265
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An Experimental Study to Examine Relationships Between IT Identity and Users’ Post-Adoption Behaviors for Different Types of Health Applications

, ORCID Icon &

References

  • Abbaspur-Behbahani, S., Monaghesh, E., Hajizadeh, A., & Fehresti, S. (2022). Application of mobile health to support the elderly during the COVID-19 outbreak: A systematic review. Health Policy and Technology, 11(1), 100595. https://doi.org/10.1016/j.hlpt.2022.100595
  • Adeola, B.-A., Ivana, D., Orlando, R., Wu, V. S., Anthony, A., Geoff P, D., & Afaf, G. (2022). Supporting cancer patients to self-manage: Extent of use and perceptions of “trusted” online self-management resources. Patient Education and Counseling, 105(7), 2240–2247. https://doi.org/10.1016/j.pec.2022.03.017
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behaviour and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
  • Alalwan, A. A., Dwivedi, Y. K., Rana, N. P., & Williams, M. D. (2016). Consumer adoption of mobile banking in Jordan: Examining the role of usefulness, ease of use, perceived risk and self-efficacy. Journal of Enterprise Information Management, 29(1), 118–139. https://doi.org/10.1108/JEIM-04-2015-0035
  • Aldhahir, A. M., Alqahtani, J. S., Althobiani, M. A., Alghamdi, S. M., Alanazi, A. F., Alnaim, N., Alqarni, A. A., & Alwafi, H. (2022). Current knowledge, satisfaction, and use of E-Health mobile application (Seha) among the general population of Saudi Arabia: A cross-sectional study. Journal of Multidisciplinary Healthcare, Volume 15, 667–678. https://doi.org/10.2147/JMDH.S355093
  • Alpay, L. L., Henkemans, O. B., Otten, W., Rövekamp, T. A., & Dumay, A. C. (2010). E-health applications and services for patient empowerment: Directions for best practices in the Netherlands. Telemedicine and E-Health, 16(7), 787–791. https://doi.org/10.1089/tmj.2009.0156
  • Alvarez, R. (2008). Examining technology, structure and identity during an enterprise system implementation. Information Systems Journal, 18(2), 203–224. https://doi.org/10.1111/j.1365-2575.2007.00286.x
  • Anderson, K., Burford, O., & Emmerton, L. (2016). App chronic disease checklist: Protocol to evaluate mobile apps for chronic disease self-management. JMIR Research Protocols, 5(4), e204. https://doi.org/10.2196/resprot.6194
  • Azar, K. M., Lesser, L. I., Laing, B. Y., Stephens, J., Aurora, M. S., Burke, L. E., & Palaniappan, L. P. (2013). Mobile applications for weight management: Theory-based content analysis. American Journal of Preventive Medicine, 45(5), 583–589. https://doi.org/10.1016/j.amepre.2013.07.005
  • Bagayogo, F. F., Lapointe, L., & Bassellier, G. (2014). Enhanced use of IT: A new perspective on post-adoption. Journal of the Association for Information Systems, 15(7), 3. https://doi.org/10.17705/1jais.00367
  • Balapour, A., Reychav, I., Sabherwal, R., & Azuri, J. (2019). Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps. International Journal of Information Management, 49, 58–68. https://doi.org/10.1016/j.ijinfomgt.2019.03.005
  • Bansal, G., Zahedi, F., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. https://doi.org/10.1016/j.dss.2010.01.010
  • Bartek, M. A., Truitt, A. R., Widmer-Rodriguez, S., Tuia, J., Bauer, Z. A., Comstock, B. A., Edwards, T. C., Lawrence, S. O., Monsell, S. E., Patrick, D. L., Jarvik, J. G., & Lavallee, D. C. (2017). The promise and pitfalls of using crowdsourcing in research prioritization for back pain: Cross-sectional surveys. Journal of Medical Internet Research, 19(10), e8821. https://doi.org/10.2196/jmir.8821
  • Bhattacherjee, A., Perols, J., & Sanford, C. (2008). Information technology continuance: A theoretic extension and empirical test. Journal of Computer Information Systems, 49(1), 17–26. https://doi.org/10.1080/08874417.2008.11645302
  • Bick, A., Blandin, A., & Mertens, K. (2020). Work from home before and after the COVID-19 outbreak. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3786142
  • Bodenheimer, T., & Grumbach, K. (2003). Electronic technology: A spark to revitalize primary care? Jama, 290(2), 259–264. https://doi.org/10.1001/jama.290.2.259
  • Brocklehurst, M. (2001). Power, identity and new technology homework: Implications fornew forms’ of organizing. Organization Studies, 22(3), 445–466. https://doi.org/10.1177/0170840601223003
  • Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon’s mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science, 6(1), 3–5. https://doi.org/10.1177/1745691610393980
  • Burke, P. J., & Stets, J. E. (2009). Identity theory. Oxford University Press.
