[1] 尼古拉斯·克里斯塔基斯,詹姆斯·富勒.大连接:社会网络是如何形成的以及对人类现实行为的影响[M].北京:中国人民大学出版社,2012. [2] Jacob Ratkiewicz, Alessandro Flammini, Filippo Menczer. Traffic in social media I: paths through information networks[C]. IEEE International Conference on Social Computing, 2010, 452-458. [3] Thelwall M, Vaughan L, Bjrneborn L. Webometrics[J]. Annual Review of Information Science and Technology, 2005, 39: 81-135. [4] Kretschmer H. Author productivity and geodesic distance in bibliographic co-authorship networks and visibility on the Web[J]. Scientometrics, 2004, 60(3): 409-420. [5] David Wilkinson, Mike Thelwall, Xuemei Li. Exploiting hyperlinks to study academic Web use[J]. Social Science Computer Review, 2003, 21(3): 340-351. [6] Cothey Vivian. A longitudinal study of World Wide Web users’ information searching behavior[J]. Journal of the American Society for Information Science and Technology, 2002, 53(2): 67-78. [7] Pearce P L. Tourist behavior: themes and conceptual schemes[M]. Cromwell Press, 2005. [8] Lam T, Hsu H C. Predicting behavioral intention of choosing a travel destination[J]. Tourism Management, 2006, 27(4): 589-599. [9] Ajzen I, Madden T J. Prediction of goal-directed behavior: attitudes, intentions,and perceived behavioral control[J]. Journal of Experimental Social Psychology, 1986, 22(6): 453-474. [10] Cheng S, Lam T, Hsu C H C. Testing the sufficiency of the theory of planned behavior: a case of custoumer dissatisfaction responses in restaurants[J]. Hospitality Management, 2005, 24(4): 475-492. [11] Ajzen I. From intentions to actions: a theory of planned behavior[A]. Kuhland J, Beckman J. Action-Control: form cognitions to behavior[C]. Heidelberg: Springer, 1985: 11-39. [12] Madden T, Ellen P S, Ajzen I. A comparison of the theory of planned behavior and the theory of reasoned action[J]. Personality and Social Psychology Bulletin, 1992, 18(1): 3-9. [13] Schifter D B, Ajzen I. Intention,perceived control,and weight loss: an application of the theory of planned behaviour[J]. Journal of Personality and Social Psychology, 1985, 49(3): 842-851. [14] Csikszentmihalyi M. Beyond boredom and anxiety[M]. San Francisco: Jossey-Bass, 1975. [15] Webster J, Trevino L K, Ryan L. The dimensionality and correlates of flow in human-computer interactions[J]. Computers in Human Behavior, 1993, 9(4): 411-426. [16] Jawaid Ghani A, Satish Deshpande P. Task characteristics and the experience of optimal flow in human[J]. Computer Interaction, 1994, 128(4): 381-391. [17] Novak T P, Hoffman D L, Yung Y F. Measuring the customer experience in online environments: a structural modeling approach[J]. Marketing Science, 2000, 19 (1): 22-42. [18] 王莉,方澜,顾峰.客户网上参与产品开发的动机研究[J].研究与发展管理,2007,19(6):17-23. [19] Bock G W, Zmud R W, Kim Y G, et al. Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate[J]. MIS Quarterly, 2005, 29(1): 87-111. [20] Webster J, Trevino K L, Ryan L. The dimensionality and correlates of flow in human computer interactions[J]. Computers in Human Behavior, 1993, 9: 411-426. [21] Grove E J R, Lewis S A M E. Hypnotic susceptibility and the attainment of flow like states during exercise[J]. Journal of Sport and Exercise Psychology, 1996, 18(4): 380-391. [22] Mathwick C, Rigdon E. Play, flow, and the video search experience[J]. Journal of Consumer Research, 2004, 31(2): 324-332. [23] Hwang Y, Kim D J. Understanding affective commitment, collectivist culture, and social influence in relation to knowledge sharing in technology mediated learning[J]. Professional Communication, IEEE Transactions on, 2007, 50(3): 232-248. [24] 孙建军,顾东晓.动机视角下社交媒体网络用户链接行为的实证分析[J].图书情报工作,2014,58(4):71-78. [25] Ajzen I. The theory of planned behavior[J]. Organizational behavior and human decision processes, 1991, 50(2), 179-211. [26] Thompson R L, Higgins C A, Howell J M. Personal computing: toward a conceptual model of utilization[J]. MIS quarterly, 1991,15(1): 125-143. [27] Davis F D. User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, 1993, 13(3): 319-340. [28] Taylor S, Todd P. Assessing IT usage: The role of prior experience. MIS quarterly, 1995. 561-570. [29] Miyazaki A D, Fernandez A. Consumer perceptions of privacy and security risks for online shopping[J]. Journal of Consumer Affairs, 2001, 35(1): 27-44. [30] Limayem M, Hirt S. G force of habit and information systems usage: theory and initial validation[J]. Journal of the Association for Information Systems, 2003, 4(1): 3. [31] Agarwal R. Assessing a firm’s web presence[J]. Information Systems Research, 2002, 13(2):168-186. [32] Nunnally J C. Psychometric theory[M]. McGraw Hill, New York, 1978. [33] Carmines E G, Zeller R. A. (Eds.). Reliability and validity assessment[M]. Newbury Park, CA: Sage Publications, 1979. [34] Fornell C, Larcker D F. Evaluating structural equation models with unobservable variables and measurement error[J]. Journal of Marketing Research, 1981, 18(1): 39-50. [35] Hair J F, Anderson R E, Tatham R L, et al.. Multivariate data analysis. New York, NY: Prentice Hall, 1998. [36] Bhattacherjee A, Premkumar G. Changes in belief and attitude toward IT usage[J]. MIS Quarterly, 2004, 28(2): 229-254. |