3,837
Views
74
CrossRef citations to date
0
Altmetric
Children and the Elderly

The use and acceptance of new media entertainment technology by elderly users: development of an expanded technology acceptance model

, &
Pages 1052-1063 | Received 05 Dec 2014, Accepted 14 Jul 2015, Published online: 07 Sep 2015

References

  • Allaire, J. C., A. C. McLaughlin, A. Trujillo, L. A. Whitlock, L. LaPorte, and M. Gandy. 2013. “Successful Aging Through Digital Games: Socioemotional Differences Between Older Adult Gamers and Non-gamers.” Computers in Human Behavior 29 (4): 1302–1306. doi:10.1016/j.chb.2013.01.014.
  • Arning, K., and M. Ziefle. 2007. “Understanding Age Differences in PDA Acceptance and Performance.” Computers in Human Behavior 23 (6): 2904–2927. 10.1016/j.chb.2006.06.005. doi: 10.1016/j.chb.2006.06.005
  • Bell, C., C. Fausset, S. Farmer, J. Nguyen, L. Harley, and W. B. Fain. 2013. “ Examining Social Media Use among Older Adults.” In Proceedings of the 24th ACM Conference on Hypertext and Social Media, 158–163. New York: ACM. doi:10.1145/2481492.2481509.
  • Brosnan, M. J. 1998. “The Impact of Computer Anxiety and Self-efficacy upon Performance.” Journal of Computer Assisted Learning 14 (3): 223–234. 10.1046/j.1365-2729.1998.143059.x. doi: 10.1046/j.1365-2729.1998.143059.x
  • Brown, S. A., and V. Venkatesh. 2005. “Model of Adoption of Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle.” MIS Quarterly 29 (3): 399–426. doi:10.2307/25148690.
  • Chou, W. H., Y.-T. Lai, and K.-H. Liu. 2013. “User Requirements of Social Media for the Elderly: A Case Study in Taiwan.” Behaviour & Information Technology 32 (9): 920–937. doi:10.1080/0144929X.2012.681068.
  • Conci, M., F. Pianesi, and M. Zancanaro. 2009. “ Useful, Social and Enjoyable: Mobile Phone Adoption by Older People.” In Human-Computer Interaction – INTERACT 2009. Lecture Notes in Computer Science 5726: 63–76. doi:10.1007/978-3-642-03655-2_7.
  • Czaja, S. J., and C. C. Lee. 2007. “The Impact of Aging on Access to Technology.” Universal Access in the Information Society 5: 341–349. doi:10.1007/s10209-006-0060-x.
  • Davis, F. D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.” MIS Quarterly 13 (3): 319–339. doi:10.2307/249008.
  • Davis, F., R. P. Bagozzi, and P. R. Warshaw. 1992. “Extrinsic and Intrinsic Motivation to Use Computers in the Workplace.” Journal of Applied Social Psychology 22 (14): 1111–1132. doi:10.1111/j.1559-1816.1992.tb00945.x.
  • De Schutter, B. 2011. “Never Too Old to Play: The Appeal of Digital Games to an Older Audience.” Games and Culture 6 (2): 155–170. doi:10.1177/1555412010364978.
  • Dogruel, L. 2008. Computerspiele und 50+: Akzeptanz und Potentiale von Computerspielen bei Personen ab 50 Jahren [Computer Games and 50+. Acceptance and Potentials for Computer Games among People over 50 Years]. Munich: Reinhard Fischer.
  • FFA. 2014. Der Kinobesucher 2013. Strukturen und Entwicklungen auf Basis des GfK Panels [Movie Goers 2013. Structures and Development on Basis of GfK Panels]. Berlin: FFA – Filmförderungsanstalt. http://www.ffa.de/downloads/publikationen/kinobesucher_3d_2013.pdf12.
  • González, A., M. Ramirez, and V. Viadel. 2012. “Attitudes of the Elderly Toward Information and Communications Technologies.” Educational Gerontology 38 (9): 585–594. doi:10.1080/03601277.2011.595314.
  • Hager, P., and S. Paloniemi. 2006. “Experience, Competence and Workplace Learning.” Journal of Workplace Learning 18 (7/8): 439–450. doi:10.1108/13665620610693006.
  • Hwangbo, H., S. H. Yoon, B. S. Jin, Y. S. Han, and Y. G. Ji. 2013. “A Study of Pointing Performance of Elderly Users on Smartphones.” International Journal of Human-Computer Interaction 29 (9): 604–618. doi:10.1080/10447318.2012.729996.
  • Igbaria, M., and J. Iivari. 1995. “The Effects of Self-efficacy on Computer Usage.” Omega International Journal of Management Science 23 (6): 587–605. 10.1016/0305-0483(95)00035-6. doi: 10.1016/0305-0483(95)00035-6
  • Jochems, N., S. Vetter, and C. Schlick. 2013. “A Comparative Study of Information Input Devices for Aging Computer Users.” Behaviour & Information Technology 32 (9): 902–919. doi:10.1080/0144929X.2012.692100.
  • Klimmt, C. 2005. Computerspielen als Handlung. Dimensionen und Determinanten des Erlebens interaktiver Unterhaltungsangebote [Computer Games as Action. Dimension and Determinantes of Experiencing Interactive Entertainment]. Köln: Halem.
  • Klimmt, C., and T. Hartmann. 2006. “Effectance, Self-efficacy and the Motivation to Play Video Games.” In Playing Video Games, edited by P. Vorderer and J. Bryant, 115–132. Mahwah, NJ: Lawrence Erlbaum.
