


default search action
Internet Research, Volume 35
Volume 35, Number 1, 2025
- Jaeyoung Park
, Woosik Shin
, Beomsoo Kim, Miyea Kim:
Spillover effects of data breach on consumer perceptions: evidence from the E-commerce industry. 1-24 - Sha Zhou, Yaqin Su, Muhammad Aamir Shahzad
, Zhengchi Liu
:
Selling by contributing: the monetization strategy of individual content providers in the light of human brand. 25-53 - Qing Huang, Xiaoling Li
, Dianwen Wang:
Social influence and the choice of product upgrades: evidence from virtual product adoption in online games. 54-79 - Chen Chen, Hong Wu:
A study on the cross-platform influence mechanism of physicians' live streaming behavior on performance. 80-104 - Lin Zhu, Yan Wang
, Yanhong Chen:
Sharenting in China: perspectives from mothers and adolescents. 105-125 - Qin Weng
, Danping Wang, Stephen De Lurgio II, Sebastian Schuetz
:
How do small-to-medium-sized e-commerce businesses stay competitive? Evidence on the critical roles of IT capability, innovation and multihoming. 126-151 - Hamed Qahri-Saremi
, Isaac Vaghefi
, Ofir Turel
:
Not all IT addictions are handled equally: guilt-vs shame-driven coping with IT addiction. 152-177 - Xiao-Yu Xu
, Qingdan Jia, Syed Muhammad Usman Tayyab
:
Exploring the dual routes in influencing sales and adoption in augmented reality retailing: a mixed approach of SEM and FsQCA. 178-210 - Yongwoog Andrew Jeon:
My online self identifies with you, but my offline self skips you: the duality of online and offline personalities in identification with the endorser. 211-236 - Xiaochen Liu
, Yukuan Xu, Qiang Ye, Yu Jin
:
Learning for success: understanding crowdfunding relaunch performance after initial failures. 237-263 - Chao Feng
, Jinjun Yu, Yajing Fan, Hui Chen:
Performance implications of match between social media-enabled interactions and contracts in interfirm governance. 264-293 - Shan Wang, Fang Wang
:
Value implications of followers in social marketplaces: insights into ego network structures. 294-317 - Xi Luo
, Jun-Hwa Cheah
, Xin-Jean Lim
, T. Ramayah
, Yogesh K. Dwivedi
:
Inducing shoppers' impulsive buying tendency in live-streaming: integrating signaling theory with social exchange theory. 318-348 - Eoin Whelan
, Michael Lang
, Martin Butler
:
Beyond lazy; external locus of control as an alternative explanation for the privacy paradox. 349-379 - Derrick Ganye
, Kane Smith:
Examining the effects of cognitive load on information systems security policy compliance. 380-418 - Miaomiao Chen
, Alton Y. K. Chua, Lu An:
Archetypes of influential users in social question-answering sites. 419-447 - Yuan Sun
, Shuyue Fang, Anand Jeyaraj, Mengyi Zhu
:
Mitigating perceived overload of communication visibility: the role of ESM policies. 448-475
Volume 35, Number 2, 2025
- Xin-Jean Lim
, Jun-Hwa Cheah
, Jennifer Yee-Shan Chang
, Weng Marc Lim
, Alastair M. Morrison, Yogesh K. Dwivedi
:
Pay with a smile? Modelling the continuance use intention of facial recognition payment. 477-513 - Ana Alina Tudoran
:
Rethinking privacy in the Internet of Things: a comprehensive review of consumer studies and theories. 514-545 - Junmin Xu
, Alvin Chung Man Leung
, Wei Thoo Yue, Qin Su:
Corporate social responsibility and firm value: exploring the moderating effects of information technology-enabled knowledge capabilities. 546-566 - Xiumei Ma, Yongqiang Sun
, Xitong Guo, Kee-Hung Lai
, Peng Luo
:
Understanding first aid knowledge adoption on social media with an extended information adoption model. 567-593 - En-yi Chou, Cheng-Yu Lin
:
Good for all, good for me: the influences of dedication- and constraint-based switching barriers on user-generated contributions. 594-623 - Hua Pang
, Yanxinyue Liu
:
How perceived overload leads to WeChat passive usage intention: the mediating roles of social network exhaustion and discontented feeling. 624-647 - Nicholas Roberts, Inchan Kim, Kishen Iyengar, Jennifer E. Pullin:
Platform control and multi-realized platform benefits: a meta-analysis. 648-663 - Adela Chen, Kristina Lemmer
:
Seeking social support on social media: a coping perspective. 664-690 - Anushree Tandon
, Samuli Laato
, Najmul Islam, Amandeep Dhir
:
Social comparisons at social networking sites: how social Media-induced fear of missing out and envy drive compulsive use. 691-718 - Xuan Wang
, Tao Huang, Wenping Zhang
, Qingfeng Zeng, Xin Sun
:
Is information normalization helpful in online communication? Evidence from online healthcare consultation. 719-749 - Wenjing Chen
, Bowen Zheng, Hefu Liu
:
How does social media use in the workplace affect employee voice? Uncovering the mediation effects of social identity and contingency role of job-social media fit. 750-770 - Haixia Yuan
, Kevin Lu
, Ali Ausaf
, Mohan Zhu:
Constant or inconstant? The time-varying effect of danmaku on user engagement in online video platforms. 771-797 - K. S. Nivedhitha
, Gayathri Giri, Palvi Pasricha:
Gamification as a panacea to workplace cyberloafing: an application of self-determination and social bonding theories. 798-840 - Snehasish Banerjee
, Alton Y. K. Chua:
Effect of autonomous vehicle-related eWOM on (fe)males' attitude and perceived risk as passengers and pedestrians. 841-859 - Weihong Ning, Ofir Turel, Fred D. Davis:
Potential treatments of technology addiction: insights for information systems scholars. 860-881 - Jing (Daisy) Lyu, Yan Danni Liang, Durga Vellore Nagarajan:
Optimizing live streaming engagement through store atmospheric cues: exploring prosocial behavior and social comparison - insights from streamers and viewers. 882-911 - Dong-Heon Kwak, Dongyeon Kim, Saerom Lee, Martin Kang, Soomin Park
, Deborah Erdos Knapp:
The effect of blockability affordance on confrontation against cyberbullying on social networking sites: theoretical and methodological implications. 912-942

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.