References
- Carter M. IT identity: developing valid measures through CFA-based MTMM analysis. Thirty Fourth International Conference on Information Systems, Milan. 2013:11.
- Carter M. Information Technology (IT) Identity: A Conceptualization, Proposed Measures, and Research Agenda. Clemson University; 2012. Available from: https://tigerprints.clemson.edu/all_dissertations/901. Accessed March 22, 2022.
- Hongqiang H, Zhipeng W. Study on information technology service classification and definition. Info Technol Standard. 2013;2013(4):28–31.
- Nach H, Lejeune A. Coping with Information Technology Challenges to Identity: A Theoretical Framework. Vol. 26. Social Science Electronic Publishing; 2021:618–629.
- Larson RW, Wilson S, Brown BB, et al. Changes in adolescents’ interpersonal experiences: are they being prepared for adult relationships in the 20th century? J Res Adolesc. 2002;12(1):31–68. doi:10.1111/1532-7795.00024
- Carter M, Grover V. Me, my self, and I(T): conceptualizing information technology identity and its implications. Mis Quart. 2015;39(4):931–958. doi:10.25300/MISQ/2015/39.4.9
- Burke R, Peter J. Identities and self-verification in the small group. Soc Psychol Quart. 1995;58:61–73.
- Kokswijk JV. Granting personality to a virtual identity. Int J Human Soc Sci. 2008;2(4):207–215.
- Shotter J. The social construction of our inner selves. J Constr Psychol. 1997;10(1):7–24. doi:10.1080/10720539708404609
- Thoits PA, Virshup LK. Me’s and We’s: Forms and Functions of Social Identities. Oxford University Press; 1997.
- MacKinnon NJ. Symbolic interactionism as affect control. Social Forces. 1994;75(4):1489–1490.
- Stryker S, Burke PJ. The past, present, and future of an identity theory. Soc Psychol Quart. 2000;63(4):284. doi:10.2307/2695840
- Tajfel H. The social identity theory of intergroup behavior. Psychol Intergroup Relations. 1986;13(3):7–24.
- Turner ME, Pratkanis AR, Probasco P, Leve C. Threat, cohesion, and group effectiveness: testing a social identity maintenance perspective on groupthink. J Pers Soc Psychol. 1992;63(5):781.
- Terry DJ, Hogg MA, White KM. The theory of planned behaviour: self-identity, social identity and group norms. Br J Soc Psychol. 1999;38(Pt 3):225–244. doi:10.1348/014466699164149
- Smith-Lovin L, Heise DR. Analyzing Social Interaction: Advances in Affect Control Theory. Gordon and Breach Science Publishers; 1988.
- Swann WB. Identity negotiation: where two roads meet. J Pers Soc Psychol. 1987;53(6):1038–1051. doi:10.1037/0022-3514.53.6.1038
- Meyrowitz J. No Sense of Place: The Impact of Electronic Media on Social Behavior. Oxford University Press; 1985.
- Altheide DL. An ecology of communication. Sociol Quart. 1994;35(4):665–683. doi:10.1111/j.1533-8525.1994.tb00422.x
- Baldwin M. Dictionary of Philosophy and Psychology. Macmillan Co.; 1998.
- Alahmad R, Carter M, Pierce C, Robert L. The impact of enterprise social media identity on job performance and job satisfaction. 24th Americas Conference on Information Systems; 2018.
- Reychav I, Beeri R, Balapour A, et al. How reliable are self-assessments using mobile technology in healthcare? The effects of technology identity and self-efficacy. Comput Human Behav. 2018;91:52–61. doi:10.1016/j.chb.2018.09.024
- Esmaeilzadeh P. How does IT identity affect individuals’ use behaviors associated with personal health devices (PHDs)? An empirical study - ScienceDirect. Info Manag. 2020;58(1):103313.
- Huang TL. Psychological mechanisms of brand love and information technology identity in virtual retail environments. J Retail Consum Services. 2019;47:251–264. doi:10.1016/j.jretconser.2018.11.016
- Cheng Z, Wang S. Review on user’s active behavior in virtual community based on role identity theory. J Beijing Univ Aeronaut Astronaut. 2017;30(02):78–81.
- Kramer GM. Identity theory. Lambda book report. 2003.
- Wang W, Xu J. Information Technology Identity: People’s Self-Perception in the Digital Age. Entrepreneur Scholar Program of Jinan University; 2019.
- Kim HW, Chan HC, Kankanhalli A. What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation. Info Syst Res. 2012;23(4):1232–1245. doi:10.1287/isre.1110.0411
- Brand M, Young K, Laier C, Lfling W, Potenza MN. Integrating psychological and neurobiological considerations regarding the development and maintenance of specific Internet-use disorders: an Interaction of Person-Affect-Cognition-Execution (I-PACE) model. Neurosci Biobehav Rev. 2016;71:252–266.
