188
Views
15
CrossRef citations to date
0
Altmetric
Original Articles

Continuance Usage of Localized Social Networking Services: A Conceptual Model and Lessons from China

, &
Pages 7-30 | Published online: 07 Jul 2014

References

  • Baltar, F., and Brunet, I. “Social Research 2.0: Virtual Snowball Sampling Method Using Facebook.” Internet Research (22:1), 2012, pp. 57–74.
  • Bhattacherjee, A. “Understanding Information Systems Continuance: An Expectation-Confirmation Model.” MIS Quarterly (25:3), 2001, pp. 351–370.
  • Blodget, H. “Analyst: Facebook Has a Big New Problem You Need to Worry About.” Business Insider, 2012, http://www.businessinsider.com/facebook-usage-declining-2012-9; accessed February 2013.
  • Boneau, J., and Preibusch, S. “The Privacy Jungle: On the Market for Data Protection in Social Networks,” in Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis (eds.), New York, NY: Springer, 2010, pp. 121–167.
  • Boyd, D., and Ellison, N. “Social Network Sites: Definition, History, and Scholarship.” Journal of Computer-Mediated Communication (13:1), 2007, pp. 210–230.
  • Browne, K. “Snowball Sampling: Using Social Networks to Research Non-heterosexual Women.” International Journal of Social Research Methodology (8:1), 2005, pp. 47–60.
  • Chiu, C. M., Hsu, M. H., and Wang, Eric, T. G. “Understanding Knowledge Sharing in Virtual Communities: An Integration of Social Capital and Social Cognitive Theories.” Decision Support Systems (42:3), 2006, pp. 1872–1888.
  • Chou, S., Min, H., Chang, Y., and Lin, C. “Understanding Continuance Intention of Knowledge Creation Using Extended Expectation-confirmation Theory: An Empirical Study of Taiwan and China Online Communities.” Behavior & Information Technology (29:6), 2010, pp. 557–570.
  • Clarke, R. “The Privacy Attitudes of the iGeneration,” 2011, http://www.rogerclarke.com; accessed February 2012.
  • CNNIC. “The 31st Statistical Report on Internet Development in China,” Beijing, China: China Internet Network Information Center, 2013, http://www.cnnic.net.cn; accessed February 2013.
  • comScore, Inc. “The Network Effect: Facebook, Linkedin, Twitter & Tumblr Reach New Heights in May,” 2011a, http://blog.comscore.com; accessed February 2012.
  • comScore, Inc. “It's a Social World: Top 10 Need-to-knows About Social Networking and Where It's Headed,” 2011b. http://www.comscore.com; accessed February 2012.
  • Ellison, N., Steinfield, C., and Lampe, C. “The Benefits of Facebook ‘Friends’: Social Capital and College Students' Use of Online Social Network Sites.” Journal of Computer-Mediated Communication (12:4), 2007, pp.1–26.
  • Facebook, Inc. “Key Facts: Statistics,” 2012, http://newsroom.fb.com/Key-Facts; accessed February 2013.
  • GlobalWebIndex. “Social Platforms GWI.8 Update: Decline of Local Social Media Platforms,” 2013a, http://globalwebindex.net/thinking/social-platforms-gwi-8-update-decline-of-local-social-media-platforms/; accessed February 2013.
  • GlobalWebIndex. “Infographic: Twitter the Fastest Growing Social Platform,” 2013b, http://globalwebindex.net/thinking/twitter-the-fastest-growing-social-platform-infographic/; accessed February 2013.
  • Gordon, S. “Why Flotations Are Giving Investors That Sinking Feeling.” Financial Times, 2012. http://ezproxy.library.arizona.edu/login?url=http://search.proquest.com/docview/1034977169?accountid=8360; accessed February 2013.
  • Gillette, F. “The Rise and Inglorious Fall of Myspace.” Bloomberg Business Week, 2011, http://www.businessweek.com; accessed February 2012.