  • LaRose, R., and M. S. Eastin. 2004. “A Social Cognitive Theory of Internet Uses and Gratifications: Toward a New Model of Media Attendance.” Journal of Broadcasting and Electronic Media 48 (3): 358–377. doi: 10.1207/s15506878jobem4803_2
  • Lee, Y., K. A. Kozar, and K. R. T. Larsen. 2003. “The Technology Acceptance Model: Past, Present, and Future.” Communications of the Association for Information Systems 12 (50): 752–780.
  • Lin, C. A. 2003. “An Interactive Communication Technology Adoption Model.” Communication Theory 13 (4): 345–365. doi:10.1111/j.1468-2885.2003.tb00296.x.
  • Mead, S. E., R. A. Sit, W. A. Rogers, B. A. Jamieson, and G. K. Rousseau. 2000. “Influences of General Computer Experience and Age on Library Database Search Performance.” Behaviour and Information Technology 19 (2): 107–123. doi:10.1080/014492900118713.
  • Melenhorst, A.-S., W. A. Rogers, and D. G. Bouwhuis. 2006. “Older Adults’ Motivated Choice for Technological Innovation: Evidence for Benefit-Driven Selectivity.” Psychology and Aging 21 (1): 190–195. 10.1037/0882-7974.21.1.190. doi: 10.1037/0882-7974.21.1.190
  • Mitchell, R. 2013. ‘Hobbit’ Vets High on HFR But Others Are Wary. Variety. March 28. http://variety.com/2013/digital/news/hobbit-vets-high-on-hfr-but-others-are-wary-1200330693/.
  • Moon, J.-W., and Y.-G. Kim. 2001. “Extending the TAM for a World-Wide-Web Context.” Information & Management 38: 217–230. doi:10.1016/S0378-7206(00)00061-6.
  • Neverwinter Nights. 1999–2006. Bioware. http://www.bioware.com/en/http://www.bioware.com/en/.
  • Neves, B. B., F. Amaro, and J. Fonseca. 2013. “Coming of (Old) Age in the Digital Age: ICT Usage and Non-usage among Older Adults.” Sociological Research Online 18 (2). doi:10.5153/sro.2998.
  • Pan, S., and M. Jordan-Marsh. 2010. “Internet Use Intention and Adoption among Chinese Older Adults: From the Expanded Technology Acceptance Model Perspective.” Computers in Human Behavior 26: 1111–1119. doi:10.1016/j.chb.2010.03.015.
  • Patsoule, E., and P. Koutsabasis. 2013. “Redesigning Websites for Older Adults: A Case Study.” Behaviour & Information Technology 33 (6): 561–573. 10.1080/0144929X.2013.810777. doi: 10.1080/0144929X.2013.810777
  • Presley, A., and T. Presley. 2009. “Factors Influencing Student Acceptance and Use of Academic Portals.” Journal of Computing in Higher Education 21 (3): 167–182. doi:10.1007/s12528-009-9022-7.
  • Quandt, T., H. Grueninger, and J. Wimmer. 2008. “The Gray Haired Gaming Generation: Findings from an Explorative Interview Study on Older Computer Gamers.” Games and Culture 4 (1): 27–46. doi:10.1177/1555412008325480.
  • Rosen, L. D., and P. Maguire. 1990. “Myths and Realities of Computerphobia: A Meta-analysis.” Anxiety, Stress & Coping 3 (3): 175–191. 10.1080/08917779008248751.
  • Rosen, L. D., and M. M. Weil. 1994. “What We Have Learned from a Decade of Research (1983–1993) on ‘The Psychological Impact of Technology’.” ACM SIGCAS Computers and Society 24: 3–9. doi:10.1145/181878.181879.
  • Schwarzer, R., and M. Jerusalem. 1995. “Generalized Self-efficacy Scale.” In Measures in Health Psychology: A User's Portfolio, edited by M. Johnston, S. C. Wright, and J. Weinman, 35–37. Windsor: NFER-Nelson.
  • Shih, C.-F., and A. Venkatesh. 2004. “Beyond Adoption: Development and Application of a Use Diffusion Model.” Journal of Marketing 68: 59–72. doi: 10.1509/jmkg.68.1.59.24029
  • Sinkovics, R. R., B. Stöttinger, B. B. Schlegelmilch, and S. Ram. 2002. “Reluctance to Use Technology-related Products: Development of a Technophobia Scale.” Thunderbird International Business Review 44 (4): 477–494. doi:10.1002/tie.10033.
  • Venkatesh, V. 2000. “Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model.” Information Systems Research 11: 342–365. doi:10.1287/isre.11.4.342.11872.
  • Venkatesh, V., and M. G. Morris. 2000. “Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior.” MIS Quarterly 24 (1): 115–139. 10.2307/3250981. doi: 10.2307/3250981
  • Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis. 2003. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly 27 (3): 425–478.
  • Wagner, N., K. Hassanein, and M. Head. 2010. “Computer Use by Older Adults: A Multi-disciplinary Review.” Computers in Human Behavior 26 (5): 870–882. 10.1016/j.chb.2010.03.029. doi: 10.1016/j.chb.2010.03.029
  • Xie, B. 2003. “Older Adults, Computers, and the Internet: Future Directions.” Gerontechnology 2 (4): 289–305. doi:10.4017/gt.2003.02.04.002.00.
  • Zhang, Y. 2005. “Age, Gender and Internet Attitudes among Employees in the Business World.” Computers in Human Behavior 21 (1): 1–10. doi: 10.1016/j.chb.2004.02.006
  • Zone, R. 2007. Stereoscopic Cinema & the Origins of 3-D Film. Lexington, KY: The University Press of Kentucky.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.