695
Views
10
CrossRef citations to date
0
Altmetric
Articles

Toward a Theory of HealthIT Adoption Across the Lifespan: Findings from Five Years in the Community

ORCID Icon, , &

References

  • Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28, 557–582. doi:10.1111/j.1540-5915.1997.tb01322.x
  • Ahmad, M. I. (2014, December). Unified theory of acceptance and use of technology (UTAUT): A decade of validation and development. Paper presented at the Fourth International Conference on ICT in our lives 2014, Alexandria, Egypt. Retrieved from https://www.researchgate.net/publication/270282896_Unified_Theory_of_Acceptance_and_Use_of_Technology_UTAUT_A_Decade_of_Validation_and_Development
  • Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In J. Kuhl & J. Beckmann (Eds.), Action control: From cognition to behavior (pp. 11–39). New York, NY: Springer.
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211. doi:10.1016/0749-5978(91)90020-T
  • Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
  • Al-Azawei, A. (2018). Predicting the adoption of social media: An integrated model and empirical study on Facebook usage. Interdisciplinary Journal of Information, Knowledge & Management, 13, 233–238. doi:10.28945/4106
  • Anderson, G. O. (2018). Getting connected: Older Americans embrace technology to enhance their lives. American Association of Retired Persons. Retrieved from https://www.aarp.org/research/topics/technology/info-2018/technology-use-attitudes.html
  • Anderson, M., & Perrin, A. (2017). Tech adoption climbs among older adults. Pew Research Center. Retrieved from http://www.pewinternet.org/2017/05/17/tech-adoption-climbs-among-older-adults/
  • Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8, 244–254. doi:10.17705/1jais.00122
  • Begley, C. M. (1996). Triangulation of communication skills in qualitative research instruments. Journal of Advanced Nursing, 24, 688–693. doi:10.1046/j.1365-2648.1996.02446.x
  • Bouayad, L., Ialynytchev, A., & Padmanabhan, B. (2017). Patient health record systems scope and functionalities: Literature review and future directions. Journal of Medical Internet Research, 19, e388. doi:10.2196/jmir.8073
  • Cello Health Insight. (2015). The digital health debate: A report on how doctors engage with digital technology in the workplace. Retrieved from https://cellohealthinsight.com/wp-content/uploads/2015/11/Digital_Health_Debate_2015.pdf
  • Chan, M. (2015). Multimodal connectedness and quality of life: Examining the influences of technology adaptation and interpersonal communication on well-being across the life span. Journal of Computer-Mediated Communication, 20, 3–18. doi:10.1111/jcc4.12089
  • Chesley, N., & Johnson, B. (2014). Information and communication technology use and social connectedness over the life course. Sociology Compass, 8, 589–602. doi:10.1111/soc4.12170
  • Child, J. T., Duck, A. R., Andrews, L. A., Butauski, M., & Petronio, S. (2015). Young adults’ management of privacy on Facebook with multiple generations of family members. Journal of Family Communication, 15, 349–367. doi:10.1080/15267431.2015.1076425
  • Chung, S. Y., & Nahm, E. S. (2015). Testing reliability and validity of the eHealth Literacy Scale (eHEALS) for older adults recruited online. CIN: Computers, Informatics, Nursing, 33, 150–156. doi:10.1097/CIN.0000000000000146
  • Churchill, D., & Wang, T. (2014). Teacher’s use of iPads in higher education. Educational Media International, 51, 214–225. doi:10.1080/09523987.2014.968444
  • Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly: Management Information Systems, 23, 145–158. doi:10.2307/249749
  • Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly: Management Information Systems, 19, 189–211. doi:10.2307/249688
  • David-Barrett, T., Kertesz, J., Rotkirch, A., Ghosh, A., Bhattacharya, K., Monsivais, D., & Kaski, K. (2016). Communication with family and friends across the life course. PLoS One, 11, e0165687. doi:10.1371/journal.pone.0165687
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly: Management Information Systems, 13, 319–339. doi:10.2307/249008
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22, 1111–1132. doi:10.1111/j.1559-1816.1992.tb00945.x
  • Deng, Z., Mo, X., & Liu, S. (2014). Comparison of the middle-aged and older users’ adoption of mobile health services in China. International Journal of Medical Informatics, 83, 210–224. doi:10.1016/j.ijmedinf.2013.12.002
  • Dimock, M. (2018). Where millennials end and post-millennials begin. Pew Research Center. Retrieved from http://www.pewresearch.org/fact-tank/2018/03/01/defining-generations-where-millennials-end-and-post-millennials-begin/