- Dincher M, Wagner V. Teaching in times of COVID-19: determinants of teachers’ educational technology use. Educ Econ. 2021;29:461–470. doi:10.1080/09645292.2021.1920000
- Shi JH. Teachers’Role in online public English teaching for graduate students in the context of COVID-19 epidemic. J North China Univ Water Resources Electric Power. 2020;36(6):100.
- Baccon LA, Chiarovano E, Macdougall HG. Virtual reality for teletherapy: avatars may combine the benefits of face-to-face communication with the anonymity of online text-based communication. Cyberpsychol Behav Soc Netw. 2018;22:158–165.
- Valkenburg Patti M, Jochen P. Who visits online dating sites? Exploring some characteristics of online daters. Cyberpsychol Behav. 2007;10(6):849–852.
- Valkenburg PM, Peter J. Adolescents’ identity experiments on the internet consequences for social competence and self-concept unity. Communic Res. 2008;35(2):208–231. doi:10.1177/0093650207313164
- Gauntlett D, Horsley R. Web.studies. 2004.
- Parcel TL. Differentiation between social groups: studies in the social psychology of intergroup relations. Am J Sociol. 1978;86(5):1193–1194. doi:10.1086/227378
- Abrams D, Hogg MA. Social Identity Theory: Constructive and Critical Advances. Pearson Education Limited; 1990.
- Zhou J, Mao Z. User identity construction in online community: a case study of Douban. Contemp Commun. 2012;2012(01):74–76.
- McMillan SJ, Morrison M. Coming of Age with the Internet: A Qualitative Exploration of How the Internet Has Become an Integral Part of young People’s Lives. New Media & Society; 2006.
- Moon JP, Sanders GL. The role of virtual social identity through blog use in social life. Connecting the Americas Americas Conference on Information Systems DBLP, 2006.
- Carter M, Grover V, Thatcher JB. Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity. IGI Global; 2013.
- baike.baidu.com. Douban; 2021. Available from: https://www.douban.com/. Accessed October 31, 2021.
- Li C. Improvement of opac based on web2.0 from the experience of douban. Res Library Sci. 2010;15:16.
- Hao LI, Wang P. The Cultural Identity in the Network Era——A Study of Tianjin Wei Group on Douban Webpage. Journal of Xinjiang University; 2015.
- Ling R. Hyper-coordination via mobile phones in Norway. Perpetual contact mobile communication private talk public performance. 2002.
- Carter M, Petter S, Grover V, Thatcher JB. IT identity: a measure and empirical investigation of its utility to IS research. J Assoc Info Syst. 2020;21(5):1313–1342. doi:10.17705/1jais.00638
- Yu T, Si Y, Meng W, Bian Y, Gao F. Mediating factors of the association between shyness and generalized pathological internet use in Chinese university students. Int J Ment Health Addict. 2018;17(3):555–572.
- Wang P, Yan Y, Gao F, Zhang R, Tian Y. The effect of shyness on adolescent network problem behavior: the role of gender and loneliness. Front Psychol. 2020;11:803.
- Zhang S, Tian Y, Sui Y, et al.Relationships between social support, loneliness, and internet addiction in Chinese postsecondary students: a longitudinal cross-lagged analysis. Front Psychol. 2018;9:1707.
- Wang R, Yang S, Yan Y, Tian Y, Wang P. Internet gaming disorder in early adolescents: gender and depression differences in a latent growth model. Healthcare. 2021;9:1188. doi:10.3390/healthcare9091188
- Shuttleworth M, Cowie M. Dictionary of Translation Studies. Shanghai Foreign Language Education Press; 2004.
- Han C. Analysis on Impact on College Computer Application Teaching by Domestic Office Software.Electronic Technology & Software Engineering. 2017;1(1).
- CFi.CN Text of the first quarter report of Jinshan Office in 2020; 2020. Available from: http://www.zszk_quote.cfi.net.cn/. Accessed October 31, 2021.
- Bai Y, Di M, Huo Y, Wang J, Zhao M. The structure of self-esteem: a bifactor modeling approach of the self-liking/self-competence scale-revised (slcs-r) in Chinese preadolescents. Curr Psychol. 2021;2:1–9.
- Kato T. Examination of the coping flexibility hypothesis using the coping flexibility scale-revised. Front Psychol. 2020;11. doi:10.3389/fpsyg.2020.561731
- Hang Z, Jiangping Z, Zhijin H. The Chinese version of the appreciation questionnaire in the relationship is revised. Chin J Clin Psychol. 2020;28(4):718–723.
- Wenzel S. App’ification of Enterprise Software: A Multiple-Case Study of Big Data Business Applications. Springer International Publishing Springer International Publish-ing; 2014.
- Burke RPJ. Identities and self-verification in the small group. Soc Psychol Q. 1995;58(2):61–73.