223
Views
45
CrossRef citations to date
0
Altmetric
Original Articles

Understanding Continuance Use in Social Networking Services

&

References

  • Ajzen, I. “The theory of planned behavior,” Organizational Behavior and Human Decision Processes 50(2), 1991, 179–211.
  • Bagozzi, R.P., & Yi, Y. “On the Evaluation of Structural Equation Models,” Journal of the Academy of Marketing Science 16(1), 1988, 74–94.
  • Bhattacherjee A. “Understanding information systems continuance: An expectation-confirmation model,” MIS Quarterly 25(3), 2001, 351–70.
  • Bhattacherjee, A., & Barfar, A. “Information Technology Continuance Research: Current State and Future Directions,” Asia Pacific Journal of Information Systems 21(2), 2011, 14–17.
  • Bhattacherjee, A., Perols, J., & Sanford, C. “Information technology continuance: A theoretic extension and empirical test,” Journal of Computer Information Systems 49(1), 2008, 17–26.
  • Chang, Y.P., & Zhu, D.H. “Understanding social networking sites adoption in China: A comparison of pre-adoption and post-adoption,” Computers in Human Behavior 27(5), 2011, 1840–1848.
  • Chin, W.W. “Issues and Opinion on Structural Equation Modeling,” MIS Quarterly 22(1), 1998, vii–xvi.
  • Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. “Extrinsic and intrinsic motivation to use computers in the workplace,” Journal of Applied Social Psychology 22(4), 1992, 1111–1132.
  • Festinger LA. A theory of cognitive dissonance. Row & Peterson, Evanston, IL, 1957.
  • Fornell, C., & Larcker, D.F. (1981). “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research 18(1), 1981, 39–50.
  • Gefen, D., & Straub, D.W. “A Practical Guide to Factorial Validity Using PLS-Graph: Tutorial and Annotated Example,” Communications of the AIS 16(1), 2005, 91–109.
  • Gefen, D., Straub, D., & Boudreau, M.C. “Structural Equation Modeling and Regression: Guidelines for Research Practice,” Communications of the AIS 4(7), 2000, 1–78.
  • Hsu, C.L., & Lin, J.C. “Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation,” Information & Management 45(1), 2008, 65–74.
  • Igabria, M., Iivari, J., & Maragahh, H. “Why do individuals use computer technology? A Finnish case study,” Information & Management 29(5), 1995, 227–238.
  • International Telecommunication Union (ITU). “Measuring the Information Society,” 2012. Retrieved on September 22, 2013 from http://www.itu.int/en/ITU-D/Statistics/Documents/publications/mis2012/MIS2012_without_Annex_4.pdf
  • Kang, Y.S., & Lee, H. “Understanding the role of an IT artifact in online service continuance: An extended perspective of user satisfaction,” Computers in Human Behavior 26(3), 2010, 353–364.
  • Kelman, H.C. “Compliance, identification and internalization: Three processes of attitude change,” Journal of Conflict Resolution 2(1), 1958, 51–60.
  • Kim, B. “Understanding antecedents of continuance intention in social-networking services” Cyberpsychology, Behavior and Social Networking 14(4), 2011, 199–205.
  • Korea Internet & Security Agency (KISA). “2012 Survey on the Internet Usage,” 2012. Retrieved on September 22, 2013 from http://isis.kisa.or.kr/eng/board/?pageId=040100&bbsId=10&itemld=323
  • Limayem, M., Hirt, S.G., & Cheung, C.M.K. “How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance,” MIS Quarterly 31(4), 2007, 705–737.
  • Lin, C.S., Wu, S., & Tsai, R.J. “Integrating perceived playfulness into expectation-confirmation model for web portal context,” Information & Management 42(5), 2005, 683–693.
  • Lin, K. Y., & Lu, H. P. “Why people use social networking sites: An empirical study integrating network externalities and motivation theory,” Computers in Human Behavior 27(3), 2011, 1152–1161.
  • Lou, H., Luo, W., & Strong, D. “Perceived critical mass effect on groupware acceptance,” European Journal of Information Systems 9(2), 2000, 91–103.
  • Moon, J.W., & Kim, Y.G. “Extending the TAM for a World-Wide-Web context,” Information & Management 38(4), 2001, 217–230.
  • Oliver, R.L. “A Cognitive Model for the Antecedents and Consequences of Satisfaction,” Journal of Marketing Research 17(4), 1980, 460–469.
  • Ortiz de Guinea, A., & Markus, M.L. “Why Break the Habit of a Lifetime? Rethinking the Roles of Intention, Habit, and Emotion in Continuing Information Technology Use,” MIS Quarterly 33(3), 2009, 433–444.
  • Roca, J.C., Chiu, C.M., & Martinez, F.J. “Understanding e-learning continuance intention: An extension of the Technology Acceptance Model,” International Journal of Human-Computer Studies 64(8), 2006, 683–696.
  • Sledgianowski, D., & Kulviwat, S. “Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context,” Journal of Computer Information Systems 49(4), 2009, 74–83.
  • Sobel, M.E. “Asymptotic intervals for indirect effects in structural equation models.” In: Leinart, S., ed. Sociological methodology, Jossey-Bass, San Francisco, CA, 1982, 290–312.
  • Sun, H., & Zhang, P. “The Role of Moderating Factors in User Technology Acceptance,” International Journal of Human-Computer Studies 64(2), 2006, 53–78.
  • Trevino, L.K., & Webster, J. “Flow in Computer-Mediated Communication,” Communication Research 19(5), 1992, 539–573.
  • Van der Heijden, H. “User acceptance of hedonic information systems,” MIS Quarterly 28(4), 2004, 695–704.
  • Venkatesh, V., & Davis, F. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science 46(2), 2000, 186–204.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.