Malicious applications can be introduced to attack users and services so as to gain financial rewards,individuals’sensitive information,company and government
This study uses the Elaboration Likelihood Model(ELM)and social presence theory to examine the microblogging reposting mechanism.Subjective and objective data w