 1394–1403. Wang, W., & Benbasat, I. (2005). Trust in and adoption of online recommendation agents. Journal of the Association for Information Systems, 6(3), 72–101. Wang, X., & Clay, P. F. (2012). Beyond adoption intention: Online communities and member motivation to contribute longitudinally. Journal of Organizational Computing and Electronic Commerce, 22(3), 215–236. Wang, Y. S., Yeh, C. H., & Liao, Y. W. (2013). What drives purchase intention in the context of online content services? The moderating role of ethical self-efficacy for online piracy. International Journal of Information Management, 33(1), 199–208. Woodruff, R. B. (1997). Customer value: The next source for competitive advantage. Journal of the Academy of Marketing Science, 25(2), 139–153. Xin, H., Techatassanasoontorn, A. A., & Tan, F. B. (2015). Antecedents of consumer trust in mobile payment adoption. Journal of Computer Information Systems, 55(4), 1–10. Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135–174. Xu, X., Ma, W. W. K., & See-To, E. W. K. (2010). Will mobile video become the killer application for 3G mobile internet? A model of media convergence acceptance. Information Systems Frontiers, 12(3), 311–322. Yan, H., & Pan, K. (2015). Examining mobile payment user adoption from the perspective of trust transfer. International Journal of Networking and Virtual Organisations, 15(2–3), 117–130. Yang, K., Cheng, X., Hu, L., & Zhang, J. (2012). Mobile social networks: State-of-the-art and a new vision. International Journal of Communication Systems, 25(10), 1245–1259. Yeh, S.-Y., & Li, Y.-M. (2009). Building trust in m‐commerce: Contributions from quality and satisfaction. Online Information Review, 33(6), 1066–1086. Yin, R.K. (2003) Case study research: Design and methods (3Eds), Sage Pulication, Thousand Oaks: California. Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook. Information, Communication & Society, 16(4), 479–500. Yu, C.-S. (2012). Factors affecting individuals to adopt mobile banking: Empirical evidence from the UTAUT Model. Journal of Electronic Commerce Research, 13, 104–121. Zeithaml, V. A. (1988). Consumer perceptions of price, quality, and value: A means-end model and synthesis of evidence. Journal of Marketing, 52(3), 2–22. Zeng, B., & Gerritsen, R. (2014). What do we know about social media in tourism? A review. Tourism Management Perspectives, 21, 27–36. Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16, 53–90. Zhou, T. (2011a). An Empirical examination of initial trust in mobile banking. Internet Research, 21(5), 527–540. Zhou, T. (2011b). The impact of privacy concern on user adoption of location-based services. Industrial Management & Data Systems, 111(2), 212–226. Zhou, T. (2012a). Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. Journal of Electronic Commerce Research, 13(2), 135–144. Zhou, T. (2012b). Understanding users’ initial trust in mobile banking: An elaboration likelihood perspective. Computers in Human Behavior, 28(4), 1518–1525. Zhou, T. (2013). An empirical examination of continuance intention of mobile payment services. Decision Support Systems, 54(2), 1085–1091. Zhou, T. (2014). Understanding the determinants of mobile payment continuance usage. Industrial Management & Data Systems, 114(6), 936–948. Zhou, T. (2015). Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Information Systems Frontiers, 17(2), 413–422. Zhou, T., & Li, H. (2014). Understanding mobile SNS continuance ysage in China from the perspectives of social influence and privacy concern. Computers in Human Behavior, 37, 283–289. Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior, 26(4), 760-767.
|