  • Cantor, J. D. (2001). Privacy protections for cybercharts: An update on the law. JAMA, 285(13), 1767–1767. https://doi.org/10.1001/jama.285.13.1767-JMS0404-5-1
  • Card, S. K., Moran, T. P., & Newell, A., Card, S. K. (2018). The psychology of human-computer interaction. Crc Press. https://doi.org/10.1201/9780203736166
  • Carter, M., & Grover, V. (2015). Me, my self, and I (T). Mis Quarterly, 39(4), 931–958. https://doi.org/10.25300/MISQ/2015/39.4.9
  • Carter, M., Petter, S., Grover, V., & Thatcher, J. B. (2020a). Information technology Identity: A key determinant of IT feature and exploratory usage. MIS Quarterly, 44(3), 983–1021. https://doi.org/10.25300/MISQ/2020/14607
  • Carter, M., Petter, S., Grover, V., & Thatcher, J. B. (2020b). IT Identity: A measure and empirical investigation of its utility to is research. Journal of the Association for Information Systems, 21(5), 2. https://doi.org/10.17705/1jais.00638
  • Chan, T. K. H., Cheung, C. M. K., Benbasat, I., Xiao, B., & Lee, Z. W. Y. (2022). Bystanders join in cyberbullying on social networking sites: The deindividuation and moral disengagement perspectives. Information Systems Research. https://doi.org/10.1287/isre.2022.1161
  • Chandler, J., & Shapiro, D. (2016). Conducting clinical research using crowdsourced convenience samples. Annual Review of Clinical Psychology, 12(1), 53–81. https://doi.org/10.1146/annurev-clinpsy-021815-093623
  • Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295–336.
  • Clayton, S. (2003). Environmental identity: A conceptual and an operational definition. Identity and the natural environment: The psychological significance of nature, 45-65. The MIT Press.
  • Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 145–158.
  • Curley, E., & Polites, G. (2020). The optimal experience: Social identity and IT identity as antecedents of group flow in social media use. The 53rd Hawaii International Conference on System Sciences. http://hdl.handle.net/10125/63821
  • Da Cunha, J. V., & Orlikowski, W. J. (2008). Performing catharsis: The use of online discussion forums in organizational change. Information and Organization, 18(2), 132–156. https://doi.org/10.1016/j.infoandorg.2008.02.001
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  • Davis, F. D., & Venkatesh, V. (1996). A critical assessment of potential measurement biases in the technology acceptance model: Three experiments. International Journal of Human-Computer Studies, 45(1), 19–45. https://doi.org/10.1006/ijhc.1996.0040
  • Deng, X., Doll, W., & Truong, D. (2004). Computer self-efficacy in an ongoing use context. Behaviour & Information Technology, 23(6), 395–412.
