Access the full text.
Sign up today, get DeepDyve free for 14 days.
B. Hensel, G. Demiris, K. Courtney (2006)
Brief Review: Defining Obtrusiveness in Home Telehealth Technologies: A Conceptual FrameworkJ. Am. Medical Informatics Assoc., 13
Tamara Dinev, Heng Xu, Jeff Smith, Paul Hart (2013)
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related conceptsEuropean Journal of Information Systems, 22
R. Rogers (1975)
A Protection Motivation Theory of Fear Appeals and Attitude Change1.The Journal of psychology, 91 1
C. Fornell, D. Larcker (1981)
Evaluating structural equation models with unobservable variables and measurement error.Journal of Marketing Research, 18
Corey Angst, Ritu Agarwal (2009)
Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual PersuasionMIS Q., 33
Heng Xu, Tamara Dinev, Jeff Smith, Paul Hart (2011)
Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy AssurancesJ. Assoc. Inf. Syst., 12
Joseph Wei (2014)
How Wearables Intersect with the Cloud and the Internet of Things : Considerations for the developers of wearables.IEEE Consumer Electronics Magazine, 3
Yali Zheng, Xiaorong Ding, Carmen Poon, Benny Lo, Heye Zhang, Xiao-Lin Zhou, Guang-Zhong Yang, Ni Zhao, Yuan-ting Zhang (2014)
Unobtrusive Sensing and Wearable Devices for Health InformaticsIeee Transactions on Bio-Medical Engineering, 61
A. Mishra, Catherine Anderson, Corey Angst, Ritu Agarwal (2012)
Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory PerspectiveInf. Syst. Res., 23
F. Huber, K. Vollhardt, Isabel Matthes, Johannes Vogel (2010)
Brand misconduct: Consequences on consumer–brand relationshipsJournal of Business Research, 63
R. Steele, Amanda Lo, Chirstopher Secombe, Y. Wong (2009)
Elderly persons' perception and acceptance of using wireless sensor networks to assist healthcareInternational journal of medical informatics, 78 12
N. Weinstein (1993)
Testing four competing theories of health-protective behavior.Health psychology : official journal of the Division of Health Psychology, American Psychological Association, 12 4
S. Prentice-Dunn, R. Rogers (1986)
Protection Motivation Theory and preventive health: beyond the Health Belief ModelHealth Education Research, 1
S. Hung, J. Tsai, Chun-Chin Chuang (2014)
Investigating primary health care nurses' intention to use information technology: An empirical study in TaiwanDecis. Support Syst., 57
Choy-Har Wong, G. Tan, Siew-Phaik Loke, K. Ooi (2014)
Mobile TV: a new form of entertainment?Ind. Manag. Data Syst., 114
Yongqiang Sun, Nan Wang, Xitong Guo, Zeyu Peng (2013)
UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELSJournal of Electronic Commerce Research, 14
Tamara Dinev, Paul Hart (2006)
An Extended Privacy Calculus Model for E-Commerce TransactionsInf. Syst. Res., 17
Stuart Moran, T. Nishida, K. Nakata (2013)
Comparing British and Japanese Perceptions of a Wearable Ubiquitous Monitoring DeviceIEEE Technology and Society Magazine, 32
Tommy Chan, Christy Cheung, Na Shi, Matthew Lee (2015)
Gender differences in satisfaction with Facebook usersInd. Manag. Data Syst., 115
G. Bansal, F. Zahedi, D. Gefen (2010)
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information onlineDecis. Support Syst., 49
V. Venkatesh, J. Thong, Xin Xu (2012)
Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of TechnologyBehavioral Marketing eJournal
James Anderson, D. Gerbing (1988)
STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACHPsychological Bulletin, 103
Han Li, Ashish Gupta, Jie Zhang, R. Sarathy (2014)
Examining the decision to use standalone personal health record systems as a trust-enabled fair social contractDecis. Support Syst., 57
D. Floyd, S. Prentice-Dunn, R. Rogers (2000)
A meta-analysis of research on protection motivation theory.Journal of Applied Social Psychology, 30
Ing-Long Wu, Jhao-Yin Li, Chu-Ying Fu (2011)
The adoption of mobile healthcare by hospital's professionals: An integrative perspectiveDecis. Support Syst., 51
