Access the full text.
Sign up today, get DeepDyve free for 14 days.
Deborah Compeau, C. Higgins (1995)
Computer Self-Efficacy: Development of a Measure and Initial TestMIS Q., 19
Shan Liu (2015)
Effects of control on the performance of information systems projects: : The moderating role of complexity riskJournal of Operations Management, 36
Organizational Behavior and Human Decision Processes, 50
J. Maddux, R. Rogers (1983)
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude changeJournal of Experimental Social Psychology, 19
R. Rogers (1975)
A Protection Motivation Theory of Fear Appeals and Attitude Change1.The Journal of psychology, 91 1
Brian Humphrey (2019)
CompatibilityThe Bench Grafter’s Handbook
M. Smith, K. Wallston, Craig Smith (1995)
The development and validation of the Perceived Health Competence Scale.Health education research, 10 1
Shangpu Liu, F. Xia, Baojun Gao, Guoyin Jiang, Jinlong Zhang (2019)
Hybrid Influences of Social Subsystem and Technical Subsystem Risks in the Crowdsourcing MarketplaceIEEE Transactions on Engineering Management, 68
Nan Xiao, R. Sharman, H. Rao, S. Upadhyaya (2014)
Factors influencing online health information search: An empirical analysis of a national cancer-related surveyDecis. Support Syst., 57
Ming-Chien Hung, Wen-Yuan Jen (2012)
The Adoption of Mobile Health Management Services: An Empirical StudyJournal of Medical Systems, 36
Euehun Lee, Semi Han (2015)
Determinants of adoption of mobile health servicesOnline Inf. Rev., 39
Cynthia Riemenschneider, D. Harrison, Peter Mykytyn (2003)
Understanding it adoption decisions in small business: integrating current theoriesInf. Manag., 40
S. Miilunpalo, I. Vuori, P. Oja, M. Pasanen, H. Urponen (1997)
Self-rated health status as a health measure: the predictive value of self-reported health status on the use of physician services and on mortality in the working-age population.Journal of clinical epidemiology, 50 5
Cheolho Yoon, Jae-won Hwang (2013)
Exploring Factors That Influence Students’ Behaviors in Information Security
Xinshu Zhao, John Lynch, Qimei Chen (2010)
Reconsidering Baron and Kenny: Myths and Truths about Mediation AnalysisJournal of Consumer Research, 37
Zhaohua Deng, Shan Liu, O. Hinz (2015)
The health information seeking and usage behavior intention of Chinese consumers through mobile phonesInf. Technol. People, 28
D. Scammon, P. Keller, Pia Albinsson, Shalini Bahl, J. Catlin, Kelly Haws, J. Kees, Tracey King, E. Miller, Ann Mirabito, P. Peter, R. Schindler (2011)
Transforming Consumer HealthJournal of Public Policy & Marketing, 30
P. Hu, Patrick Chau, O. Sheng, K. Tam (1999)
Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine TechnologyJ. Manag. Inf. Syst., 16
S. Lim, L. Xue, C. Yen, Leanne Chang, H. Chan, B. Tai, H. Duh, M. Choolani (2011)
A study on Singaporean women's acceptance of using mobile phones to seek health informationInternational journal of medical informatics, 80 12
M. Shareef, Vinod Kumar, U. Kumar (2014)
Predicting mobile health adoption behaviour: A demand side perspectiveJournal of Customer Behaviour, 13
M. Workman, W. Bommer, D. Straub (2008)
Security lapses and the omission of information security measures: A threat control model and empirical testComput. Hum. Behav., 24
R. Andersen, J. Newman (1973)
Societal and individual determinants of medical care utilization in the United States.The Milbank Memorial Fund quarterly. Health and society, 51 1
S. Hung, Yi-Cheng Ku, Jui-Chi Chien (2012)
Understanding physicians' acceptance of the Medline system for practicing evidence-based medicine: A decomposed TPB modelInternational journal of medical informatics, 81 2
I. Junglas, R. Watson (2006)
The U-Constructs: Four Information DrivesCommun. Assoc. Inf. Syst., 17
Lixuan Zhang, William McDowell (2009)
Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong PasswordsJournal of Internet Commerce, 8
Hongyi Mao, Shan Liu, Jinlong Zhang (2015)
How the effects of IT and knowledge capability on organizational agility are contingent on environmental uncertainty and information intensityInformation Development, 31
Zhaohua Deng (2013)
Understanding public users' adoption of mobile health serviceInt. J. Mob. Commun., 11
Wen-Yuan Jen, Ming-Chien Hung (2010)
