


default search action
Computers in Human Behavior, Volume 50
Volume 50, September 2015
- Stefano Triberti

, Daniela Villani, Giuseppe Riva
:
Moral positioning in video games and its relation with dispositional traits: The emergence of a social dimension. 1-8 - Qing Yang, Chuan Pang, Liu Liu, David C. Yen

, J. Michael Tarn:
Exploring consumer perceived risk and trust for online payments: An empirical study in China's younger generation. 9-24 - Katja Sievers, Katrin Wodzicki, Ingo Aberle, Michael Keckeisen, Ulrike Cress:

Self-presentation in professional networks: More than just window dressing. 25-30 - Anastasia Kononova

, Yi-Hsuan Chiang:
Why do we multitask with media? Predictors of media multitasking among Internet users in the United States and Taiwan. 31-41 - Mohammed Algabri, Hassan Mathkour, Ramdane Hedjar

, Mansour Alsulaiman:
Comparative study of soft computing techniques for mobile robot navigation in an unknown environment. 42-56 - Nianlong Luo, Xunhua Guo

, Jin Zhang, Guoqing Chen, Nan Zhang:
Understanding the continued use of intra-organizational blogs: An adaptive habituation model. 57-65 - Maxime Clément, Matthieu J. Guitton:

Interacting with bots online: Users' reactions to actions of automated programs in Wikipedia. 66-75 - Kallol Kumar Bagchi, Godwin J. Udo, Peeter J. Kirs, Khendum Choden:

Internet use and human values: Analyses of developing and developed countries. 76-90 - Susanne E. Baumgartner

, Sindy R. Sumter
, Jochen Peter, Patti M. Valkenburg
:
Sexual self-presentation on social network sites: Who does it and how is it perceived? 91-100 - Hamid Khobzi

, Babak Teimourpour:
LCP segmentation: A framework for evaluation of user engagement in online social networks. 101-107 - Lassi A. Liikkanen, Antti Salovaara

:
Music on YouTube: User engagement with traditional, user-appropriated and derivative videos. 108-124 - Kwabena G. Boakye:

Factors influencing mobile data service (MDS) continuance intention: An empirical study. 125-131 - Narnia C. Worth, Angela S. Book:

Dimensions of video game behavior and their relationships with personality. 132-140 - Rosario Del Rey

, José A. Casas
, Rosario Ortega-Ruiz
, Anja Schultze-Krumbholz
, Herbert Scheithauer, Peter K. Smith, Fran Thompson, Vassilis Barkoukis, Haralambos Tsorbatzoudis, Antonella Brighi
, Annalisa Guarini
, Jacek Pyzalski
, Piotr Plichta:
Structural validation and cross-cultural robustness of the European Cyberbullying Intervention Project Questionnaire. 141-147 - Yubo Zhang, Pei-Luen Patrick Rau

:
Playing with multiple wearable devices: Exploring the influence of display, motion and gender. 148-158 - Jianjun Zhu

, Wei Zhang, Chengfu Yu, Zhenzhou Bao:
Early adolescent Internet game addiction in context: How parents, school, and peers impact youth. 159-168 - Jihyun Kim

, Kim H. Y. Hahn:
The effects of self-monitoring tendency on young adult consumers' mobile dependency. 169-176 - Antonio Palmiro Volpentesta

:
A framework for human interaction with mobiquitous services in a smart environment. 177-185 - Kate Magsamen-Conrad

, Shrinkhala Upadhyaya, Claire Youngnyo Joa
, John Dowd
:
Bridging the divide: Using UTAUT to predict multigenerational tablet adoption practices. 186-196 - Michelle Drouin, Jody Ross, Elizabeth Tobin:

Sexting: A new, digital vehicle for intimate partner aggression? 197-204 - Mauro José de Oliveira

, Melby Karina Zuniga Huertas
:
Does Life Satisfaction influence the intention (We-Intention) to use Facebook? 205-210 - Louise F. Pendry, Jessica Salvatore:

Individual and social benefits of online discussion forums. 211-220 - Zaheer Hussain

, Glenn A. Williams
, Mark D. Griffiths
:
An exploratory study of the association between online gaming addiction and enjoyment motivations for playing massively multiplayer online role-playing games. 221-230 - Nan Zhou

, Xiao-Yi Fang:
Beyond peer contagion: Unique and interactive effects of multiple peer influences on Internet addiction among Chinese adolescents. 231-238 - Georgios Pitsilis, Wei Wang:

Harnessing the power of social bookmarking for improving tag-based recommendations. 239-251 - Yong Jin Park:

Do men and women differ in privacy? Gendered privacy and (in)equality in the Internet. 252-258 - Ilaria Gaudiello, Sébastien Lefort, Elisabetta Zibetti

:
The ontological and functional status of robots: How firm our representations are? 259-273 - Hyang-gi Song, Michael Restivo, Arnout van de Rijt, Lori L. Scarlatos, David Tonjes, Alex Orlov

:
The hidden gender effect in online collaboration: An experimental study of team performance under anonymity. 274-282 - Dohyun Ahn

, Dong-Hee Shin:
Differential effect of excitement versus contentment, and excitement versus relaxation: Examining the influence of positive affects on adoption of new technology with a Korean sample. 283-290 - Hannah Greving

, Kai Sassenberg
:
Counter-regulation online: Threat biases retrieval of information during Internet search. 291-298 - Sarah A. Sullivan, Sadhana Puntambekar:

