ArticlePDF Available

Understanding the acceptance of mobile health services: A comparison and integration of alternative models

Authors:

Abstract and Figures

The advancement of mobile technology and the increasing importance of health promote the boom in mobile health services (MHS) around the world. Although there have been several studies investigating the health technology acceptance behavior from a variety of theoretical perspectives, they have not provided a unified understanding. To fill this research gap, this paper: (1) reviews the health technology acceptance literature and discusses three prominent models (e.g., the technology acceptance model, the theory of planned behavior or the unified theory of use and acceptance of technology, and the protection motivation theory), (2) empirically compares the three models, and (3) formulates and empirically validates the unified model in the context of mobile health services. In the unified model of health technology acceptance, we propose that users' intention to use mobile health services is determined by five key factors: performance expectancy, effort expectancy, social influence, facilitating conditions, and threat appraisals. The results show that the unified model outperforms the three alternative models by significantly improving the R-squares. Finally, the implications for theory and practice are put forward.
Content may be subject to copyright.
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 183
UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES:
A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS
Yongqiang Sun
School of Information Management
Wuhan University
299 Bayi Road, Wuhan, Hubei, China
syq@mail.ustc.edu.cn
Nan Wang
USTC-CityU Joint Advanced Research Center
University of Science and Technology of China
166 Ren’ai Road, Suzhou, Jiangsu, China
kewang@mail.ustc.edu.cn
Xitong Guo
School of Management
Harbin Institute of Technology
92 West Da-Zhi Street, Harbin, Heilongjiang, China
xitongguo@gmail.com
Zeyu Peng
School of Business
East China University of Science and Technology
130 Meilong Road, Shanghai, China
yueryu2004@yahoo.com
ABSTRACT
The advancement of mobile technology and the increasing importance of health promote the boom in mobile
health services (MHS) around the world. Although there have been several studies investigating the health
technology acceptance behavior from a variety of theoretical perspectives, they have not provided a unified
understanding. To fill this research gap, this paper: (1) reviews the health technology acceptance literature and
discusses three prominent models (e.g., the technology acceptance model, the theory of planned behavior or the
unified theory of use and acceptance of technology, and the protection motivation theory), (2) empirically compares
the three models, and (3) formulates and empirically validates the unified model in the context of mobile health
services. In the unified model of health technology acceptance, we propose that users’ intention to use mobile health
services is determined by five key factors: performance expectancy, effort expectancy, social influence, facilitating
conditions, and threat appraisals. The results show that the unified model outperforms the three alternative models
by significantly improving the R-squares. Finally, the implications for theory and practice are put forward.
Keywords: mobile health; technology acceptance model (TAM); protection motivation theory (PMT); theory of
planned behavior (TPB); the unified theory of use and acceptance of technology (UTAUT)
1. Introduction
The advancement of wireless networks and mobile devices has driven the emergence of mobile health services
(MHS) which can be defined as a variety of healthcare services, including health consulting, hospital registering,
and location-based services delivered through mobile communications and network technologies [Istepanian et al.
2006; Ivatury et al. 2009]. Compared to the previous electronic health services which are based on the desktop
computer and wired network, MHS enables users to access to health services more conveniently. For example, when
a user suddenly suffers a heart attack in the suburbs where the wired network is not available, s/he can press an SOS
button on the customized mobile device for MHS, and then the emergency center of the hospital will receive the
message, identify the location of the user, and arrange for the aid.
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 184
The most important issue for mobile health service providers is to attract and keep their users, precipitating the
understanding on users’ mobile health service adoption behavior as a critical issue for researchers on this specific
research area. However, despite numerous previous studies investigating the electronic health technology adoption
behavior, most of these studies view this phenomenon from the perspective of professionals or physicians [e.g.,
Bhattacherjee et al. 2007; Chau et al. 2002; Klein 2007], focusing on the technologies used in the diagnosis process
[Romanow et al. 2012] such as electronic medical records [e.g., Hennington et al. 2007] and computerized physician
order entry (COPE) systems [e.g., Bhattacherjee et al. 2007]. In contrast, the studies on health technology adoption
behavior from the perspective of patients or consumers are relatively rare. This lack is a mismatch for the increasing
prevalence of health technology or services for consumers who receive medical care [Or et al. 2009]. Thus, our
study fills the gap by examining the health technology acceptance behavior from the perspective of consumers rather
than that of professionals.
Among the limited empirical studies on consumers’ health technology adoption behavior, most studies view this
issue from the technology acceptance theories. For example, Akter et al. [2010] investigate how users’ perceptions
of mobile health service quality influence their intentions to adopt the services from the information systems success
model [DeLone et al. 2003]. Cocosila and Archer [2010] purport that users’ intentions to adopt MHS are determined
by their extrinsic motivation (e.g., the extent to which the services are useful) and intrinsic motivation (e.g., the
extent to which the services are enjoyable) from the motivational model [Venkatesh et al. 2002]. Hung and Jen
[2010] posit behavioral intention to be the result of perceived usefulness and perceived ease of use by drawing on
the technology acceptance model (TAM) [Davis 1989].
Although these studies treating consumer health technology acceptance behavior as a special case of technology
acceptance tell part of the whole story, these studies do not shed light on how usersdecision making processes
differ when the technology is for healthcare rather than for other objectives. According to Nutbeam [1998], health
behavior is defined as “any activity undertaken by an individual, regardless of actual or perceived health status, for
the purpose of promoting, protecting or maintaining health, whether or not such behavior is objectively effective
towards that end” (p. 355). Regarding the adoption of health services as an activity to promote, protect or maintain
health, health technology acceptance behavior should be considered health behavior [Laugesen et al. 2011;
Scammon et al. 2011]. Therefore, a better understanding of the health technology acceptance behavior should be
seen not only from a technology acceptance perspective but also as a health behavior perspective.
Treating health technology acceptance behavior as health behavior, a variety of health behavior theories can be
used to explain this phenomenon. Among these theories, the protection motivation theory (PMT) is most widely
used. This theory argues that individuals’ evaluations on the severity and the vulnerability of the potential threats
(i.e., threat appraisals) and the extent to which they can cope with the threats by conducting certain health behavior
(i.e., coping appraisals) will determine their intentions to perform the health behavior [Rogers 1983]. Here, the
health technology acceptance behavior is regarded as a behavior to cope with the potential threats to health.
Both the technology acceptance and the health behavior theories can be used to explain the health technology
acceptance behavior. The question that follows then is whether or not one stream of theories can outperform another
stream of theories in predicting the health technology acceptance behavior, and whether it is possible to integrate
these two theoretical streams to formulate a unified model. Therefore, the research objective of the study can be
clearly stated as: to compare and integrate the alternative models to explain the health technology acceptance
behavior.
The remainder of the paper is organized as follows. The technology acceptance theories and the health behavior
theories are first reviewed, after which the differences and the similarities between these theories are articulated and
a unified model to integrate these theories is proposed. Next, the methods and procedures to collect the data are
shown and the data analysis results are reported. Finally, the limitations, theoretical and practical implications of the
study are discussed.
2. Literature Review and Theoretical Background
2.1. Technology Acceptance Theories
Technology acceptance is regarded as one of the most important research areas in the information systems (IS)
research [Venkatesh et al. 2003]. It engages in understanding the variety of factors that determine users’ intentions to
adopt a technology and their actual technology usage behaviors. An overview of the literature relevant to the
technology acceptance behavior is portrayed in Figure 1.
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 185
Figure 1: An Overview of Technology Acceptance Theories
The key theories used to explain the technology acceptance behavior and the relationships between these
theories are shown in Figure 1. Among these theories, Davis’ [1989] technology acceptance model (TAM) is most
influential. This theory states that users’ intention to adopt a new technology is determined by two key beliefs,
namely, perceived usefulness and perceived ease of use. Perceived usefulness (PU) refers to “the degree to which a
person believes that using a particular system would enhance his or her job performance” [Davis 1989, p.320], while
perceived ease of use (PEOU) refers to “the degree to which a person believes that using a particular system would
be free of effort” [Davis 1989, p. 320]. This theory is derived from a more general theory to explain individual
behavior, namely, the theory of reasoned action (TRA) [Fishbein et al. 1975], which argues that individual
behavioral intention is determined by two key factors: attitude, which describes “an individual’s positive or negative
feelings (evaluative affect) about performing the target behavior” [Fishbein et al. 1975, p. 216] and subjective norm,
which captures “the person’s perception that most people who are important to him think he should or should not
perform the behavior in question” [Fishbein et al. 1975, p. 302]. Attitude is formed based on an individual’s beliefs
about consequences of particular behavior (e.g., behavioral beliefs), and subjective norm is formed based on an
individual’s perceptions of social normative pressures (e.g., normative beliefs). The two important factors in TAM
can actually be regarded as two beliefs resulting in attitude. Obviously, subjective norm is not considered in TAM.
To fill this gap, Venkatesh and Davis [2000] extended TAM by including subjective norm as another important
determinant of intention in the case of mandatory settings (e.g., TAM2). Thus, TAM2, in some sense, is equivalent
to TRA.
The unified theory of acceptance and use of technology (UTAUT) is another widely used theory to explain
technology acceptance [e.g., Fetscherin et al. 2008; Yu 2012; Zhou 2012]. In UTAUT, Venkatesh et al. [2003] -
based on the comparison of the eight prominent theories - further extended TAM2 by reframing the concepts used in
previous studies and including facilitating conditions as an additional predictor of intention. Specifically, perceived
usefulness, perceived ease of use, and subjective norm are respectively represented by three new terms, namely,
performance expectancy, effort expectancy, and social influence.
In greater detail, performance expectancy refers to “the degree to which an individual believes that using the
system will help him or her to attain gains in job performance” [Venkatesh et al. 2003, p. 447]. Effort expectancy
Theory of Reasoned
Action (TRA)
Technology Acceptance
Model (TAM)
TAM2
Unified Theory of
Technology Acceptance
and use of Technology
(UTAUT)
Theory of Planned
Behavior (TPB)
IS Success Model
Innovation Diffusion
Task-Technology Fit
+ Perceived Behavioral
Control (PBC)
Key Beliefs Formulating
Attitude
Antecedents of PU
and PEOU
+ Subjective Norm (SN)
+ Facilitating Conditions
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 186
refers to “the degree of ease associated with the use of the system” [Venkatesh et al. 2003, p. 450]. Social influence
is defined as “the degree to which an individual perceives that important others believe he or she should use the new
system[Venkatesh et al. 2003, p. 451]. The added construct - facilitating conditions - is defined as “the degree to
which an individual believes that an organizational and technical infrastructure exists to support use of the system”
[Venkatesh et al. 2003, p. 453]. This definition is very similar to the concept of perceived behavioral control (PBC)
in the theory of planned behavior (TPB) [Ajzen 1991], which is an extension of TRA by including PBC. Therefore,
UTAUT and TPB are equivalent regarding performance expectancy and effort expectancy as two components of
attitude [Benbasat et al. 2007].