  • Google. “Site Profile: Myspace.com,” 2013, https://www.google.com/adplanner/planning/site_profile; accessed March 2013.
  • Heckathorn, D. “Respondent-driven Sampling: A New Approach to the Study of Hidden Populations.” Social Problems (44:2), 1997, pp. 174–199.
  • Heidemann, J., Klier, M., and Probst, F. “Online Social Networks: A Survey of a Global Phenomenon.” Computer Networks (56:18), 2012, pp. 3866–3878.
  • Hendler, J., and Golbeck, J. “Metcalfe's Law, Web 2.0, and the Semantic Web.” Web Semantics: Science, Services and Agents on the World Wide Web (6:1), 2008, pp. 14–20.
  • Hong, S. J., Thong, J. Y. L., and Tam, K. Y. “Understanding Continued Information Technology Usage Behavior: A Comparison of Three Models in the Context of Mobile Internet.” Decision Support Systems (42:3), 2006, pp. 1819–1834.
  • Hu, T., Poston, R. S., and Kettinger, W. J. “Non-adopters of Online Social Network Services: Is It Easy to Have Fun Yet?” Communications of the Association for Information Systems (29), 2011, pp. 441–458.
  • Jamison, P. “Farm Villains: Steal Someone Else's Game.” SF Weekly, 2010. http://www.sfweekly.com; accessed February 2012.
  • Jasperson, J., Carter, P. E., and Zmud, R. W. “A Comprehensive Conceptualization of Post-adoptive Behaviors Associated with Information Technology Enabled Work Systems.” MIS Quarterly (29:3), 2005, pp. 525–557.
  • Kang, Y.S., and Lee, H. “Understanding the Role of an IT Artifact in Online Service Continuance: An Extended Perspective of User Satisfaction.” Computer in Human Behavior (26:4), 2010, pp. 353–364.
  • Karahanna, E., Straub, D. W., and Chervany, N. L. “Information Technology Adoption Across time: A Cross-sectional Comparison of Pre-adoption and Post-adoption Beliefs.” MIS Quarterly (23:2), 1999, pp. 183–213.
  • Kim, D. J. “Trust and Satisfaction, Two Stepping Stones for Successful E-commerce Relationships: A Longitudinal Exploration.” Information Systems Research (20:2), 2009, pp. 237–257.
  • Kim, S. S., and Malhotra, N. K. “A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Post Adoption Phenomena.” Management Science (51:5), 2005, pp. 741–755.
  • Kim, S. S., and Son, J.Y. “Out of Dedication or Constraint? A Dual Model of Post-adoption Phenomena and Its Empirical Test in the Context of Online Services.” MIS Quarterly (33:1), 2009, pp. 49–70.
  • Lapointe, L., and Rivard, S. “A Multilevel Model of Resistance to Information Technology Implementation.” MIS Quarterly (29:3), 2005, pp. 461–491.
  • Liang, T., and Turban, E. “Introduction to the Special Issue Social Commerce: A Research Framework for Social Commerce.” International Journal of Electronic Commerce (16:2), 2011, pp. 5–13.
  • Liao, C., Palvia, P., and Chen, J. L. “Information Technology Adoption Behavior Life Cycle: Toward a Technology Continuance Theory (TCT).” International Journal of Information Management (29:4), 2009, pp. 309–320.
  • Limayem, M., Hirt, G., and Cheung, M.K. “How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance.” MIS Quarterly (31:4), 2007, pp. 705–737.
  • Lin, C. S., Sheng, W., and Tsai, R. J. “Integrating Perceived Playfulness into Expectation-confirmation Model for Web Portal Context.” Information & Management (42:5), 2005, pp. 683–693.
  • Nahapiet, J., and Ghoshal, S. “Social Capital, Intellectual Capital, and the Organizational Advantage.” Academy of Management Review (23:2), 1998, pp. 242–266.