An empirical study of adopting mobile healthcare service: the family's perspective on the healthcare needs of their elderly members.Telemedicine journal and e-health : the official journal of the American Telemedicine Association, 16 1
J. Hass, G. Bagley, R. Rogers (1975)
Coping with the energy crisis: Effects of fear appeals upon attitudes toward energy consumption.Journal of Applied Psychology, 60
V. Venkatesh, Michael Morris, G. Davis, Fred Davis (2003)
User Acceptance of Information Technology: Toward a Unified ViewInstitutions & Transition Economics: Microeconomic Issues eJournal
C. Pechmann, Guangzhi Zhao, M. Goldberg, E. Reibling (2003)
What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message ThemesJournal of Marketing, 67
A. Peace, D. Galletta, J. Thong (2003)
Software Piracy in the Workplace: A Model and Empirical Test
Yao-bin Lu, Tao Zhou, Bin Wang (2009)
Exploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theoryComput. Hum. Behav., 25
Younghwa Lee (2011)
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspectiveDecis. Support Syst., 50
C. Moriarty (2009)
Effects of Self-Efficacy and Response Efficacy Messages in Health News: Changing Health Attitudes and Behavioral Intentions.
Shangpu Liu, Lin Wang, W. Huang (2017)
Effects of process and outcome controls on business process outsourcing performance: Moderating roles of vendor and client capability risksEur. J. Oper. Res., 260
M. Al-Debei, Enas Al-Lozi, A. Papazafeiropoulou (2013)
Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspectiveDecis. Support Syst., 55
Wiktoria Wilkowska, M. Ziefle (2012)
Privacy and data security in E-health: Requirements from the user’s perspectiveHealth Informatics Journal, 18
Izak Benbasat, Henri Barki (2007)
Quo vadis TAM?J. Assoc. Inf. Syst., 8
Ben Smith, K. Tang, D. Nutbeam (2006)
WHO Health Promotion Glossary: new terms.Health promotion international, 21 4
Xing Zhang, Shangpu Liu, Zhaohua Deng, Xing Chen (2017)
Knowledge sharing motivations in online health communities: A comparative study of health professionals and normal usersComput. Hum. Behav., 75
C. Fornell, D. Larcker (1981)
Evaluating structural equation models with unobservable variables and measurement error.Journal of Marketing Research, 18
Shu-Ping Lin (2011)
Determinants of adoption of Mobile Healthcare ServiceInt. J. Mob. Commun., 9
Huiying Zhang, M. Cocosila, N. Archer (2010)
Factors of Adoption of Mobile Information Technology by Homecare Nurses: A Technology Acceptance Model 2 ApproachCIN: Computers, Informatics, Nursing, 28
K. Desalvo, W. Fisher, Ky Tran, Nicole Bloser, William Merrill, J. Peabody (2006)
Assessing Measurement Properties of Two Single-item General Health MeasuresQuality of Life Research, 15
Dohoon Kim, Hyejung Chang (2007)
Key functional characteristics in designing and operating health information websites for user satisfaction: An application of the extended technology acceptance modelInternational journal of medical informatics, 76 11-12
Xitong Guo, Xiaocui Han, Xiaofei Zhang, Yuanyuan Dang, Chun Chen (2015)
Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences.Telemedicine journal and e-health : the official journal of the American Telemedicine Association, 21 8
Hongyi Mao, Shan-yi Liu, Jinlong Zhang, Zhaohua Deng (2016)
Information technology resource, knowledge management capability, and competitive advantage: The moderating role of resource commitmentInt. J. Inf. Manag., 36
Catherine Anderson, Ritu Agarwal (2010)
Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral IntentionsMIS Q., 34
Yongqiang Sun, Nan Wang, Xitong Guo, Zeyu Peng (2013)
UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELSJournal of Electronic Commerce Research, 14
Zhaohua Deng, Xiuting Mo, Shan Liu (2014)
Comparison of the middle-aged and older users' adoption of mobile health services in ChinaInternational journal of medical informatics, 83 3
A. Mohamed, H. Tawfik, D. Al-Jumeily, L. Norton (2011)
MoHTAM: A Technology Acceptance Model for Mobile Health Applications2011 Developments in E-systems Engineering
Huigang Liang, Yajiong Xue, Weiling Ke, K. Wei (2010)
Understanding the Influence of Team Climate on IT UseJ. Assoc. Inf. Syst., 11
Deborah Compeau, C. Higgins, S. Huff (1999)
Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal StudyMIS Q., 23
Xing Zhang, Shangpu Liu, Xing Chen, Lin Wang, Baojun Gao, Qing Zhu (2017)
Health information privacy concerns, antecedents, and information disclosure intention in online health communitiesInf. Manag., 55