In addition to the relevant TAM theories, there are several other theories used to explain the technology
acceptance behavior including the IS success model, innovation diffusion theory (IDT), and task - technology fit
theory (TTFT). Specifically, DeLone and McLean’s [2003] IS success model suggests that the technology
acceptance behavior is determined by information quality, system quality, and service quality. The innovation
diffusion theory argues that the adoption of innovation is determined by five factors: relative advantage,
compatibility, triability, observability, and complexity
Table 1: Previous Studies on Health Information Technology Acceptance
Literature
User Type
Theory
Key Conclusion
[Hu et al. 1999]
Professionals
TAM
PU is a significant determinant of attitude and
intention, but PEOU is not.
[Chau et al. 2001]
Professionals
TAM, TPB,
and IDT
Compatibility has a positive effect on PU.
PU has positive effects on attitude and behavioral
intention.
Attitude and PBC have positive effects on behavioral
intention but SN does not.
[Chau et al. 2002]
Professionals
TAM and TPB
TAM is more appropriate than TPB for examining
technology acceptance by individual professionals.
[Yi et al. 2006]
Professionals
TAM and TPB
PU has a positive effect on behavioral intention, but
PEOU does not.
PBC and SN have
positive impacts on behavioral
intention.
Result demonstrability and image have positive effects
on PU and PEOU.
[Bhattacherjee et
al. 2007]
Professionals
TAM and IDT
PU has a positive effect on intention, but PEOU does
not.
Perceived compatibility has a positive effect on PU.
[Liang et al. 2010]
Professionals
UTAUT
Performance expectancy and facilitating conditions
have significant impacts on IT use,
while effort
expectancy and SN do not.
[Moores 2012]
Professionals
TAM and IS
success model
PU and PEOU have significant impacts on attitude
towards technology adoption.
Information quality has a significant impact on PU but
insignificant effect on PEOU.
[Hung et al. 2012]
Professionals
TAM and TPB
Attitude, SN, PBC have positive effects on usage
intention.
PU and PEOU have positive effects on attitude.
[Kim et al. 2007]
Consumers
TAM
PU has a positive effect on satisfaction, while PEOU
does not.
[Klein 2007]
Consumers
TAM
PU has a positive effect on behavioral intention.
[Akter et al. 2010]
Consumers
IS success
model
Service quality has three dimensions, namely, platform
quality, interaction quality, and outcome quality.
Service quality has positive effects on satisfaction and
behavioral intention.
[Rogers 1995]. The task technology fit theory postulates that when the task characteristic and technology
characteristic are a good fit, an individual’s technology utilization and his/her performance will increase [Goodhue
et al. 1995]. These three theories are often used to explain the antecedents of TAM factors or TPB factors. For
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 187
example, Wixom and Todd [2005] and Celik and Yimaz [2011] argue for information quality and system quality as
the antecedents of PU and PEOU. Dishaw and Strong [1999] propose task-technology fit as the antecedent of PU
and PEOU. Lau et al. [2001] suggest factors in the innovation diffusion theory, including compatibility and relative
advantage, as the antecedents of attitude.
Most previous empirical studies on health information technology (HIT) acceptance are built upon the
technology acceptance theories (as shown in Table 1).
As shown in Table 1, most of these studies focus on investigating the professionals’ technology acceptance
rather than the patients’ technology acceptance. One of the interesting findings of these studies is that perceived ease
of use has no significant impact on behavioral intention, because professionals may exhibit considerable competence
and adaptability to new technologies [Hu et al. 1999]. However, when examining the patients’ technology
acceptance behavior, the conclusion may not hold true, requiring further empirical examination. Further, among
these studies, TAM and TPB are regarded as two of the most influential theories on technology acceptance behavior,
and thus we compare these two models in our study.
2.2. Health Behavior Theories
To differentiate the acceptance behavior of health information technology from other technologies, researchers
need to pay attention to adapting the model specifically to the health care context [Holden et al. 2010]. Therefore,
despite the technology acceptance theories, the health behavior theories also need to be taken into account.
There are four major theories used to explain health behavior: health belief model (HBM), protection
motivation theory (PMT), subjective expected utility theory (SEU), and theory of reasoned action (TRA) (see the
review by Weinstein [1993]). HBM [e.g., Becker 1974] believes that a person makes a decision on whether or not to
take a health-related action based on his/her evaluations on the perceived threat of not taking the action and the net
benefits of taking the action. Specifically, perceived threat is assessed according to perceived susceptibility (i.e.,
one’s opinion of chances of getting a condition) and perceived severity (i.e., one’s opinion of how serious a
condition and its consequences are). Net benefits are calculated based on perceived benefits (i.e., one’s belief in the
efficacy of the advised action to solve the threat) and perceived barriers (i.e., one’s opinion of the tangible and
psychological costs of the advised action). PMT [e.g., Rogers 1975] proposes a series of factors similar to HBM to
explain health behavior. Specifically, PMT uses perceived vulnerability, perceived severity, response efficacy, and
response costs to represent perceived susceptibility, perceived severity, perceived benefits, and perceived barriers in
HBM. It includes a new factor, self-efficacy, to capture the degree to which one has the ability to perform the
advised action [Bandura 1977]. Further, PMT classifies these factors into two categories according to individuals’
decision making stages: the threat appraisals, including perceived vulnerability and perceived severity, and the
coping appraisals, including response efficacy, response costs, and self-efficacy. PMT is generally regarded as a
better theory than is HBM for explaining health behavior [Prentice-Dunn et al. 1986].
SEU and TRA are considered as more general theories on health behavior. SEU [e.g., Ronis 1992] postulates
that an individual’s behavior is determined by his/her evaluation of the expected utilities of alternative behaviors and
the utilities of these behaviors. Similarly, TRA [e.g., Fishbein et al. 1975] articulates that individual behaviors are
determined by attitude (i.e., the sum of the expected values of the behavioral consequences), and subjective norm
(i.e., an individual’s perception of whether people important to the individual think the behavior should be
performed). SEU and TRA can be used to explain general individual behaviors but are not limited to health
behavior.
As shown in Figure 2, all four health behavior theories are associated with the two fundamental principles:
expectancy value theory and cost benefit analysis [Weinstein 1993]. For example, in PMT, perceived severity
and perceived vulnerability are derived from the expectancy value theory, and the response efficacy and response
costs are derived from the cost benefit analysis.
Regarding PMT’s advantage over HBM and SEU for including the factor self-efficacy and that TRA is superior
to other theories for including social influence (e.g., subjective norm), we take PMT and TRA (or its extension TPB)
as the major theories for understanding health behavior.
Although PMT has been widely used as a theory to explain the adoption of health technology or services in
health psychology (see the meta-analysis by Floyd et al. [2000]), in the literature its application in the mobile health
context is rarely found. In our study, we thus examine whether PMT is an appropriate theory to explain the mobile
health service adoption behavior and compare the predictive powers of PMT and technology acceptance theories.
2.3. Rationality for Theoretical Integration
Regarding mobile health service adoption behavior as both technology acceptance behavior and health behavior,
a comprehensive understanding of the issue requires the integration of these two theoretical perspectives. To
formulate a unified theory on health technology acceptance, the three prominent theories (e.g., TAM, TPB or
UTAUT, and PMT) are compared in Table 2.
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 188
Figure 2: An Overview of Health Behavior Theories
As evident in Table 2, several different terms used in different theories share similar meanings. For example,
perceived usefulness in TAM is similar to response efficacy in PMT, reflecting the degree to which using mobile
health services can reduce the potential threats to health; self-efficacy and response cost in PMT can be respectively
regarded as perceived internal and external behavioral control (PBC) in TPB or facilitating conditions in UTAUT.
Further, perceived usefulness and perceived ease of use in TAM reflect TPB attitude. Thus, to formulate a unified
theory, we need to deal with the conceptual overlaps in different theories.
Following the framework of UTAUT [Venkatesh et al. 2003], perceived usefulness or response efficacy can be
seen as performance expectancy; perceived ease of use can be captured by effort expectancy; subjective norm can be
represented by social influence. Self-efficacy and response cost can be interpreted by facilitating conditions. Further,
we adapt the term, threat appraisals, in PMT to capture perceived vulnerability and perceived severity [Rogers 1975].
Through this reconceptualization in the unified model of health technology acceptance, five factors are taken as the
determinants of health technology acceptance: performance expectancy, effort expectancy, social influence,
facilitating conditions, and threat appraisals.
Table 2: A Comparison of the Three Prominent Theories
Unified Model
Constructs
TAM
TPB/UTAUT
PMT
Performance Expectancy
Perceived Usefulness /
Response Efficacy
Effort Expectancy
Perceived Ease of Use
Social Influence
Subjective Norm
Facilitating Conditions
Self-Efficacy (Perceived
Internal Behavioral
Control)
Response Cost (Perceived
External Behavioral
Control)
Threat Appraisals
Perceived Vulnerability
Perceived Severity
Through the comparisons of the three prominent models, we can see that TAM captures only the components of
Expectancy Value
Theory
Benefit Cost
Analysis
Attitude
Subjective Norm
Severity
Susceptibility
Benefits
Barriers
Severity
Vulnerability
Response Cost
Response Efficacy
Self-Efficacy
Probability
Utility
HBM
PMT
SEU
TRA
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 189
performance and effort expectancy. TPB or UTAUT captures the first four components but does not consider the
component of threat appraisals. In contrast, PMT does not include the components of effort expectancy and social
influence. Therefore, the integrated model (see Figure 3) is expected to have greater predictive power than any of the
alternative models.
Figure 3: Research Model
3. Hypotheses
3.1. Performance Expectancy
Performance expectancy describes users’ opinions of the effectiveness of using a technology [Venkatesh et al.