  • Nov, O., Naaman, M., and Ye, C. “Analysis of Participation in An Online Photo-sharing Community: A Multidimensional Perspective.” Journal of the American Society for Information Science and Technology (61:3), 2010, pp. 555–566.
  • Ortiz de Guinea, A., and Markus, M. L. “Why Break the Habit of a Lifetime? Rethinking the Roles of Intention, Habit, and Emotion in Continuing Information Technology Use.” MIS Quarterly (33:3), 2009, pp. 433–444.
  • Pavlou, P., Liang, H., and Xue, Y. “Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-agent Perspective.” MIS Quarterly (31:1), 2007, pp. 105–136.
  • Podskaoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podskaoff, N. P. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology (88:5), 2003, pp. 879–903.
  • Qin, L., Kim, Y., Hsu, J., and Tan, X. “The Effects of Social Influence on User Acceptance of Online Social Networks.” International Journal of Human-Computer Interaction (27:9), 2011, pp. 885–899.
  • Renren, Inc. “Form 6-K: Report of Foreign Private Issuer Pursuant to Rule 13a-16 or 15d-16 Under the Securities Exchange Act of 1934,” Commission File No. 001–35147, Washington, DC: U.S. Securities and Exchange Commission, 2011.
  • Socialbakers. “Facebook Statistics by Country,” 2013 http://www.socialbakers.com/facebook-statistics/?interval=last-6-months#chart-intervals; accessed February 2013.
  • Thong, J.Y.L., Hong, S.J., and Tam, K.Y. “The Effects of Post-adoption Beliefs On the Expectation-confirmation Model for Information Technology Continuance.” International Journal of Human-Computer Studies (64:9), 2006, pp. 799–810.
  • Turel, O., Serenko, A., and Bontis, N. “User Acceptance of Hedonic Digital Artifacts: A Theory of Consumption Values Perspective.” Information & Management (47:1), 2010, pp. 53–59.
  • Venkatesh, V., Brown, S. A., Maruping, L. M., and Bala, H. “Predicting Different Conceptualizations of System Use: The Competing Roles of Behavioral Intention, Facilitating Conditions, and Behavioral Expectation.” MIS Quarterly (32:3), 2008, pp. 483–502.
  • Venkatesh, V., and Goyal, S. “Expectation Disconfirmation and Technology Adoption: Polynomial Modeling and Response Surface Analysis.” MIS Quarterly (34:2), 2010, pp. 281–303.
  • Venkatesh, V., and Morris, M. G. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly (27:3), 2003, pp. 425–478.
  • Venkatesh, V., Speier, C., and Morris, M. G. “User Acceptance Enablers in Individual Decision Making about Technology: Toward An Integrated Model.” Decision Sciences (33:2), 2002, pp. 297–316.
  • Wasko, M. M., and Faraj, S. “Why Should I Share? Examining Knowledge Contribution in Electronic Networks of Practice.” MIS Quarterly (29:1), 2005, pp. 1–23.
  • Weber, R. “Evaluating and Developing Theories in the Information Systems Discipline.” Journal of the Association for Information Systems (13:1), 2012, pp. 1–30.
  • Wells, J. D., Valacich, J. S., and Hess, T. J. “What Signal Are You Sending? How Website Quality Influences Perceptions of Product Quality and Purchase Intentions.” MIS Quarterly (35:2), 2011, pp. 373–396.
  • Whetten, D. A. “What Constitutes A Theoretical Contribution?” Academy of Management Review (14:4), 1989, pp. 490–495.
  • Wilkinson, D., and Thelwall, M. “Social Network Site Changes Over Time: The Case of MySpace.” Journal of the American Society for Information Science and Technology (61:11), 2010, pp. 2311–2323.
  • WSJ. “Stock Charting: RENN.” The Wall Street Journal, 2013, http://online.wsj.com/quotes/stock_charting.html; accessed February 2013.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.