  • Dwivedi, Y. K., Rana, N. P., Chen, H., & Williams, M. D. (2011). A meta-analysis of the unified theory of acceptance and use of technology (UTAUT). FIP Advances in Information and Communication Technology, 366, 155–170. Retrieved from https://hal.inria.fr/hal-01571726/document
  • Fishbein, M., Triandis, H., Kanfer, F., Becker, M., Middlestadt, S., & Eichler, A. (2001). Factors influencing behaviour and behaviour change. In A. Baum, T. Revenson, & J. Singer (Eds.), Handbook of health psychology (pp. 3–17). Imahwah, NJ: Erlbaum Associates.
  • Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
  • Fisher, C., & Roccotagliata, T. (2017). Interpersonal communication across the life span. In Oxford research encyclopedia of communication. Oxford University Press. Retrieved from http://communication.oxfordre.com/view/10.1093/acrefore/9780190228613.001.0001/acrefore-9780190228613-e-201
  • Fisher, E., Lazar, L., Shalitin, S., Yackobovitch-Gavan, M., de Vries, L., Oron, T., … Lebenthal, Y. (2018). Association between glycemic control and clinic attendance in emerging adults with type 1 diabetes: A tertiary center experience. Journal of Diabetes Research, 2018, 9572817. doi:10.1155/2018/9572817
  • Friemel, T. N. (2016). The digital divide has grown old: Determinants of a digital divide among seniors. New Media & Society, 18, 313–331. doi:10.1177/1461444814538648
  • Fry, R. (2018). Millennials expected to outnumber boomers in 2019. Pew Research Center. Retrieved from http://www.pewresearch.org/fact-tank/2018/03/01/millennials-overtake-baby-boomers/
  • Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. New York, NY: Aldine.
  • Gold, R. L. (1958). Roles in sociological field observations. Social Forces, 36, 217–223. doi:10.2307/2573808
  • Guion, L. A., Diehl, D. C., & McDonald, D. (2011). Conducting an in-depth interview. University of Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, EDIS. Retrieved from http://greenmedicine.ie/school/images/Library/Conducting%20An%20In%20Depth%20Interview.pdf
  • Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management Science, 40, 440–465. doi:10.1287/mnsc.40.4.440
  • Hoque, R., & Sorwar, G. (2017). Understanding factors influencing the adoption of mHealth by the elderly: An extension of the UTAUT model. International Journal of Medical Informatics, 101, 75–84. doi:10.1016/j.ijmedinf.2017.02.002
  • Kijsanayotin, B., Pannarunothai, S., & Speedie, S. M. (2009). Factors influencing health information technology adoption in Thailand’s community health centers: Applying the UTAUT model. International Journal of Medical Informatics, 78, 404–416. doi:10.1016/j.ijmedinf.2008.12.005
  • Kramer, M. W. (2004). Toward a communication theory of group dialectics: An ethnographic study of a community theater group. Communication Monographs, 71, 311–332. doi:10.1080/0363452042000288292
  • Lafky, D. B., & Horan, T. A. (2011). Personal health records: Consumer attitudes toward privacy and security of their personal health information. Health Informatics Journal, 17, 63–71. doi:10.1177/1460458211399403
  • Lindlof, T. R. (1995). Qualitative communication research methods. Thousand Oaks, CA: Sage Publications.
  • Lindlof, T. R., & Taylor, B. C. (2011). Qualitative communication research methods (3rd ed.). Thousand Oaks, CA: Sage Publications.
  • Madden, M., & Rainie, L. (2015). Americans’ attitudes about privacy, security and surveillance. Pew Research Center. Retrieved from http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
  • Magsamen-Conrad, K., Dillon, J. M., Billotte Verhoff, C., & Faulkner, S. (2018). Online health-information seeking among older populations: Family influences and the role of the medical professional. Health Communication. doi:10.1080/10410236.2018.1439265
  • Magsamen-Conrad, K., Dowd, J., Abuljadail, M., Alsulaiman, S. A., & Shareefi, A. O. (2015). Life-course differences in the uses and gratifications of tablets: Implications for older adults. Computers in Human Behavior, 52, 96–106. doi:10.1016/j.chb.2015.05.024
  • Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12, 1–27. doi:10.1111/j.1083-6101.2007.00328.x
  • Mitzner, T. L., Boron, J. B., Fausset, C. B., Adams, A. E., Charness, N., Czaja, S. J., … Sharit, J. (2010). Older adults talk technology: Technology usage and attitudes. Computers in Human Behavior, 26, 1710–1721. doi:10.1016/j.chb.2010.06.020
  • Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs, 35, 27–45. doi:10.1111/j.1745-6606.2001.tb00101.x
  • Moore, G. C., & Benbat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2, 192–222. doi:10.1287/isre.2.3.192
  • Ngcongo, M. (2016). Mobile communication privacy management in romantic relationships: A dialectical approach. Communication: South African Journal for Communication Theory & Research, 42, 56–74. doi:10.1080/02500167.2016.1140666