2003]. Within our research context where mobile health services (MHS) are the target technology, its effectiveness
can be captured by the extent to which it can help users to reduce the health-relevant threat, and thus response
efficacy in the PMT theory is treated as a proxy of performance expectancy. When users consider that using MHS
can enable them to reduce the threats to health, they will be more likely to adopt this technology. This positive
relationship can also be supported according to the positive effect of performance expectancy on behavioral
intention in UTAUT [Venkatesh et al. 2003] and the positive effect of response efficacy on behavioral intention in
PMT [Rogers 1975].We thus propose:
H1: Response efficacy is positively associated with MHS adoption intention.
3.2. Effort Expectancy
Perceived
Vulnerability
Perceived
Severity
Response
Efficacy
Self-Efficacy
Response Cost
Adoption
Intention
Threat
Appraisals
Facilitating
Conditions
Perceived
Ease of Use
Subjective
Norm
Social
Influence
Effort
Expectancy
Performance
Expectancy
H1
H2
H3
H4
H5
H6
H7
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 190
Effort expectancy describes users’ opinion of the effort associated with the use of a technology [Venkatesh et al.
2003]. It can be represented by perceived ease of use in TAM. In previous studies on the professionals’ technology
acceptance behaviors, because most professionals have adequate competence to learn and operate the technology,
perceived ease of use is found to have insignificant impact on behavioral intention [e.g., Hu et al. 1999]. However,
within our research context regarding elderly users not being skilled users of new technologies, the elderly will not
be likely to try a new technology which is perceived to be complex. In this situation, perceived ease of use should be
a significant predictor of behavioral intention. This is supported by UTAUT, which argues that age moderates the
relationship between perceived ease of use and intention, such that this relationship will be more salient for older
users than for younger users [Venkatesh et al. 2003]. Therefore, we propose that:
H2: Perceived ease of use is positively associated with MHS adoption intention.
3.3. Social Influence
Social influence captures how users’ decision making is affected by significant others’ perceptions. It can be
reflected by the subjective norm in TPB. Previous studies on professionals’ health technology acceptance behavior
have found that social influence does not play an important role [e.g., Chau et al. 2001] because most professionals
are confident in their own decision making and are not concerned about others’ opinions. However, in our study,
because most elderly users tend to have their decision making reliant on others’ suggestions, social influence should
play a more important role. The UTAUT also states that the relationship between social influence and behavioral
intention is stronger for older users [Venkatesh et al. 2003]. Thus, we propose that:
H3: Subjective norm is positively associated with MHS adoption intention.
3.4. Facilitating Conditions
Facilitating conditions describes the potential conditions that constrain or facilitate performing the behavior.
This is similar to the concept of perceived behavioral control in TPB. According to TPB, perceived behavioral
control is derived from two sources: external and the internal control [Ajzen 1991]. External control stresses the
extent to which individuals have adequate external resources to perform a behavior, while internal control focuses
on the extent to which individuals have the ability to undertake the behavior [Pavlou et al. 2006; Yang et al. 2009].
Within our research context, response cost is regarded to be associated with external control because it is
relevant to the resources (especially the money and effort) spent for learning and using the MHS. If users need to
spend considerable money to pay for the services or much effort to learn the technology (i.e., high response cost),
they may be unlikely to use the technology, indicating a negative relationship between response cost and adoption
intention [e.g., Rogers 1975]. Further, for elderly users who care more about the value of expenditures, response cost
should be an important factor influencing their decision making. For example, according to our initial interview with
some of the elderly users, they gave raising their grandsons priority over other issues. Therefore, we propose that:
H4: Response cost is negatively associated with MHS adoption intention.
The internal control in our study refers to users’ ability to learn and use mobile health services. When users are
confident in their ability to use the technology, they will be more likely to use that technology. This relationship has
been well established in previous studies on technology acceptance [e.g, Venkatesh et al. 2003]. Within our research
context, lack of competence to use the technology may become a major barrier inhibiting the elderly users’ new
technology acceptance. As suggested by Morris et al. [2005], the relationship between perceived behavioral control
and behavioral intention is stronger for older users. Thus, we propose that:
H5: Self-efficacy is positively associated with MHS adoption intention.
3.5. Threat Appraisals
The motivation theory postulates that any individual behavior is driven by the needs [Deci et al. 1985].
However, all of the aforementioned factors have focused mainly on what should be considered when an individual
has identified certain needs to adopt a new technology, while how these needs are generated is not taken into
consideration. According to PMT, a health behavior is induced not only by threat appraisals that assess the
probability and severity of the threats (i.e., needs) but also by coping appraisals that assess how one responds to the
situation [Rogers 1975]. Thus, beyond the aforementioned factors that capture only coping appraisals, the threat
appraisals should also be considered.
According to PMT, threat appraisals include two constructs: perceived vulnerability and perceived severity.
Perceived vulnerability refers to the probability that one will experience harm, while perceived severity refers to the
degree of harm from unhealthy behavior [Rogers 1975]. When users consider that they are more likely to suffer a
health-relevant threat (i.e., high perceived vulnerability) and/or the harm of the threat is serious (i.e., high perceived
severity), they will tend to adopt the health technology that can avoid or reduce the threat [Rogers 1975].
Accordingly, we propose that:
H6: Perceived vulnerability is positively associated with MHS adoption intention.
H7: Perceived severity is positively associated with MHS adoption intention.
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 191
4. Methodology
4.1. Research Setting and Subjects
To test our proposed research model and hypotheses, a field survey was conducted with subjects who were the
customers of a large company providing mobile health services (MHS) targeting elderly consumers in Harbin, China.
This company is one of the biggest companies in China providing integrated health services for the elderly, and it is
also the only company that obtains the ISO9001 certification in China to provide home healthcare services for the
elderly, indicating that the target company is an appropriate site for collecting data. As to the subjects, elderly
consumers were selected as the target subjects because the target company takes elderly consumers as target
consumers, and this consumer group accounts for a vast proportion of the whole consumers of health services.
However, this sampling strategy also limits the external validity of the research result and should be regarded as a
limitation of the study.
The MHS was initiated by the target company in collaboration with the Harbin government and was first
released to the market in February 2010. The target consumers of this service were the elderly of one million
families in 500 communities in Harbin. When the study was conducted in June and July 2011, it was still not largely
adopted by these potential consumers.
The characteristics of the MHS provided by this company can be described as follows. First, the consulting and
assistance center provides the elderly with emergency aid through real time positioning techniques and refined daily
information and consulting services. Second, the customized terminal is designed with larger font sizes, bigger
buttons, and higher volume, as well as radio and other multimedia entertainment functions. Third, remote
positioning services, with the help of Location Based Services (LBS) or Global Positioning System (GPS), can
enable relatives of the elderly to achieve real-time positioning when the elderly are in an emergency. Additionally, it
can facilitate the elderly to search for transportation routes by themselves.
The fees for the service were charged by two major components: the payment for the mobile terminal (about
159 USD) and the monthly fee for the services (about 3 USD per month). The fees for the service were relatively
low because this project was supported by the government’s provision of certain financial subsidies to the company.
4.2. Operationalization of Constructs
As most of the measures for the constructs in the research model are available in prior studies, we adapted these
measures as the basis for developing our measures. To fit with our research context, we first stated the possible
problems that might be encountered by users, including (1) getting lost when not being familiar with the traffic, (2)
suddenly requiring emergency aid, and (3) having little knowledge about self-care. Then, in relation to these
problems, we asked the subjects to evaluate perceived vulnerability and perceived severity. These two constructs
were measured with the adjusted items of threat susceptibility and threat severity from Johnston and Warkentin
[2010].
We then introduced the characteristics of the mobile health services provided by the target company, including:
(1) the consulting and assistance center providing real time emergency aid services, (2) the customized terminal
designed in terms of older people’s usage habit, and (3) the remote positioning services based on the Location Based
Services (LBS) and Global Positioning System (GPS). The pricing strategies and payment modes were also
introduced. Next, the subjects were asked to answer the questions on response efficacy, self-efficacy, and response
cost. The measures for response efficacy and self-efficacy were adapted from Johnston and Warkentin [2010]. The
measures for response cost were developed in terms of the research context. To ensure the comprehensiveness of
cost, response cost was measured with a formative construct with three dimensions: one dimension captures
monetary cost, as suggested by Lee and Larsen [2009] (e.g., “Mobile health services are expensive to purchase”),
while the other two dimensions capture learning cost (e.g., “I have to spend effort on learning how to use mobile
health services”) and switching cost (e.g., “Using mobile health services will change my prior life style”).
Further, other questions on TAM and TPB factors and adoption intention were asked. Perceived usefulness and
perceived ease of use were measured with the items adapted from Bhattacherjee et al. [2007]. The measures for TPB
factors, including attitude, subjective norm, and perceived behavioral control, were adapted from Kim [2009]. The
measures for the dependent variable, that is, intention to adopt MHS, were adapted from Johnston and Warkentin
[2010]. A seven-point Likert scale was used for all items (see the Appendix A).
4.3. Data Collection Procedure
The target company helped to approach the potential consumers of the services and to collect the data through
community service centers. As the company was also engaged in other businesses targeting older people, it had good
relationships with many community service centers. In the community service centers, the company routinely
provided training for its customers, about every 3 months. We requested the senior manager of the company to
evenly distribute 250 questionnaires to the managers of its 12 service centers. These service centers were in charge
of 372 communities among the total 500, representing a wide range of the geographical variety in Harbin. During
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 192
the routine training and interaction, the company provided new product promotions when customers visited its
service centers. In the company, each employee in the service centers was in charge of a specific group of customers.
The manager in the service center randomly asked the employees in the center to distribute the survey to his/her
customers. Further, to encourage the participation, we also provided ten eggs as the incentives for participation
because older people always visited the service center when they went to the grocery shop; thus, using eggs as the
incentive was consistent with their needs and could promote participation.
We believe this sampling and survey procedure is appropriate, given the characteristics of the elderly, who
cannot be as easily accessed as ordinary people. The employees in service centers, in contrast, had established good
relationships with their customers during their long time cooperation and could easily explain the survey to their
customers using familiar approaches. All of this ensured the success of the data collection.
Among the 250 distributed questionnaires, 212 were returned with a response rate of 84.8%. The high response
rate was due to the good relationships between the employees in the service centers and the potential consumers.
After removing the incomplete cases and outliers, 204 valid responses were obtained. Among these subjects, female
subjects occupy 46.6%, and over 80% of the subjects are over 40 years of age. The education level for 52.9% of the
subjects is high school or below; approximately 51.5% have fewer than two years of computer experience, and about
70% of subjects have more than two years of mobile device usage experience.
