{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T16:14:04Z","timestamp":1773850444423,"version":"3.50.1"},"reference-count":83,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T00:00:00Z","timestamp":1597536000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2020,11,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Despite the increasing popularity and recognition of cryptocurrencies, little is known about the contextual and psychological variables that predict the behavioral intentions of individuals toward adopting a cryptocurrency such as Bitcoin. Utilizing the extended theory of planned behavior (TPB), authors have developed and tested a theoretical model to investigate the relationship between the usage of social media and the intentions of individuals toward adopting Bitcoin. We empirically tested our conceptualized research model using the primary data collected from 443 respondents through a survey conducted in China. Results have shown that the usage of social media is positively associated with users' intentions toward adopting Bitcoin through their attitudes, subjective norms, and perceived behavioral control. Individuals' intentions are subsequently associated with their actual behavior toward the adoption of Bitcoin, while we found perceived risk associated with Bitcoin as a moderator on the relationship between the intentions of individuals and their actual behavior. This study extended the TPB in understanding various psychological and contextual factors that predict the adoption of Bitcoin. Moreover, important theoretical and practical implications, as well as the limitations of the study, are discussed.<\/jats:p>","DOI":"10.1002\/dac.4590","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T11:58:36Z","timestamp":1606478316000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":81,"title":["Social media usage and individuals' intentions toward adopting Bitcoin: The role of the theory of planned behavior and perceived risk"],"prefix":"10.1002","volume":"33","author":[{"given":"Muhammad Khalid","family":"Anser","sequence":"first","affiliation":[{"name":"School of Public Administration Xian University of Architecture and Technology  Xian China"}]},{"given":"Ghulam Hussain Khan","family":"Zaigham","sequence":"additional","affiliation":[{"name":"Department of Management Sciences COMSATS University Islamabad  Islamabad Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3623-9043","authenticated-orcid":false,"given":"Muhammad","family":"Imran Rasheed","sequence":"additional","affiliation":[{"name":"School of Business, Management, and Administrative Sciences The Islamia University of Bahawalpur  Bahawalpur Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2781-267X","authenticated-orcid":false,"given":"Abdul Hameed","family":"Pitafi","sequence":"additional","affiliation":[{"name":"Department of Computer Science Sir Syed University of Engineering and Technology  Karachi Sindh Pakistan"}]},{"given":"Jawad","family":"Iqbal","sequence":"additional","affiliation":[{"name":"School of Business, Management, and Administrative Sciences The Islamia University of Bahawalpur  Bahawalpur Pakistan"}]},{"given":"Adeel","family":"Luqman","sequence":"additional","affiliation":[{"name":"Department of Commerce Fatima Jinnah Women University  Rawalpindi Pakistan"}]}],"member":"311","published-online":{"date-parts":[[2020,8,16]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2018.05.006"},{"key":"e_1_2_7_3_1","unstructured":"GlaserF ZimmermannK HaferkornM WeberMC SieringM.Bitcoin\u2010asset or currency? Revealing users' hidden intentions.Revealing Users' Hidden Intentions (April 15 2014). ECIS.2014."},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1057\/jam.2015.5"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"SchauppLC FestaM.Cryptocurrency adoption and the road to regulation.Paper presented at the Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age.2018.","DOI":"10.1145\/3209281.3209336"},{"key":"e_1_2_7_6_1","unstructured":"KaiserB JuradoM LedgerA.The looming threat of China: an analysis of Chinese influence on Bitcoin.arXiv preprint arXiv:1810.02466.2018."},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi9030025"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2016.10.033"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1440774"},{"key":"e_1_2_7_10_1","unstructured":"MattaM LunesuI MarchesiM.Bitcoin spread prediction using social and web search media. Paper presented at the UMAP Workshops.2015."},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.06.009"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.078"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466603322438224"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"issue":"1","key":"e_1_2_7_16_1","first-page":"121","article-title":"Theory of planned behaviour and health behaviour","volume":"2","author":"Conner M","year":"2005","journal-title":"Predicting Health Behaviour"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2010.521684"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2019.111076"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.03.001"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/su11030849"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"SinghNK SahuG RanaNP PatilPP GuptaB.Critical success factors of the digital payment infrastructure for developing economies. Paper presented at the International Working Conference on Transfer and Diffusion of IT.2018.","DOI":"10.1007\/978-3-030-04315-5_9"},{"key":"e_1_2_7_22_1","unstructured":"HelmsK.33 000 companies register blockchain business in China [blog post].2020 January 6. Retrieved from:https:\/\/news.bitcoin.com\/33000-companies-in-china-claim-to-use-blockchain-technology\/. Dated 2020 June 24."},{"key":"e_1_2_7_23_1","unstructured":"Forbes Staff. \u201cCrypto Ponzi scheme; China dominates Bitcoin mining\u201d.Crypto Confidential forbes.com(2019 December 15). Retrieved from:https:\/\/www.forbes.com\/sites\/cryptoconfidential\/2019\/12\/15\/crypto-ponzi-scheme-china-dominates-bitcoin-mining\/#c771183534b4. Dated 2020 June 24."},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-12-242"},{"key":"e_1_2_7_25_1","unstructured":"ThomalaLL.Number of social media users in China 2017\u20132023 [blog post].2019 September 23. Retrieved from:https:\/\/www.statista.com\/statistics\/277586\/number-of-social-network-users-inchina\/#:~:text=In%202018%2C%20there%20were%20around world's%20biggest%20social%20media%20market. Dated 2020 June 24."