Torben Hansen, J. Jensen, Hans Solgaard (2004)
Predicting online grocery buying intention: a comparison of the theory of reasoned action and the theory of planned behaviorInt. J. Inf. Manag., 24
Xiaofei Zhang, Xitong Guo, K. Lai, Feng Guo, Chenlei Li (2014)
Understanding gender differences in m-health adoption: a modified theory of reasoned action model.Telemedicine journal and e-health : the official journal of the American Telemedicine Association, 20 1
Ing-Long Wu, Jhao-Yin Li, Chu-Ying Fu (2011)
The adoption of mobile healthcare by hospital's professionals: An integrative perspectiveDecis. Support Syst., 51
A. Lin (2006)
The acceptance and use of a business-to-business information systemInt. J. Inf. Manag., 26
Kusum Ailawadi, D. Lehmann, S. Neslin (2003)
Revenue Premium as an Outcome Measure of Brand EquityJournal of Marketing, 67
Zhaohua Deng, Shangpu Liu (2017)
Understanding consumer health information-seeking behavior from the perspective of the risk perception attitude framework and social support in mobile social media websitesInternational journal of medical informatics, 105
P. Ifinedo (2012)
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theoryComput. Secur., 31
Ming-Chi Lee (2010)
Explaining and predicting users' continuance intention toward e-learning: An extension of the expectation-confirmation modelComput. Educ., 54
R. Miao, Qi Wu, Zheng Wang, Xilin Zhang, Yuqin Song, Hui Zhang, Qingfang Sun, Zhibin Jiang (2017)
Factors that influence users’ adoption intention of mobile health: a structural equation modeling approachInternational Journal of Production Research, 55
ZhangXiaofei, GuoXitong, LaiKee-hung, GuoFeng, LiChenlei (2014)
Understanding gender differences in m-health adoption: a modified theory of reasoned action model.Telemedicine Journal and E-health, 20
Allen Johnston, Merrill Warkentin (2010)
Fear Appeals and Information Security Behaviors: An Empirical StudyMIS Q., 34
International Journal of Medical Informatics, 76
Yogesh Dwivedi, M. Shareef, A. Simintiras, Banita Lal, V. Weerakkody (2016)
A generalised adoption model for services: A cross-country comparison of mobile health (m-health)Gov. Inf. Q., 33
Xitong Guo, Yongqiang Sun, Nan Wang, Jerry Peng, Ziyu Yan (2013)
The dark side of elderly acceptance of preventive mobile health services in ChinaElectronic Markets, 23
Mobile health service (MHS) can provide users with convenient health services and information to reduce their medical costs from aging or other health issues. Previous studies confirm the underdevelopment of the Chinese MHS. The purpose of this paper is to analyze the factors that affect the intention to use MHS.Design/methodology/approachThis paper develops a research model that integrates personal health differences with theory of planned behavior (TPB) and protection motivation theory (PMT). This model is empirically tested using data from 494 valid questionnaires. Structural equation modeling is used to test the hypotheses.FindingsPerceived vulnerability to disease, perceived severity of disease, response efficacy and self-efficacy positively affect attitude, thereby exerting a positive influence on the behavioral intention to use MHS. Subjective norms also influence users’ behavioral intention. Personal health status and personal health value have quasi-moderating effects on the relationship between attitude and behavioral intention.Originality/valueThis paper presents an early attempt to conceptualize and validate a research model of MHS acceptance by integrating TPB and PMT in a complementary manner. The integrated model provides a holistic view of people’s intention to use MHS by considering health threat beliefs, individual role (i.e. attitude and self-efficacy) and social influences (i.e. subjective norms). Furthermore, this research highlights the role of two individual health characteristics (i.e. personal health status and personal health value) in MHS adoption. These new findings are beneficial toward an in-depth understanding of technology adoption in the MHS context.
Online Information Review – Emerald Publishing
Published: Jan 22, 2020
Keywords: Behavioral intention; The theory of planned behavior; Health differences; Mobile health service; Protection motivation theory
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.