5. Data Analysis and Results
Partial Least Squares (PLS) was used to test the research model because of the several advantages of this
technique. First, as a second-generation structural equation modeling technique, it can estimate the loadings (and
weights) of indicators on constructs (hence, assessing construct validity) and the causal relationships among
constructs in multistage models [Fornell et al. 1982; Gefen et al. 2011; Hair et al. 2011]. Second, in comparison with
covariance-based structural equation modeling, PLS is robust with fewer statistical identification issues; moreover, it
is most suitable for models with formative constructs and relatively small samples [Hair et al. 2011], which is the
case in our study. Additionally, whereas covariance-based structural equation modeling is regarded as being more
appropriate for theory confirmation, PLS does provide a good approximation of covariance-based structural
equation modeling in terms of final estimates [Gefen et al. 2011; Hair et al. 2011]. Based on the above
considerations, PLS was chosen for the current study.
The data analysis was conducted in two stages. In the first stage, the reliability and validity of the constructs
were assessed to ensure the appropriateness of the measurement model; in the second stage, the structural model was
assessed, and hypotheses were tested [Hair et al. 1998].
5.1. Assessment of the Measurement Model
Reflective constructs and formative constructs were assessed using different approaches. For the reflective
constructs, the reliability, convergent validity, and discriminant validity were examined. Composite reliability (CR)
and average variance extracted (AVE) were used to assess the reliability of reflective constructs [Fornell et al. 1981;
Hsu et al. 2008]. With the exception of perceived behavior control, all other constructs were with adequate CR
(ranged from .880 to .901) and AVE (ranged from .695 to .747), considerably above the suggested value of .70
and .50 [Fornell et al. 1981; Hsu et al. 2008]. After a careful check of the construct, perceived behavioral control, it
was found that the loading of the second item was only .415 (t=1.564). After removing this item, the CR and AV E
increased to .891 and .804, respectively, thus satisfying the criteria for reliability (see Table 3).
The convergent validity of reflective constructs was assessed by seeing if the loadings on the expected
constructs were high enough [Anderson et al. 1988; Jiang et al. 2002]. As shown in the Appendix, all item loadings
were higher than 0.70 and significant (p<.001), suggesting good convergent validity of constructs. The discriminant
validity can be assessed by testing whether the square roots of AVEs are greater than the correlations [Fornell et al.
1981]. As shown in Table 3, all correlations were below the square roots of AVEs, indicating that the constructs had
good discriminant validity.
The formative construct response cost in our study can be assessed by checking its item weights and
loadings, which, respectively, represent the relative and absolute importance of these items [Cenfetelli et al. 2009].
As shown in Table 1, the weights for RC1 and RC3 were significant, while RC2 was not. However, the item loading
for RC2 was 0.516 (t=3.790), suggesting that although RC2 was not as important as RC1 and RC2, it was still with
important absolute value [Cenfetelli et al. 2009]. In accordance with Cenfetelli and Bassellier [2009], RC2 was still
included in the analysis in order to keep the completeness of formative constructs.
Because our data were collected from a single source at the same time point, common method variance might
be a concern [Podsakoff et al. 2003]. We used the method suggested by Liang et al. [2007] to examine this issue.
The results showed that the trait factors (e.g., the proposed constructs) explained 72.5% of the variance, while the
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 193
method factors explained only less than 1% of the variance, indicating that common method bias was not a threat to
the present study.
Table 3: Correlations and Discriminant Validity
Mean
Std.
Dev
CR
AVE
AI
ATTD
SN
PBC
PU
PEOU
PV
PS
RC
RE
SE
AI
3.77
0.75
.898
.747
.864
ATTD
3.94
0.68
.901
.695
.482
.834
SN
3.95
0.77
.871
.772
.451
.603
.879
PBC
3.61
0.81
.891
.804
.368
.429
.409
.897
PU
4.10
0.68
.909
.715
.545
.729
.658
.440
.846
PEOU
3.60
0.82
.919
.740
.398
.487
.387
.518
.458
.860
PV
3.74
0.92
.887
.723
.344
.348
.393
.141
.331
.098
.850
PS
4.21
0.70
.888
.725
.227
.460
.334
.174
.419
.230
.573
.851
RC
2.72
0.78
NA
NA
-.314
-.345
-.257
-.371
-.331
-.314
-.164
-.149
NA
RE
3.95
0.71
.880
.710
.478
.391
.287
.236
.348
.179
.432
.311
-.309
.843
SE
3.68
0.75
.890
.730
.424
.454
.339
.503
.342
.593
.156
.150
-.368
.215
.854
Note: AI=Intention to adopt, ATTD=Attitude, SN=Subjective norm, PBC=Perceived behavioral control, PU=Perceived
Usefulness, PEOU=Perceived Ease of Use, PV=Perceived vulnerability, PS=Perceived severity, RE=Response efficacy,
SE=Self-efficacy, RC=Response cost. Diagonal elements denote the square root of AVE. As response cost is taken as a formative
construct, the CR and AVE for this construct is not available.
5.2. Assessment of the Structural Model
The structural model was assessed by checking the significance of path coefficients (β) between different
factors. As illustrated in Figure 4, the results showed that except for the relationship between perceived severity and
adoption intention, all other proposed relationships were significant.
Specifically, the results indicated that response efficacy had a significant positive effect on intention (β=.297,
t=6.097), lending support to H1. Perceived ease of use was found to have a significant effect on intention (β=.150,
t=2.217), and thus H2 was supported. Subjective norm was found to be significantly related to intention (β=.192,
t=2.934), supporting H3. Two factors of facilitating conditions, self-efficacy and response cost, were found to have
significant positive (β=.161, t=3.000) and negative (β=-.111, t=2.243) impacts on intention, respectively. For the two
factors of threat appraisals, perceived vulnerability had a significant effect on intention (β=.120, t=2.104), while
perceived severity did not (β=-.042, t=0.825). These factors fully explained 43.6% of the variance of intention.
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 194
Figure 4: PLS Results
With regards to whether or not the proposed research model can be seen as an improvement over the alternative
models, the PLS results for the three alternative models (e.g., TAM, TPB and PMT) are shown in Table 4. The
results indicate that TAM and TPB, respectively, explain 32.6% and 32.7% of the total variance of intention, while
the PMT explains 38.8% of the total variance of intention. Although PMT has greater R-square than the other two
alternatives, it is still less powerful than the proposed unified model, which explains 4.8% more variance, validating
the value of the theoretical integration.
6. Discussion and Implications
6.1. Key Findings
This study based on theories of technology acceptance and health behavior develops a unified model to explain
the health information technology acceptance behavior. There are three key findings of the study.
First, through the comparisons between the three alternative models and the unified model, this study shows that
the unified model outperforms its competing models by providing higher R-squares. Specifically, TAM and TPB,
which focus on the general technology acceptance issues, are with weaker predictive powers than is PMT, which
stresses health behavior. All of these three models are not as effective as the unified model, indicating that a
comprehensive understanding of health technology acceptance behavior should consider both technology acceptance
behavior as well as health behavior.
Perceived
Vulnerability
Perceived
Severity
Response
Efficacy
Self-Efficacy
Response Cost
Adoption
Intention
Threat
Appraisals
Facilitating
Conditions
Perceived
Ease of Use
Subjective
Norm
Social
Influence
Effort
Expectancy
Performance
Expectancy
.297***
.150*
.192**
-.111*
.161**
.120*
-.042ns
R2=.436
Note: nsp>.1, *p<.05, **p<.01, ***p<.001
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 195
Table 4: PLS Results for the Three Alternative Models
Models
Independent Variables
R2
Beta
TAM
Perceived Usefulness (PU)
.326
.456***
Perceived Ease of Use (PEOU)
.189*
TPB
Attitude (ATTD)
.327
.251**
Subjective Norm (SN)
.188*
Perceived Behavioral Control (PBC)
.247**
PMT
Perceived Vulnerability (PV)
.388
.150*
Perceived Severity (PS)
.013ns
Response Efficacy (RE)
.312***
Response Cost (RC)
-.146*
Self-Efficacy (SE)
.287***
Note: nsp>.1, *p<.05, **p<.01, ***p<.001.
Second, the results show that the factors relevant to coping appraisals are more important than are the factors
associated with threat appraisals in predicting health technology acceptance. Specifically, response efficacy is found
to be the most influential factor, followed by subjective norm, self-efficacy, and perceived ease of use. All of these
factors are relevant to the coping stage. However, the factors relevant to threat appraisals have only relatively weak
(e.g., perceived vulnerability) or no (e.g., perceived severity) effects on behavioral intention. This is consistent with
the meta-analysis results of Floyd et al. [2000], suggesting that coping appraisals should be paid more attention in
the study on health behavior.
Third, this study reveals that subjective norm and perceived ease of use have significant impacts on adoption
intention. This is contrary to the findings in previous studies on professionals’ technology acceptance behavior [e.g.,
Chau et al. 2002; Hu et al. 1999]. This can be explained by the distinctions between professional users and consumer
users. Because professional users generally have adequate competency to learn and use a new technology, they will
tend to rely on their own judgment in their decision making, and the technology complexity will not be a barrier
inhibiting their technology acceptance [Hu et al. 1999]. However, for consumer users, especially the elderly users in
our study who are not so skilled in learning and using a new technology, the ease of use of the technology and others’
opinions becomes important. This indicates that effort expectancy and social influence should be taken into account
when investigating consumer health technology acceptance.
It is worth noting that perceived severity is found to have insignificant impact on adoption intention, suggesting
that the effect size of perceived severity is limited. According to previous literature, coping appraisals can achieve
medium effect size, while threat appraisals can achieve only small effect size [Floyd et al. 2000]. The meta-analysis
also indicates that perceived vulnerability often has stronger impact than does perceived severity [Milne et al. 2000].
In this case, when more influential predictors exist, the impact of perceived severity becomes unobservable. This is
induced by its low relative value rather than its absolute value [Petter et al. 2007]. A good indicator of its absolute
impact on intention is its correlation with intention. As shown in Table 3, the correlation between perceived severity
and intention is 0.227, suggesting that its absolute value is significant at the significant level of p<.01.