},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.05.008"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.10.014"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.03.001"},{"issue":"4","key":"e_1_2_7_29_1","first-page":"243","article-title":"How large US companies can use Twitter and other social media to gain business value","volume":"9","author":"Culnan MJ","year":"2010","journal-title":"MIS Quarterly Executive"},{"key":"e_1_2_7_30_1","unstructured":"TrombleyAD.Integrating social networking with financial services: Google patents.2009."},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2011.05.009"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2008.09.010"},{"key":"e_1_2_7_33_1","first-page":"1","article-title":"Teens, social media & technology 2018","volume":"31","author":"Anderson M","year":"2018","journal-title":"Pew Research Center"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818787348"},{"key":"e_1_2_7_35_1","unstructured":"LenhartA PurcellK SmithA ZickuhrK.Social media & mobile internet use among teens and young adults. Millennials.Pew Internet & American Life Project.2010."},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(14)00198-1"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/15228916.2017.1416214"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/17531050903273768"},{"key":"e_1_2_7_39_1","unstructured":"AjzenI.Behavioral interventions based on the theory of planned behavior.2006."},{"key":"e_1_2_7_40_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315126449-1"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.21.2.194"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/nvsm.1519"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/bse.2419"},{"key":"e_1_2_7_44_1","volume-title":"Understanding attitudes and predicting social behavior","author":"Fishbein M","year":"1980"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2005.03.002"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-010-0687-7"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-009-0249-z"},{"issue":"6","key":"e_1_2_7_48_1","first-page":"1023","article-title":"The effects of service quality and lifestyle on consumer choice of channel types: the health food industry as an example","volume":"4","author":"Liu C\u2010H","year":"2010","journal-title":"Afr J Bus Manag"},{"issue":"1","key":"e_1_2_7_49_1","first-page":"533","article-title":"Peran pendidikan kewirausahaan dalam memediasi pengaruh norma subyektif terhadap niat berwirausaha","volume":"5","author":"Wedayanti NPAA","year":"2016","journal-title":"E\u2010Jurnal Manajemen Universitas Udayana"},{"key":"e_1_2_7_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1998.tb01685.x"},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/14792772143000003"},{"key":"e_1_2_7_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.wasman.2016.12.036"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/etap.12056"},{"key":"e_1_2_7_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11116-014-9567-9"},{"key":"e_1_2_7_55_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.26.2.136"},{"key":"e_1_2_7_56_1","doi-asserted-by":"crossref","unstructured":"MichaelGJ.Anarchy and property rights in the virtual world: how disruptive technologies undermine the state and ensure that the virtual world remains a \u2018wild west\u2019.2013. Available at SSRN 2233374.","DOI":"10.2139\/ssrn.2233374"},{"key":"e_1_2_7_57_1","first-page":"1","volume-title":"Virtual currency schemes","author":"European Central Bank","year":"2012"},{"key":"e_1_2_7_58_1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2012.0408"},{"issue":"7","key":"e_1_2_7_59_1","first-page":"6","article-title":"Is the corporate world ready for Bitcoin?","volume":"60","author":"Stark B","year":"2013","journal-title":"Risk Manage"},{"issue":"2015","key":"e_1_2_7_60_1","first-page":"29","article-title":"A Comparative Analysis of Bitcoin and Other Decentralised Virtual Currencies: Legal Regulation in the People's Republic of China, Canada, and the United States","volume":"9","author":"Ponsford M","year":"2015","journal-title":"HKJ Legal Stud"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intfin.2017.12.004"},{"key":"e_1_2_7_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"issue":"2","key":"e_1_2_7_63_1","first-page":"349","article-title":"Translation and content analysis of oral and written material","volume":"2","author":"Brislin RW","year":"1980","journal-title":"Handbook of Cross\u2010Cultural Psychology"},{"key":"e_1_2_7_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.03.001"},{"key":"e_1_2_7_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2012.00989.x"},{"key":"e_1_2_7_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_7_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"e_1_2_7_68_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_7_69_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-120710-100452"},{"key":"e_1_2_7_70_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0094"},{"key":"e_1_2_7_71_1","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression\u2010based Approach","author":"Hayes AF","year":"2013"},{"key":"e_1_2_7_72_1","volume-title":"PROCESS: A Versatile Computational Tool for Observed Variable Mediation, Moderation, and Conditional Process Modeling","author":"Hayes AF","year":"2012"},{"key":"e_1_2_7_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/00273170701341316"},{"key":"e_1_2_7_74_1","doi-asserted-by":"publisher","DOI":"10.21512\/commit.v10i1.1667"},{"key":"e_1_2_7_75_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12127"},{"key":"e_1_2_7_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.06.120"},{"key":"e_1_2_7_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2014.09.014"},{"key":"e_1_2_7_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2015.03.005"},{"key":"e_1_2_7_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.11.006"},{"key":"e_1_2_7_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.11.003"},{"key":"e_1_2_7_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2013.11.006"},{"key":"e_1_2_7_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2014.07.002"},{"key":"e_1_2_7_83_1","doi-asserted-by":"publisher","DOI":"10.1108\/01409171211255948"},{"key":"e_1_2_7_84_1","doi-asserted-by":"publisher","DOI":"10.2753\/PSS0885-3134320302"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.4590","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.4590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T12:48:19Z","timestamp":1693831699000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.4590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,16]]},"references-count":83,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2020,11,25]]}},"alternative-id":["10.1002\/dac.4590"],"URL":"https:\/\/doi.org\/10.1002\/dac.4590","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,16]]},"assertion":[{"value":"2019-09-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e4590"}}