Learning with digital texts: Exploring the impact of prior domain knowledge and reading comprehension ability on navigation and learning outcomes. 299-313 - Sabina Barakovic, Lea Skorin-Kapov

:
Multidimensional modelling of quality of experience for mobile Web browsing. 314-332 - Juho Hamari

, Jonna Koivisto
:
"Working out for likes": An empirical study on social influence in exercise gamification. 333-347 - Jaclyn E. Tennant, Michelle Kilpatrick Demaray, Samantha Coyle

, Christine K. Malecki
:
The dangers of the web: Cybervictimization, depression, and social support in college students. 348-357 - Meltem Huri Baturay

, Sacip Toker:
An investigation of the impact of demographics on cyberloafing from an educational setting angle. 358-366 - Rabindra A. Ratan

, Young June Sah
:
Leveling up on stereotype threat: The role of avatar customization and avatar embodiment. 367-374 - Tove Bøe, Boge Gulbrandsen, Øystein Sørebø:

How to stimulate the continued use of ICT in higher education: Integrating Information Systems Continuance Theory and agency theory. 375-384 - Samantha G. L. Won, Michael A. Evans, Chelsea Carey, Christine G. Schnittka

:
Youth appropriation of social media for collaborative and facilitated design-based learning. 385-391 - Bruno Takahashi

, Edson C. Tandoc Jr., Christine Carmichael:
Communicating on Twitter during a disaster: An analysis of tweets during Typhoon Haiyan in the Philippines. 392-398 - Christopher J. Ferguson, Hayley Barr, Grace Figueroa, Kimberly Foley, Alexander Gallimore, Rachel LaQuea, Alexandra Merritt, Stephanie Miller, Hien Nguyen-Pham, Cameron Spanogle, Julie Stevens, Benjamin Trigani, Adolfo Garza:

Digital poison? Three studies examining the influence of violent video games on youth. 399-410 - Kenneth J. Harris, Ranida B. Harris, John R. Carlson, Dawn S. Carlson

:
Resource loss from technology overload and its impact on work-family conflict: Can leaders help? 411-417 - Gonçalo Baptista

, Tiago Oliveira
:
Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators. 418-430 - Lauren A. Reed

, Richard M. Tolman, Paige Safyer:
Too close for comfort: Attachment insecurity and electronic intrusion in college students' dating relationships. 431-438 - Laura Vandenbosch

:
Antecedents of adolescents' exposure to different types of sexually explicit Internet material: A longitudinal study. 439-448 - Jenny V. Bittner

, Robin Zondervan:
Motivating and achievement-eliciting pop-ups in online environments: A user experience perspective. 449-455 - Erin E. Hollenbaugh

, Amber L. Ferris
:
Predictors of honesty, intent, and valence of Facebook self-disclosure. 456-464 - Chuan Hu

, Li Zhao, Jiao Huang:
Achieving self-congruency? Examining why individuals reconstruct their virtual identity in communities of interest established within social network platforms. 465-475 - Ilya V. Osipov

, Anna Y. Prasikova, Alex A. Volinsky
:
Participant behavior and content of the online foreign languages learning and teaching platform. 476-488 - M. Mahdi Roghanizad, Derrick J. Neufeld

:
Intuition, risk, and the formation of online trust. 489-498 - Brian G. Smith, Rita Linjuan Men, Reham Al-Sinan:

Tweeting Taksim communication power and social media advocacy in the Taksim square protests. 499-507 - Luca Chittaro

, Riccardo Sioni
:
Serious games for emergency preparedness: Evaluation of an interactive vs. a non-interactive simulation of a terror attack. 508-519 - Iris Reychav

, Dezhi Wu:
Mobile collaborative learning: The role of individual learning in groups through text and video content delivery in tablets. 520-534 - Jason T. Jacques, Mark J. Perry

, Per Ola Kristensson:
Differentiation of online text-based advertising and the effect on users' click behavior. 535-543 - Thomas J. Johnson, Barbara K. Kaye:

Reasons to believe: Influence of credibility on motivations for using social networks. 544-555
- Hannes Werthner, Chulmo Koo

, Ulrike Gretzel
, Carlos Lamsfus:
Special issue on Smart Tourism Systems: Convergence of information technologies, business models, and experiences. 556-557 - Ulrike Gretzel

, Hannes Werthner, Chulmo Koo
, Carlos Lamsfus:
Conceptual foundations for understanding smart tourism ecosystems. 558-563 - Eun Jung No, Jin Ki Kim:

Comparing the attributes of online tourism information sources. 564-575 - Hosung Timothy Rhee, Sung-Byung Yang:

Does hotel attribute importance differ by hotel? Focusing on hotel star-classifications and customers' overall ratings. 576-587 - Namho Chung

, Heejeong Han, Youhee Joun:
Tourists' intention to visit a destination: The role of augmented reality (AR) application for a heritage site. 588-599 - Albert A. Barreda, Anil Bilgihan, Khaldoon Nusair, Fevzi Okumus

:
Generating brand awareness in Online Social Networks. 600-609 - Jin-Young Kim

, Linda Canina:
An analysis of smart tourism system satisfaction scores: The role of priced versus average quality. 610-617 - Janet Hernández-Méndez

, Francisco Muñoz-Leiva:
What type of online advertising is most effective for eTourism 2.0? An eye tracking study based on the characteristics of tourists. 618-625

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