Tao Wang, Chul-Ho Jung, Min-Seuk Kang, Y. Chung (2014)
Exploring determinants of adoption intentions towards Enterprise 2.0 applications: an empirical studyBehaviour & Information Technology, 33
B. Wixom, P. Todd (2005)
A Theoretical Integration of User Satisfaction and Technology AcceptanceInf. Syst. Res., 16
Susan Brown, V. Venkatesh (2005)
Model of Adoption and Technology in Households: A Baseline Model Test and Extension Incorporating Household Life CycleMIS Q., 29
V. Claes, E. Devriendt, J. Tournoy, K. Milisen (2014)
Attitudes and perceptions of adults of 60 years and older towards in-home monitoring of the activities of daily living with contactless sensors: an explorative study.International journal of nursing studies, 52 1
Juan Fraile, Javier Bajo, J. Corchado, A. Abraham (2010)
Applying wearable solutions in dependent environmentsIEEE Transactions on Information Technology in Biomedicine, 14
N. Awad, M. Krishnan (2006)
The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for PersonalizationMIS Q., 30
V. Venkatesh, Michael Morris, G. Davis, Fred Davis (2003)
User Acceptance of Information Technology: Toward a Unified ViewInstitutions & Transition Economics: Microeconomic Issues eJournal
Shwadhin Sharma, Robert Crossler (2014)
Disclosing too much? Situational factors affecting information disclosure in social commerce environmentElectron. Commer. Res. Appl., 13
Allen Johnston, Merrill Warkentin (2010)
Fear Appeals and Information Security Behaviors: An Empirical StudyMIS Q., 34
É. Maillet, Luc Mathieu, C. Sicotte (2015)
Modeling factors explaining the acceptance, actual use and satisfaction of nurses using an Electronic Patient Record in acute care settings: An extension of the UTAUTInternational journal of medical informatics, 84 1
Tamara Dinev, M. Bellotto, Paul Hart, V. Russo, Ilaria Serra, C. Colautti (2006)
Privacy calculus model in e-commerce – a study of Italy and the United StatesEuropean Journal of Information Systems, 15
Heng Xu, H. Teo, B. Tan, Ritu Agarwal (2009)
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based ServicesJournal of Management Information Systems, 26
C. Miltgen, Aleš Popovič, T. Oliveira (2013)
Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy contextDecis. Support Syst., 56
M. Chan, D. Estève, J. Fourniols, C. Escriba, E. Campo (2012)
Smart wearable systems: Current status and future challengesArtificial intelligence in medicine, 56 3
Michael Johnson, K. Zheng, R. Padman (2014)
Modeling the longitudinality of user acceptance of technology with an evidence-adaptive clinical decision support systemDecis. Support Syst., 57
Purpose – The purpose of this paper is to investigate the factors associated with consumer’s intention to adopt wearable technology in healthcare, and to examine the moderating effects of product type on consumer’s adoption intention. Design/methodology/approach – An integrated acceptance model was developed based on unified theory of acceptance and use of technology 2 (UTAUT2), protection motivation theory (PMT), and privacy calculus theory. The model was tested with 462 respondents using a survey. Findings – Consumer’s decision to adopt healthcare wearable technology is affected by factors from technology, health, and privacy perspectives. Specially, fitness device users care more about hedonic motivation, functional congruence, social influence, perceived privacy risk, and perceived vulnerability, but medical device users pay more attention to perceived expectancy, self-efficacy, effort expectancy, and perceived severity. Originality/value – This study is among the first to investigate healthcare wearable device from behavioral perspective. It also helps to comprehensively understand emerging health information technology (HIT) acceptance from technology, health, and privacy perspectives.
Industrial Management & Data Systems – Emerald Publishing
Published: Oct 19, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.