6.2. Theoretical Implications
The study can contribute to the health information technology literature in several ways. First, this study
provides a unified model of health technology acceptance by considering both the technology acceptance and health
behavior theories. It amends the previous studies that investigate health technology acceptance behavior solely based
on the general technology acceptance theories without considering the distinctions between health technology and
other technologies [e.g., Hu et al. 1999]. In this paper, the acceptance of health technology is regarded as both a
technology acceptance behavior and a health behavior, providing a more comprehensive understanding on this
specific technology acceptance behavior. It can be regarded as a response to the call that encourages developing a
technology acceptance model adapted to the health care context [Holden et al. 2010]. It also suggests future research
on health technology acceptance to draw upon the theoretical underpinnings from these two research streams.
Second, this study proposes a model to understand the acceptance of consumer health technology rather than
professional health technology, identifying the distinctions between the acceptance behavior of these two types of
users. Most previous studies on health technology acceptance focus on understanding the factors enabling or
inhibiting the physicians or professionals’ health technology adoption [e.g., Bhattacherjee et al. 2007] but pay less
attention on the technology acceptance behavior of consumers [Or et al. 2009]. Regarding the increasing importance
of consumer health technologies, this study provides certain initial exploration of this new type of technology
acceptance behavior. Specifically, the study shows that subjective norm and self-efficacy, which are identified as
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 196
insignificant in previous studies on professional health technology acceptance [e.g., Hu et al. 1999], become
significant in the context of consumer health technology. This suggests that future research should take the
distinctions between professional and consumer health technologies into account when proposing research models.
Third, this study also extends the traditional protection motivation theory (PMT) by pointing out the role of
social influence and effort expectancy. Traditional PMT takes response efficacy, self-efficacy, response cost,
perceived vulnerability, and perceived severity as five key determinants of health behavior [Floyd et al. 2000].
However, several other important factors associated with the technology acceptance process have been neglected.
Specifically, although PMT has recognized the role of effectiveness of technology (e.g., response efficacy), it does
not take into consideration the effort relevant to technology use (i.e., effort expectancy or perceived ease of use).
Further, PMT assumes that users make decisions based on their own evaluations, ignoring the fact that that users’
decision making can also be affected by social influence. Therefore, an improvement of the traditional PMT is to
include social influence and effort expectancy in the model.
6.3. Practical Implications
Several practical implications can be derived from the study. First, response efficacy is found to be the most
important factor in the mobile health service adoption, and thus service providers should try their best to improve
their service quality in order to attract more consumers. Second, since social influence can positively affect user
behavior, service providers should carry out certain promotion strategies to obtain early adopters and then expand
the consumer scale through the social influence (e.g., word of mouth). Third, perceived ease of use and self-efficacy
are two important factors influencing user behavior; for this reason service providers should adopt a user-centric
service design method to ensure not only that the services can be easily learned and used, but also that service
providers provide trainings for the potential consumers. Fourth, regarding the negative effect of response cost on
adoption intention, service providers should set an appropriate service price, one which would be accepted by
potential users. This can be achieved through a marketing survey. Finally, as perceived vulnerability has significant
impact on adoption intention, service providers should identify the target market by analyzing not only the threats
that the services could reduce but also the people who are more likely to experience the threats.
6.4. Limitations
Despite the theoretical and practical implications of the study, our findings should be interpreted in the light of
the limitations. First, elderly users were taken as the sample in the study because elderly users account for a vast
proportion of the whole MHS users. With the increase of people’s health concerns, MHS providers should also begin
to target other populations as potential customers. Thus, the conclusions of the current study should be applied with
caution when the sampling population changes (e.g., the role of self-efficacy may not be as salient for college
students). Second, because the study was conducted in China, which has a collectivistic culture, applying the
conclusions to other cultural societies should be further examined in future research. Finally, while the explanatory
power of the model (43.6% for intention) was acceptable, it could potentially be enhanced through the inclusion of
additional factors in future research.
7. Conclusion
Previous literature on health technology acceptance focuses on professional health technology and relies heavily
on the general technology acceptance theories; however, the consumer health technology acceptance behavior is less
discussed. In this study concerning consumer health technology acceptance behavior as both a technology
acceptance behavior as well as a health behavior, we propose a unified model that integrates the technology
acceptance theories and health behavior theories. Through comparing the technology acceptance model, the theory
of planned behavior, the protection motivation theory, and the unified model, the superiority of the unified model is
confirmed. This study suggests that future research on health technology acceptance should consider the distinctions
between professional and consumer health technology and take both the technology acceptance theories and the
health behavior theories into account.
Acknowledgements
This study was partially supported by the Hong Kong Scholars Program and the National Science Foundation of
China Grant (Project No. 71201118, 71101037, 71201058), the Fundamental Research Funds for the Central
Universities (Project No. 274130), and Wuhan University Academic Development Plan for Scholars after 1970s
(“Research on Network User Behavior”).
REFERENCES
Ajzen, I. "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, No.
2: 179-211, 1991.
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 197
Akter, S., D' Ambra, J., and Ray, P. "Service quality of mHealth platforms: development and validation of a
hierarchical model using PLS," Electronic Markets, Vol. 20, No. 3-4: 1-19, 2010.
Anderson, J.C., and Gerbing, D.W. "Structural Equation Modeling in Practice: A Review and Recommended
Two-Step Approach," Psychological Bulletin, Vol. 103, No. 3: 411-423, 1988.
Bandura, A. "Self-Efficacy: Toward a Unifying Theory of Behavioral Change," Psychological Review, Vol. 84, No.
2: 191-215, 1977.
Becker, M.H. "The Health Belief Model and Personal Health Behavior," Health Education Monographs, Vol. 2, No.
4, 1974.
Benbasat, I., and Barki, H. "Quo Vadis, TAM?," Journal of the AIS, Vol. 8, No. 4: 211-218, 2007.
Bhattacherjee, A., and Hikmet, N. "Physicians' Resistance toward Healthcare Information Technology: A Theoretical
Model and Empirical Test," European Journal of Information Systems, Vol. 16, No. 6: 725-737, 2007.
Çelik, H.E., and Yilmaz, V. "Extending the Technology Acceptance Model for adoption of E-Shopping by
Consumers in Turkey," Journal of Electronic Commerce Research, Vol. 12, No. 2: 152-164, 2011.
Cenfetelli, R.T., and Bassellier, G. "Interpretation of Formative Measurement in Information Systems Research,"
MIS Quarterly, Vol. 33, No. 4: 689-707, 2009.
Chau, P.Y., and Hu, P.J. "Investigating Healthcare Professionals' Decisions to Accept Telemedicine Technology: An
Empirical Test of Competing Theories," Information & Management, Vol. 39, No. 4: 191-229, 2002.
Chau, P.Y., and Hu, P.J.H. "Information Technology Acceptance by Individual Professionals: A Model Comparison
Approach*," Decision Sciences, Vol. 32, No. 4: 699-719, 2001.
Cocosila, M., and Archer, N. "Adoption of Mobile ICT for Health Promotion: An Empirical Investigation,"
Electronic Markets, Vol. 20, No. 3-4: 241-250, 2010.
Davis, F.D. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS
Quarterly, Vol. 13, No. 3: 319-340, 1989.
Deci, E.L., and Ryan, R.M. Intrinsic Motivation and Self-Determination in Human Behavior Springer, New York,
1985.
DeLone, W.H., and McLean, E.R. "The DeLone and McLean Model of Information Systems Success: A Ten-Year
Update," Journal of Management Information Systems, Vol. 19, No. 4: 9-30, 2003.
Dishaw, M.T., and Strong, D.M. "Extending the Technology Acceptance Model with TaskTechnology Fit
Constructs," Information & Management, Vol. 36, No. 1: 9-21, 1999.
Fetscherin, M., and Lattemann, C. "User acceptance of virtual worlds," Journal of Electronic Commerce Research,
Vol. 9, No. 3: 231-242, 2008.
Fishbein, M., and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
Addison-Wesley, Reading, MA, 1975.
Floyd, D., Prentice-Dunn, S., and Rogers, R.W. "A Meta-Analysis of Research on Protection Motivation Theory,"
Journal of Applied Social Psychology, Vol. 30, No. 2: 407-429, 2000.
Fornell, C., and Bookstein, F.L. "Two Structural Equation Models: LISREL and PLS Applied to Consumer
Exit-Voice Theory," Journal of Marketing Research, Vol. 19, No. 4: 440-452, 1982.
Fornell, C., and Larcker, D.F. "Evaluating Structural Equation Models with Unobservable Variables and
Measurement Error," Journal of Marketing Research, Vol. 18, No. 1: 39-50, 1981.
Gefen, D., Rigdon, E.E., and Straub, D. "An Update and Extension to SEM Guidelines for Administrative and Social
Science Research," MIS Quarterly, Vol. 35, No. 2: iii-xiv, 2011.
Goodhue, D.L., and Thompson, R.L. "Task-Technology Fit and Individual Performance," MIS Quarterly, Vol. 19,
No. 2: 213-236, 1995.
Hair, J.F., Anderson, R.E., Tatham, R.L., and Black, W.C. Multivariate Data Analysis, (5th ed.) Prentice-Hall, Upper
Saddle River, NJ, 1998.
Hair, J.F., Ringle, C.M., and Sarstedt, M. "PLS-SEM: Indeed a Silver Bullet," The Journal of Marketing Theory and
Practice, Vol. 19, No. 2: 139-152, 2011.
Hennington, A.H., and Janz, B.D. "Information Systems and healthcare XVI: physician adoption of electronic
medical records: applying the UTAUT model in a healthcare context," Communications of the Association for
Information Systems, Vol. 19, No. 5: 60-80, 2007.
Holden, R.J., and Karsh, B.-T. "The Technology Acceptance Model: Its past and its future in health care," Journal of
Biomedical Informatics, Vol. 43, No. 1: 159-172, 2010.
Hsu, C.L., and Lin, J.C.C. "Acceptance of Blog Usage: The Roles of Technology Acceptance, Social Influence and
Knowledge Sharing Motivation," Information & Management, Vol. 45, No. 1: 65-74, 2008.
Hu, P.J., Chau, P.Y., Sheng, O.R.L., and Tam, K.Y. "Examining the technology acceptance model using physician
acceptance of telemedicine technology," Journal of Management Information Systems, Vol. 16, No. 2: 91-112,
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 198
1999.
Hung, M.C., and Jen, W.Y. "The Adoption of Mobile Health Management Services: An Empirical Study," Journal of
medical systems, Vol. Forthcoming, No.: 1-8, 2010.
Hung, S.-Y., Ku, Y.-C., and Chien, J.-C. "Understanding physicians’ acceptance of the Medline system for practicing
evidence-based medicine: A decomposed TPB model," International Journal of Medical Informatics, Vol. 81,
No. 2: 130-142, 2012.