  • Nussbaum, J. F. (2007). Life span communication and quality of life. Journal of Communication, 57, 1–7. doi:10.1111/j.1460-2466.2006.00325.x
  • Nussbaum, J. F., & Worthington, A. (2014). Introduction. In J. F. Nussbaum (Ed.), The handbook of lifespan communication (Vol. 2, pp. 1–6). New York, NY: Peter Lang.
  • Olmstead, K., & Smith, A. (2017). Americans and cybersecurity: Many Americans do not trust modern institutions to protect their personal data – even as they frequently neglect cybersecurity best practices in their own personal lives. Pew Research Center. Retrieved from http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/
  • Pecchioni, L. L., Wright, K. B., & Nussbaum, J. F. (2005). Life-span communication. Mahwah, NJ: Lawrence Erlbaum Associates, Inc.
  • Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1, 311–335. doi:10.1111/j.1468-2885.1991.tb00023.x
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: State University of New York Press.
  • Pew Research Center. (2018). Internet/broadband fact sheet. Retrieved from http://www.pewinternet.org/fact-sheet/internet-broadband/
  • Poushter, J. (2016). Smartphone ownership and internet usage continues to climb in emerging economies: But advanced economies still have higher rates of technology use. Pew Research Center. Retrieved from http://www.pewglobal.org/2016/02/22/smartphone-ownership-and-internet-usage-continues-to-climb-in-emerging-economies/
  • Prince, M. J., Wu, F., Guo, Y., Robledo, L. M. G., O’Donnell, M., Sullivan, R., & Yusuf, S. (2015). The burden of disease in older people and implications for health policy and practice. The Lancet, 385, 549–562. doi:10.1016/S0140-6736(14)61347-7
  • Reinecke, L., Aufenanger, S., Beutel, M. E., Dreier, M., Quiring, O., Stark, B., … Müller, K. W. (2016). Digital stress over the life span: The effects of communication load and internet multitasking on perceived stress and psychological health impairments in a German probability sample. Media Psychology, 20, 1–26. doi:10.1080/15213269.2015.1121832
  • Robinson, R., Cotton, S. R., Ono, H., Quan-Haase, A., Mesch, G., Chen, W., … Stern, M. J. (2015). Digital inequalities and why they matter. Information, Communication, & Society, 18, 569–582. doi:10.1080/1369118X.2015.1012532
  • Socha, T. J. (2014). Lifespan communication: Children, families, and aging. In J. F. Nussbaum (Ed.), The handbook of lifespan communication (Vol. 2, pp. xi–xii). New York, NY: Peter Lang.
  • Soliz, J., & Fowler, C. (2014). Sandwich relationships. In J. F. Nussbaum (Ed.), The handbook of lifespan communication (Vol. 2, pp. 293–309). New York, NY: Peter Lang.
  • Sparks, L. (2003). An introduction to cancer communication and aging: Theoretical and research insights. Health Communication, 15, 123–131. doi:10.1207/S15327027HC1502_1
  • Sun, N., & Rau, P. L. P. (2015). The acceptance of personal health devices among patients with chronic conditions. International Journal of Medical Informatics, 84, 288–297. doi:10.1016/j.ijmedinf.2015.01.002
  • Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6, 144–176. doi:10.1287/isre.6.2.144
  • Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly: Management Information Systems, 15, 125–143. doi:10.2307/249443
  • Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. IEEE Transactions on Engineering Management, EM-29, 28–45. doi:10.1109/TEM.1982.6447463
  • Uchino, B. N. (2009). Understanding the links between social support and physical health: A life-span perspective with emphasis on the separability of perceived and received support. Perspectives on Psychological Science, 4, 236–255. doi:10.1111/j.1745-6924.2009.01122.x
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46, 186–204. doi:10.1287/mnsc.46.2.186.11926
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly: Management Information Systems, 27, 425–478. doi:10.2307/30036540
  • Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly: Management Information Systems, 36, 157–178. doi:10.2307/41410412
  • Venkatesh, V., Thong, J. Y., & Xu, X. (2016). Unified theory of acceptance and use of technology: A synthesis and the road ahead. Journal of the Association for Information Systems, 17, 328–376. doi:10.17705/1jais.00428
  • Vroman, K. G., Arthanat, S., & Lysack, C. (2015). “Who over 65 is online?” Older adults’ dispositions toward information communication technology. Computers in Human Behavior, 43, 156–166. doi:10.1016/j.chb.2014.10.018
  • Zhou, Y. (2008). Voluntary adopters versus forced adopters: Integrating the diffusion of innovation theory and the technology acceptance model to study intra-organizational adoption. New Media & Society, 10, 475–496. doi:10.1177/1461444807085382

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.