  • Dubey, A. D., & Tripathi, S. (2020). Analysing the sentiments towards work-from-home experience during COVID-19 pandemic. Journal of Innovation Management, 8(1), 13–19. https://doi.org/10.24840/2183-0606_008.001_0003
  • Du, Y., Dennis, B., Ramirez, V., Li, C., Wang, J., & Meireles, C. L. (2022). Experiences and disease self-management in individuals living with chronic kidney disease: Qualitative analysis of the national kidney foundation’s online community. BMC Nephrology, 23(1), 88. https://doi.org/10.1186/s12882-022-02717-7
  • Esmaeilzadeh, P. (2020). The role of information technology mindfulness in the postadoption stage of using personal health devices: Cross-sectional questionnaire study in mobile health. JMIR MHealth and UHealth, 8(10), e18122. https://doi.org/10.2196/18122
  • Esmaeilzadeh, P. (2021a). How does IT identity affect individuals’ use behaviors associated with personal health devices (PHDs)? An empirical study. Information & Management, 58(1), 103313. https://doi.org/10.1016/j.im.2020.103313
  • Esmaeilzadeh, P. (2021b). The influence of gamification and information technology identity on postadoption behaviors of health and fitness app users: Empirical study in the United States. JMIR Serious Games, 9(3), e28282. https://doi.org/10.2196/28282
  • Esmaeilzadeh, P., & Mirzaei, T. (2018). Comparison of consumers’ perspectives on different health information exchange (HIE) mechanisms: An experimental study. International Journal of Medical Informatics, 119, 1–7. https://doi.org/10.1016/j.ijmedinf.2018.08.007
  • Esmaeilzadeh, P., Mirzaei, T., & Dharanikota, S. (2020). The impact of data entry structures on perceptions of individuals with chronic mental disorders and physical diseases towards health information sharing. International Journal of Medical Informatics, 141, 104157. https://doi.org/10.1016/j.ijmedinf.2020.104157
  • Forman, C., Ghose, A., & Wiesenfeld, B. (2008). Examining the relationship between reviews and sales: The role of reviewer identity disclosure in electronic markets. Information Systems Research, 19(3), 291–313. https://doi.org/10.1287/isre.1080.0193
  • Fox, G., & Connolly, R. (2018). Mobile health technology adoption across generations: Narrowing the digital divide. Information Systems Journal, 28(6), 995–1019. https://doi.org/10.1111/isj.12179
  • Freundlich, R. E., Freundlich, K. L., & Drolet, B. C. (2018). Pagers, smartphones, and HIPAA: Finding the best solution for electronic communication of protected health information. Journal of Medical Systems, 42, 1–3.
  • Frey, R. M., Xu, R., & Ilic, A. (2017). Mobile app adoption in different life stages: An empirical analysis. Pervasive and Mobile Computing, 40, 512–527. https://doi.org/10.1016/j.pmcj.2017.01.006
  • Furby, L. (1978). Possession in humans: An exploratory study of its meaning and motivation. Social Behavior & Personality: An International Journal, 6(1), 49–65.
  • Giddens, A. (1991). Structuration theory. Past, present and future. In C. Bryant and D. Jary (Eds.), Giddens’ theory of structuration. a critical appreciation (pp. 55–66). Routledge.
  • Granberg, E. M. (2011). “Now my ‘old self’is thin” stigma exits after weight loss. Social Psychology Quarterly, 74(1), 29–52.
  • Gravenhorst, F., Muaremi, A., Bardram, J., Grünerbl, A., Mayora, O., Wurzer, G., Frost, M., Osmani, V., Arnrich, B., Lukowicz, P., & Tröster, G. (2015). Mobile phones as medical devices in mental disorder treatment: An overview. Personal and Ubiquitous Computing, 19(2), 335–353. https://doi.org/10.1007/s00779-014-0829-5
  • Gu, Z., & Tayi, G. K. (2017). Consumer pseudo-showrooming and omni-channel placement strategies. MIS Quarterly, 41(2), 583–606. https://doi.org/10.25300/MISQ/2017/41.2.11
  • Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152. https://doi.org/10.2753/MTP1069-6679190202
  • Hammedi, W., Leclerq, T., & Van Riel, A. C. (2017). The use of gamification mechanics to increase employee and user engagement in participative healthcare services: A study of two cases. Journal of Service Management, 28(4), 640–661.