Istepanian, R.S.H., and Pattichis, C.S. M-Health: Emerging Mobile Health systems Springer, New York, 2006.
Ivatury, G., Moore, J., and Bloch, A. "A Doctor in Your Pocket: Health Hotlines in Developing Countries,"
Innovations: Technology, Governance, Globalization, Vol. 4, No. 1: 119-153, 2009.
Jiang, J.J., Klein, G., and Carr, C.L. "Measuring Information System Service Quality: SERVQUAL from the Other
Side," MIS Quarterly, Vol. 26, No. 2: 145-166, 2002.
Johnston, A.C., and Warkentin, M. "Fear Appeals and Information Security Behaviors: An Empirical Study,"
Management Information Systems Quarterly, Vol. 34, No. 3: 549-566, 2010.
Kim, D., and Chang, H. "Key functional characteristics in designing and operating health information websites for
user satisfaction: an application of the extended technology acceptance model," International Journal of Medical
Informatics, Vol. 76, No. 11-12: 790-800, 2007.
Kim, S.S. "The Integrative Framework of Technology Use: An Extension and Test," MIS Quarterly, Vol. 33, No. 3:
513-537, 2009.
Klein, R. "An empirical examination of patient-physician portal acceptance," European Journal of Information
Systems, Vol. 16, No. 6: 751-760, 2007.
Lau, A., Yen, J., and Chau, P.Y. "Adoption of on-line trading in the Hong Kong financial market," Journal of
Electronic Commerce Research, Vol. 2, No. 2: 58-65, 2001.
Laugesen, J., and Hassanein, K. "Protection Motivation Theory, Task-Technology Fit and the Adoption of Personal
Health Records by Chronic Care Patients: The Role of Educational Interventions," The Seventeenth Americas
Conference on Information Systems, Detroit, Michigan, 2011.
Lee, Y., and Larsen, K.R. "Threat or Coping Appraisal: Determinants of SMB Executives Decision to Adopt
Anti-Malware Software," European Journal of Information Systems, Vol. 18, No. 2: 177-187, 2009.
Liang, H., Saraf, N., Hu, Q., and Xue, Y. "Assimilation of Enterprise Systems: The Effect of Institutional Pressures
and the Mediating Role of Top Management," MIS Quarterly, Vol. 31, No. 1: 59-87, 2007.
Liang, H., Xue, Y., Ke, W., and Wei, K.K. "Understanding the influence of team climate on IT use," Journal of the
Association for Information Systems, Vol. 11, No. 8: 414-432, 2010.
Milne, S., Sheeran, P., and Orbell, S. "Prediction and Intervention in Health-Related Behavior: A Meta-analytic
Review of Protection Motivation Theory," Journal of Applied Social Psychology, Vol. 30, No. 1: 106-143, 2000.
Moores, T.T. "Towards an integrated model of IT acceptance in healthcare," Decision Support Systems, Vol. 53, No.
3: 507-516, 2012.
Morris, M.G., Venkatesh, V., and Ackerman, P.L. "Gender and Age Differences in Employee Decisions About New
Technology: An Extension to the Theory: of Planned Behavior," IEEE Transactions on Engineering
Management, Vol. 52, No. 1: 69-84, 2005.
Nutbeam, D. "Health Promotion Glossary," Health Promotion International, Vol. 13, No. 4: 349-364, 1998.
Or, C.K.L., and Karsh, B.-T. "A Systematic Review of Patient Acceptance of Consumer Health Information
Technology," Journal of American Medical Informatics Association, Vol. 16, No. 5: 550-560, 2009.
Pavlou, P.A., and Fygenson, M. "Understanding and Predicting Electronic Commerce Adoption: An Extension of the
Theory of Planned Behavior," MIS Quarterly, Vol. 30, No. 1: 115-143, 2006.
Petter, S., Straub, D., and Rai, A. "Specifying Formative Constructs in Information Systems Research," MIS
Quarterly, Vol. 31, No. 4: 623-656, 2007.
Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., and Podsakoff, N.P. "Common Method Biases in Behavioral Research:
A Critical Review of the Literature and Recommended Remedies," Journal of Applied Psychology, Vol. 88, No.
5: 879-903, 2003.
Prentice-Dunn, S., and Rogers, R.W. "Protection motivation theory and preventive health: Beyond the health belief
model," Health Education Research, Vol. 1, No. 3: 153-161, 1986.
Rogers, E.M. Diffusion of Innovations, (4th ed.) Free Press, New York, 1995.
Rogers, R.W. "A protection motivation theory of fear appeals and attitude change," Journal of Psychology:
Interdisciplinary and Applied, Vol. 91, No. 1: 93-114, 1975.
Rogers, R.W. (ed.) Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory
of Protection Motivation. Guilford Press, New York, 1983.
Romanow, D., Cho, S., and Straub, D.W. "Riding the Wave: Past Trends and Future Directions for Health IT
Journal of Electronic Commerce Research, VOL 14, NO 2, 2013
Page 199
Research," Management Information Systems Quarterly, Vol. 36, No. 3: iii-x, 2012.
Ronis, D.L. "Conditional health threats: Health beliefs, decisions, and behaviors among adults," Health Psychology,
Vol. 11, No. 2: 127-134, 1992.
Scammon, D.L., Keller, P.A., Albinsson, P.A., Bahl, S., Catlin, J.R., Haws, K.L., Kees, J., King, T., Miller, E.G., and
Mirabito, A.M. "Transforming Consumer Health," Journal of Public Policy & Marketing, Vol. 30, No. 1: 14-22,
2011.
Venkatesh, V., and Davis, F.D. "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal
Field Studies," Management Science, Vol. 46, No. 2: 186-204, 2000.
Venkatesh, V., Morris, M., Davis, G.B., and Davis, F.D. "User Acceptance of Information Technology: Toward a
Unified View," MIS Quarterly, Vol. 27, No. 3: 425-478, 2003.
Venkatesh, V., Speier, C., and Morris, M.G. "User acceptance enablers in individual decision making about
technology: Toward an integrated model," Decision Sciences, Vol. 33, No. 2: 297-316, 2002.
Weinstein, N.D. "Testing four competing theories of health-protective behavior," Health Psychology, Vol. 12, No. 4:
324-333, 1993.
Wixom, B.H., and Todd, P.A. "A Theoretical Integration of User Satisfaction and Technology Acceptance,"
Information Systems Research, Vol. 16, No. 1: 85-102, 2005.
Yang, S.C., and Farn, C.K. "Social Capital, Behavioural Control, and Tacit Knowledge Sharing - A Multi-Informant
Design," International Journal of Information Management, Vol. 29, No. 3: 210-218, 2009.
Yi, M.Y., Jackson, J.D., Park, J.S., and Probst, J.C. "Understanding information technology acceptance by individual
professionals: Toward an integrative view," Information & Management, Vol. 43, No. 3: 350-363, 2006.
Yu, C.-S. "Factors Affecting Individuals to Adopt Mobile Banking: Empirical Evidence from the UTAUT Model,"
Journal of Electronic Commerce Research, Vol. 13, No. 2: 104-121, 2012.
Zhou, T. "Examing Location-Based Services Usage from the Perspectives of Unified Theory of Acceptance and Use
of Technology and Privacy Risk," Journal of Electronic Commerce Research, Vol. 13, No. 2: 135-144, 2012.
Sun et al.: Understanding the Acceptance of Mobile Health Service
Page 200
APPENDIX A. Measures, Loadings and Weights
a This item was removed from the analysis due to the low loading.
Measures
Loading
T-statistics
Intention to Adopt (AI): Adapted from [Johnston et al. 2010]
AI1. I intend to use mobile health services in the next 3 months.
.799
19.262
AI2. I predict I will use mobile health service in the next 3 months.
.895
56.678
AI3. I plan to use mobile health services in the next 3 months.
.895
52.832
Attitude (ATTD): Adapted from [Kim 2009]
ATTD1. Using mobile health services is a bad/good idea.
.788
20.663
ATTD2. Using mobile health services is a foolish/wise idea.
.833
33.502
ATTD3. I dislike/like the idea of using mobile health services.
.877
53.969
ATTD4. Using mobile health services is unpleasant/pleasant.
.834
43.891
Subjective Norm (SN): Adapted from [Kim 2009]
SN1. People who influence my behavior think that I should use mobile health services.
.898
46.095
SN2. People who are important to me think that I should use mobile health services.
.858
27.323
Perceived Behavioral Control (PBC): Adapted from [Kim 2009]
PBC1. I have control over using mobile health services.
.910
67.471
aPBC2. I have the resources necessary to use mobile health services.
NAa
NA
PBC3. I have the knowledge necessary to use mobile health services.
.883
43.243
Perceived Usefulness: Adapted from [Bhattacherjee et al. 2007]
PU1. Using mobile health services will improve my life quality.
.802
32.662
PU2. Using mobile health services will make my life more convenient.
.873
45.544
PU3. Using mobile health services will make me more effective in my life.
.867
33.864
PU4. Overall, I find mobile health services to be useful in my life.
.837
38.258
Perceived Ease of Use: Adapted from [Bhattacherjee et al. 2007]
PEOU1. Learning to operate mobile health services will be easy for me.
.870
39.803
PEOU2. I can easily become skillful at using mobile health services.
.838
27.201
PEOU3. I can get mobile health services to do what I want them to do.
.859
45.811
PEOU4. Overall, mobile health services are easy to use.
.872
46.693
Perceived Vulnerability (PV): Adjusted according to Threat Susceptibility in [Johnston et al. 2010]
Please answer the following questions in terms of these problems: (1) getting lost for not
being familiar with the traffic; (2) suddenly requiring emergency aid; (3) having little
knowledge about self-care.
PV1. I am at risk for suffering the stated problems.
.831
20.851
PV2. It is likely that I will suffer the stated problems.
.864
29.872
PV3. It is possible for me to suffer the stated problems.
.856
24.026
Perceived Severity (PS): Adjusted according to Threat Severity in [Johnston et al. 2010]
Please answer the following questions in terms of these problems: (1) getting lost for not
being familiar with the traffic; (2) suddenly requiring emergency aid; (3) having little
knowledge about self-care.
PS1. If I suffered the stated problems, it would be severe.
.802
23.446
PS2. If I suffered the stated problems, it would be serious.
.874
33.113
PS3. If I suffered the stated problems, it would be significant.
.877
40.041
Response Efficacy (RE): Adapted from [Johnston et al. 2010]
RE1. Mobile health services work for solving these problems.
.785
20.359
RE2. Mobile health services are effective for solving these problems.
.841
26.020
RE3. When using mobile health services, solving these problems is more likely to be
guaranteed.
.898
50.588
Self-Efficacy (SE): Adapted from [Johnston et al. 2010; Lee et al. 2009]
SE1. It is easy for me to use mobile health services.
.874
39.765
SE2. I have the capability to use mobile health services.
.823
26.997
SE3. I am able to use mobile health services without much effort.
.867
35.582
Response Cost (RC): Adapted from [Lee et al. 2009]
Weights
T-statistics
RC1. Mobile health services are expensive to purchase.
.834
7.215
RC2. I have to spend effort on learning how to use mobile health services.
-.007
0.043
RC3. Using mobile health services will change my life style.
.341
2.463
... The most important acceptance factor appears to be perceived usefulness (Binyamin & Zafar, 2021;Gagnon et al., 2016;Heo, 2020), which is closely linked to performance expectancy (Apolinário-Hagen et al., 2018;Breil et al., 2019;Salgado et al., 2020;Sun et al., 2013) Als ease of use (Binyamin & Zafar, 2021;Gagnon et al., 2016;Heo, 2020), connected, among other things, with intuitiveness (Wiest et al., 2024) and effort expectancy (Breil et al., 2019;Sun et al., 2013) are important acceptance factors, with patients weighing up their user against the cost of time (Gagnon et al., 2016). ...
... The most important acceptance factor appears to be perceived usefulness (Binyamin & Zafar, 2021;Gagnon et al., 2016;Heo, 2020), which is closely linked to performance expectancy (Apolinário-Hagen et al., 2018;Breil et al., 2019;Salgado et al., 2020;Sun et al., 2013) Als ease of use (Binyamin & Zafar, 2021;Gagnon et al., 2016;Heo, 2020), connected, among other things, with intuitiveness (Wiest et al., 2024) and effort expectancy (Breil et al., 2019;Sun et al., 2013) are important acceptance factors, with patients weighing up their user against the cost of time (Gagnon et al., 2016). ...
... Besides openness to new experiences (Breil et al., 2019) cognition and physical ability (Wildenbos et al., 2018) also play an important role, especially for older people. Social factors (Wang & Qi, 2021) and social influence (Apolinário-Hagen et al., 2018;Sun et al., 2013) as well as social acceptability More information and current publishing opportunities at wr-publishing.org (Torbjørnsen et al., 2019) play a role. In addition, support from healthcare personnel is mentioned as an important acceptance factor, as described in the context of hearing aids and teleaudiology (Ross et al., 2022). ...
Article
Full-text available
With the digitalization of healthcare, mobile apps are also becoming increasingly relevant. This narrative literature review examines the general expectations and requirements of patients for mobile health apps based on scientific studies from the last 10 years (2014-2024), identifies specific functions and features and summarizes the acceptance factors. The results show that mobile health apps should primarily serve the success of treatment. Specifically desired functions include data entry and automated tracking, reminder and alerting, personalization and customization, education and information as well as data sharing and connectivity. Perceived usefulness and ease of use are among the most important acceptance factors. Personal support from healthcare professionals also plays an important role in some contexts. Various further research directions are discussed. Future research could for example focus on the question of how specific functions affect user satisfaction and user loyalty once they have been implemented.
... Each variable was measured using multiple items adapted from existing literature, employing a combination of 5-point and 7-point Likert scales. -Perceived Vulnerability (PV): Measured using items from Sun et al. (2013), capturing the user's estimation of their vulnerability to an attack. ...
... -Perceived Response Efficacy (PRE): Measured using items from Sun et al. (2013), reflecting the belief that the suggested security solution will effectively prevent or avoid danger. ...
Article
Full-text available
Aim/Purpose: This research investigates factors influencing consumers’ decisions to use artificial intelligence cybersecurity technology in the United Arab Emirates. Background: The cyber-security risks are getting more complex as technology develops, putting the United Arab Emirates (UAE) businesses and government agencies at risk of severe losses from cybercrime. Methodology: A correlational study design and a quantitative research approach were employed, and 340 professionals working for different government and semi-government organizations in the United Arab Emirates were given questionnaires. The PLS-SEM approach was used to analyze the replies. Contribution: The present research framework remedies the inherent limitations in the PMT model by adding factors used to explain the influence of environmental factors and individual difference factors on behavior. This research framework is an extended application of the PMT model in the context of AI-based cybersecurity systems. Meanwhile, this study confirms the importance of perceived vulnerability in AI technology scenarios. Findings: The findings demonstrated that users’ adoption intentions were significantly and favorably impacted by social influence, facilitating conditions, perceived vulnerability, and perceived response efficacy. Meanwhile, job insecurity enhanced employees’ resistance to change, making resistance to change a major resistance to the intention to adopt AI-based cybersecurity systems. Recommendations for Practitioners: The report offers crucial insights that organizations can utilize to evaluate their readiness for adopting AI-based cybersecurity technologies and create plans to lessen employee resistance to advancements in the cybersecurity industry. Recommendation for Researchers: Researchers on this specific application can make use of the extension of the framework. Impact on Society: The research can be utilized to evaluate their readiness to adopt AI-based cybersecurity technologies. Future Research: Future research should broaden the scope to acquire a more thorough understanding of the behavioral intentions to use AI-cybersecurity systems in the United Arab Emirates. Other elements that could be considered include facilitating settings, Artificial Intelligence knowledge, social impact, effort efficacy, and other frameworks.
... Previous studies have explored the relationship between health variables and technology acceptance (Sun et al. 2013). In this context, health condition refers to older adults' positive perceptions of their personal health. ...
... Effort expectancy was also measured with four items from Venkatesh, Thong, and Xu (2012). Social influence was assessed using a three-item scale from Sun et al. (2013) and Venkatesh, Thong, and Xu (2012). Facilitating conditions was measured with three item drawn from UTAUT model (Venkatesh, Thong, and Xu 2012). ...
... Several studies have integrated HBM into studying technology acceptance. In the course of analyzing the acceptance of mobile health services, Sun et al. (2013) examined the influence of perceived vulnerability and perceived severity on technology adoption intention. In HBM model, the term of perceived vulnerability is identical to perceived susceptibility (Sreelakshmi & Prathap, 2020). ...
... In HBM model, the term of perceived vulnerability is identical to perceived susceptibility (Sreelakshmi & Prathap, 2020). Sun et al. (2013) showed that perceived vulnerability is found to have a positive effect on the adoption intention of using mobile health services, while they found the absence of perceived severity's impact on such an adoption. In the context of COVID-19 pandemic, Nguyen (2021) related the perceived health threat through perceived severity and perceived susceptibility to the epidemic to the adoption of using technologybased devices as a solution to avoid the infection. ...
Article
Full-text available
Growing internet technology has incurred variations in customer way of life and online shopping habits. Originating from the integrated framework of technology acceptance model and health belief model, the purpose of this study is to investigate the influence of determinants, such as perceived usefulness, perceived ease of use, trust, social influence, perceived susceptibility, and perceived severity on customers' intentions of using online food delivery (OFD) services. By employing a total of 459 usable responses in Vietnam, the research hypotheses were empirically validated using structural equation modeling (SEM) approach. The results of this study exhibited that the constructs all have positive influences on the usage behavior of OFD services, while perceived ease of use is found to influence users' perceived usefulness. This study complements key insights into the literature on the acceptance of technology during the pandemic in general, the online food delivery technology in particular.
... Previous research highlights the importance of social influence, derived from different actors in the social network, in technology employment [17][18][19][20]. It is also specifically associated with the adoption of healthcare technology [21,22]. Hogue and Sorwar argue that this is applicable for aging persons in particular [23]. ...
... Numerous studies (Venkatesh & Morris 2000;Wamba et al. 2017) have supported the effect of PU on ATUTT, particularly in the context of people's openness to adopting new technologies like smartphones and the IoT (Kabbiri et al. 2017). The idea of usefulness is somewhat vague when it comes to health-related themes like e-health (Venugopala, Jinkab & Priyac 2016), telehealth (Gajarawala & Pelkowski 2021;Tsai et al. 2019) or telemedicine solutions (Sun et al. 2013). The following are the corresponding hypothesises: H1: Perceived usefulness has a direct positive influence on the attitude towards the use of telemedicine technology. ...
Article
Full-text available
Background: One of the challenges facing the usage of telemedicine technology in South Africa, particularly in the North West province (NWP), is lack of user acceptance by health care professionals which prevents piloted project to produce the desired outcomes.Objectives: The purpose of this study was to investigate the influential factors for the adoption of telemedicine by health care professionals from three selected hospitals (Bophelong, Taung and Klerksdorp) in the NWP.Method: The study adopted a case study approach and gathered data through questionnaires, which were distributed to the health care professionals of the three selected hospitals. In order to ensure that the instrument was accurate, a pilot study was carried out prior to the main investigation. Both the alpha and power values were set at 0.05 for the statistical analysis. The statistical tool used for the data analysis was SPSS v. 23.0.Results: Attitude towards the use of telemedicine technology (ATUTT), perceived usefulness (PU) and acceptance of telemedicine technology (ATT) were considered to be the influential factors in the adoption of telemedicine technology. The association between perceived ease of use (PEOU) and perceived usefulness (PU) (0.150, p = 0.034), PEOU and Attitude towards the use of telemedicine technology (ATUTT) (0.211, p = 0.002), PEOU and Acceptance of telemedicine technology (ATT) (0.245, p = 0.000), PU and (ATT) (0.212, p = 0.002), ATUTT and (ATT) (0.189, p = 0.005). However, PEOU was found to have an insignificant relationship with (0.048, p = 0.093). Hypotheses 1, 3, 4, 5, and 6 are supported while H2 was not supported.Conclusion: The study aims to fill the knowledge vacuum identified, helping poor countries effectively implement telemedicine technology to modernise the health care sector. In addition, results from this study shed insight on the varied impacts of individual, technical, clinical and multidimensional social influence variables on health care providers’ decisions to use telemedicine.Contribution: This study contributes to the body of knowledge by investigating the success factors for telemedicine technology adoption in South African public hospitals. These results have important implications for the public health care system in South Africa, both for the direction of future research and for the methods used to promote the use of telemedicine.
... And as for the functions of Social CRM(Cheng & Shiu, 2018) wereused "Customer Engagement Via Social Media" (ECVMS), "Company Capacity" (CE), "Customer Information Processing Capacity" (CPIC) and "Use of Social CRM" (US). The relationship of the hypotheses (Figure 4) and proposed model (Figure 5), creating a new model appropriate to the objective of this research.MODEL OF ACCEPTANCE AND USE OF SOCIAL CUSTOMER RELATIONSHIP MANAGEMENT IN MICROJayachandran et al., 2005;Knuz et al., 2017;Sigala, 2015;Trainor, 2012; Trainor et al., 2016;Agnihotri et al., 2012;Bowen and McCain, 2015;Costello, 2011;Liberona et al., 2013;Lobato et al., 2016;Malthouse et al., 2013;Reinhold and Alt, 2012;Sigala, 2011 H3There is a positive and statistically significant relationship between Social Influence and the Use of Social CRM.Social Influence SCRM UseHernandez et al., 2011;Ifinedo, 2016;Ramdani et al., 2009;Rozmi et al., 2019;Sun et al., 2013 H4There is a positive and statistically significant relationship between the Facilitating Conditions and the Use of Social CRM.Facilitating conditions SCRM Use Al Mursalin, 2012;Derham et al., 2011;Hung and Lai, 2015;Rahi et al., 2019;Wallach et al., 2014 H5There is a positive and statistically significant relationship between Behavioral Intention and The Use of Social CRM.Behavioral Intention SCRM UsePutra and Ariyanti, 2013; Zhou et al., 2008. Bharti et al., 2014Hidayanti et al., 2018;Kristensson et al., 2008;Sigala, 2015; Vargo and Lush2020;Agnihotri et al., 2016;Al-Maskari, and Sanderson, 2010;Malthouse et al., 2013;Menguc et al., 2014;Saldanha et al., 2017;Sharma, 2015;Van de Vrande et al., 2009; Wincent et al., Sargeant, 2005;Chaouali et al., 2016;Chen et al., 2019;Cui and Wu, 2016;Pederson and Ling, 2002;Riquelme and Rios, 2010;Saldanha et al., 2017 International Journal of Innovation -IJI, São Paulo, 13(1), p. 1-43, e27096, Jan./Apr. ...
Article
Full-text available
Objective of the study:The article aims to propose and test a Social Customer Relationship Management Acceptance and Usage Model that considers antecedent factors in micro and small enterprises. Methodology/approach:A survey analyzed through structural equation modeling was conducted with managers of micro and small Brazilian companies. Originality/Relevance:The use of social networks as a source of the process of monitoring, analysis and content generation for business strategy is recent and very relevant for the sustainability of micro and small businesses. Main results:Although some hypotheses were not validated, the study fills important gaps in empirical research on micro and small businesses. Replicating this study in different cultural contexts could offer further insights. Theoretical/methodological contributions:The positive results indicate that, despite some hypotheses being rejected, the study confirms the relevance of "Customer Information Processing Capacity" and its influence on the "Use of Social CRM," highlighting the importance of social interactions and engagement capacity for value co-creation in micro and small businesses. Socia /management contributions: Managers can leverage the relationship between the “Ability to Engage the Customer Via Social Media” and “Social Influence” to enhance their social media strategies and improve customer engagement.
... • Facilitating conditions are considered key for the acceptance of mobile health services (Sun et al., 2013). We postulate that: ...
Article
Full-text available
The rapid growth of technology has penetrated the realm of education, reshaping old teaching philosophies and improving educational approaches. Notably, the influence of Artificial Intelligence (AI) on English learning has become momentous. However, a critical issue is the lack of autonomy in AI-enabled English learning applications, leading to lower engagement of students. The study investigates students’ adoption intention and usage behavior to embrace AI-enabled English learning applications in China. Leveraging the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model, extended with Perceived Enjoyment and Personal Innovativeness, this study provides a nuanced understanding of student adoption through delving into the applications’ attractiveness and users’ inherent tendencies toward technology adoption. Data from 1167 undergraduate students at Shandong University were collected using an online survey with simple random sampling and analyzed through the partial least square-structure equation modeling (PLS-SEM) technique. The results highlight the positive influence of performance expectancy (β = 0.294), perceived enjoyment (β = 0.186), personal innovativeness (β = 0.341), and price value (β = 0.159) on adopting AI-enabled English learning applications, accentuating that students with a greater propensity for exploring new technologies are more likely to adopt these applications. However, mediating effect analysis indicates that only performance expectancy (β = 0.075), personal innovativeness (β = 0.087), and perceived enjoyment (β = 0.048) significantly influence usage behavior through adoption intention, suggesting the primacy of innovative features and engaging content in the applications. This study provides a theoretical expansion of UTAUT2, leading to a refined and education focused version of UTAUT2. Future research is suggested to involve gender and frequency of app usage into the study, and conduct longitudinal studies to scrutinize the long-term impact and sustainability of AI-enabled learning applications.
Article
Full-text available
Bu çalışma, mobil sağlık uygulamalarının kullanım niyetini etkileyen faktörleri belirlemeyi ve kullanıcıların sağlık bilincinin mobil sağlık uygulaması kullanım niyetini ne yönde etkilediğini ortaya koymayı amaçlamaktadır. Çalışma, 18 yaş ve üzeri, fiziksel aktivite (Adımsayar, Evde Egzersiz, Düzenli Uyku vb), sağlıklı beslenme (Kalori Sayacı, Su Tüketimi Takibi vb) gibi uygulamaları kullanan bireylerle yürütülmüştür. Araştırmada veri toplama aracı olarak anket formu kullanılmıştır. Verilerin analizinde SPSS ve “Process Macro” paket programı kullanılmıştır. Derlenen veriler tanımlayıcı istatistikler, geçerlik ve güvenirlik analizi, basit doğrusal regresyon analizi ve “bootstrap model 4” analizi ile değerlendirilmiştir. Araştırma sonucunda algılanan fayda, algılanan kullanım kolaylığı, subjektif norm ve davranış değiştirme tekniklerinin sağlık bilinci ile memnuniyet arasındaki ilişkide aracı etkiye sahip olduğu ve algılanan fayda, algılanan kullanım kolaylığı, subjektif norm ve davranış değiştirme teknikleri ile mobil sağlık uygulamalarını kullanım niyeti arasındaki ilişkide memnuniyet düzeyinin aracı etkiye sahip olduğu sonucuna ulaşılmıştır. Ayrıca sağlık bilincinin kullanım niyetini pozitif yönde etkilediği tespit edilmiştir. Çalışma sonucunda, mobil sağlık uygulamalarının sağlık hizmeti sunumunda önem arz eden bir potansiyeli olduğu vurgulanmış, hastane yöneticilerine, politika yapıcılara, kamu ve özel sektör temsilcilerine, iç ve dış paydaşlara mobil sağlık uygulamalarının gelecekteki yerine yönelik stratejik hamleler geliştirerek adımlar atılması önerilmiştir.
Article
Full-text available
Presents an integrative theoretical framework to explain and to predict psychological changes achieved by different modes of treatment. This theory states that psychological procedures, whatever their form, alter the level and strength of self-efficacy. It is hypothesized that expectations of personal efficacy determine whether coping behavior will be initiated, how much effort will be expended, and how long it will be sustained in the face of obstacles and aversive experiences. Persistence in activities that are subjectively threatening but in fact relatively safe produces, through experiences of mastery, further enhancement of self-efficacy and corresponding reductions in defensive behavior. In the proposed model, expectations of personal efficacy are derived from 4 principal sources of information: performance accomplishments, vicarious experience, verbal persuasion, and physiological states. Factors influencing the cognitive processing of efficacy information arise from enactive, vicarious, exhortative, and emotive sources. The differential power of diverse therapeutic procedures is analyzed in terms of the postulated cognitive mechanism of operation. Findings are reported from microanalyses of enactive, vicarious, and emotive modes of treatment that support the hypothesized relationship between perceived self-efficacy and behavioral changes. (21/2 p ref)
Article
Full-text available
The 2010 Patient Protection and Affordable Care Act is intended to transform the U.S. health care system. Its success will require the transformation of consumers' views about health and their willingness to participate in healthful behaviors. Focusing on three barriers to consumers' engagement in healthful behaviors, the authors review the research literature and suggest opportunities for further research. Using a social marketing perspective, they suggest actions for health care providers, marketers, and policy makers to help overcome these barriers.
Article
Full-text available
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.
Book
I: Background.- 1. An Introduction.- 2. Conceptualizations of Intrinsic Motivation and Self-Determination.- II: Self-Determination Theory.- 3. Cognitive Evaluation Theory: Perceived Causality and Perceived Competence.- 4. Cognitive Evaluation Theory: Interpersonal Communication and Intrapersonal Regulation.- 5. Toward an Organismic Integration Theory: Motivation and Development.- 6. Causality Orientations Theory: Personality Influences on Motivation.- III: Alternative Approaches.- 7. Operant and Attributional Theories.- 8. Information-Processing Theories.- IV: Applications and Implications.- 9. Education.- 10. Psychotherapy.- 11. Work.- 12. Sports.- References.- Author Index.
Article
The statistical tests used in the analysis of structural equation models with unobservable variables and measurement error are examined. A drawback of the commonly applied chi square test, in addition to the known problems related to sample size and power, is that it may indicate an increasing correspondence between the hypothesized model and the observed data as both the measurement properties and the relationship between constructs decline. Further, and contrary to common assertion, the risk of making a Type II error can be substantial even when the sample size is large. Moreover, the present testing methods are unable to assess a model's explanatory power. To overcome these problems, the authors develop and apply a testing system based on measures of shared variance within the structural model, measurement model, and overall model.
Article
Fast advances in the wireless technology and the intensive penetration of cell phones have motivated banks to spend large budget on building mobile banking systems, but the adoption rate of mobile banking is still underused than expected. Therefore, research to enrich current knowledge about what affects individuals to use mobile banking is required. Consequently, this study employs the Unified Theory of Acceptance and Use of Technology (UTAUT) to investigate what impacts people to adopt mobile banking. Through sampling 441 respondents, this study empirically concluded that individual intention to adopt mobile banking was significantly influenced by social influence, perceived financial cost, performance expectancy, and perceived credibility, in their order of influencing strength. The behavior was considerably affected by individual intention and facilitating conditions. As for moderating effects of gender and age, this study discovered that gender significantly moderated the effects of performance expectancy and perceived financial cost on behavioral intention, and the age considerably moderated the effects of facilitating conditions and perceived self-efficacy on actual adoption behavior.