  • Handel, M. J. (2011). mHealth (mobile health)-using apps for health and wellness. Explore (New York, NY), 7(4), 256–261. https://doi.org/10.1016/j.explore.2011.04.011
  • Harmon, K., & Walden, E. (2020). Comparing three theories of the gender gap in information technology careers: The role of salience differences. Journal of the Association for Information Systems, 22(4), 1099–1145. https://doi.org/10.17705/1jais.00690
  • Hassandoust, F., & Techatassanasoontorn, A. A. (2021). Antecedents of is infusion behaviours: An integrated IT identity and empowerment perspective. Behaviour & Information Technology, 41(11), 2390–2414. https://doi.org/10.1080/0144929X.2021.1928287
  • Heister, S., & Yuthas, K. (2020). The blockchain and how it can influence conceptions of the self. Technology in Society, 60, 101218. https://doi.org/10.1016/j.techsoc.2019.101218
  • Hibbeln, M., Jenkins, J. L., Schneider, C., Valacich, J. S., & Weinmann, M. (2017). How is your user feeling? inferring emotion through human–computer interaction devices. MIS Quarterly, 41(1), 1–A7. https://doi.org/10.25300/MISQ/2017/41.1.01
  • Hinds, P. J., & Mortensen, M. (2005). Understanding conflict in geographically distributed teams: The moderating effects of shared identity, shared context, and spontaneous communication. Organization Science, 16(3), 290–307. https://doi.org/10.1287/orsc.1050.0122
  • Hsu, M.-H., & Chiu, C.-M. (2004). Predicting electronic service continuance with a decomposed theory of planned behaviour. Behaviour & Information Technology, 23(5), 359–373. https://doi.org/10.1080/01449290410001669969
  • Huang, T.-L. (2019). Psychological mechanisms of brand love and information technology identity in virtual retail environments. Journal of Retailing and Consumer Services, 47, 251–264. https://doi.org/10.1016/j.jretconser.2018.11.016
  • Huarng, K.-H., Yu, T. H.-K., & Fang Lee, C. (2022). Adoption model of healthcare wearable devices. Technological Forecasting and Social Change, 174, 121286. https://doi.org/10.1016/j.techfore.2021.121286
  • James, T., Bélanger, F., & Lowry, P. B. (2021). The mediating role of fitness technology enablement of psychological need satisfaction and frustration on the relationship between goals for fitness technology use and use outcomes. Journal of the Association for Information Systems (JAIS), 23(4), 913–965. https://doi.org/10.17705/1jais.00745
  • Kim, H. S., & Hodgins, D. C. (2017). Reliability and validity of data obtained from alcohol, cannabis, and gambling populations on Amazon’s mechanical Turk. Psychology of Addictive Behaviors, 31(1), 85–94. https://doi.org/10.1037/adb0000219
  • Kim, Y.-C., Jung, J.-Y., & Ball-Rokeach, S. J. (2007). Ethnicity, place, and communication technology: Effects of ethnicity on multi-dimensional internet connectedness. Information Technology & People, 20(3), 282–303. https://doi.org/10.1108/09593840710822877
  • Kim, S. J., Schiffelbein, J. E., Imset, I., & Olson, A. L. (2022). Countering antivax misinformation via social media: Message-testing randomized experiment for human papillomavirus vaccination uptake. Journal of Medical Internet Research, 24(11), e37559. https://doi.org/10.2196/37559
  • Kim, J. A., Yang, S. J., Chee, Y. K., Kwon, K. J., & An, J. (2015). Effects of health status and health behaviors on depression among married female immigrants in South Korea. Asian Nursing Research, 9(2), 125–131. https://doi.org/10.1016/j.anr.2015.01.003
  • Kwark, Y., Lee, G. M., Pavlou, P. A., & Qiu, L. (2021). On the spillover effects of online product reviews on purchases: Evidence from clickstream data. Information Systems Research, 32(3), 895–913. https://doi.org/10.1287/isre.2021.0998
  • Kwon, H. E., Dewan, S., Oh, W., & Kim, T. (2023). Self-regulation and external influence: The relative efficacy of mobile apps and offline channels for personal weight management. Information Systems Research, 34(1), 50–66. https://doi.org/10.1287/isre.2022.1144
  • Lalor, J. P., Wu, H., Mazor, K. M., & Yu, H. (2023). Evaluating the efficacy of NoteAid on EHR note comprehension among US Veterans through Amazon mechanical Turk. International Journal of Medical Informatics, 172, 105006. https://doi.org/10.1016/j.ijmedinf.2023.105006
  • Ling, R., & Yttri, B. (2002). Hyper-coordination via mobile phones in Norway. Perpetual contact: Mobile communication, private talk, public performance, 139–169. https://dl.acm.org/doi/abs/10.5555/644547.644558
  • Lucas, H. C., Jr., & Spitler, V. K. (1999). Technology use and performance: A field study of broker workstations. Decision Sciences, 30(2), 291–311. https://doi.org/10.1111/j.1540-5915.1999.tb01611.x
  • Luhanga, E. T., Hippocrate, A. A. E., Suwa, H., Arakawa, Y., & Yasumoto, K. (2018). Identifying and evaluating user requirements for smartphone group fitness applications. IEEE Access, 6, 3256–3269.
  • Ma, M., & Agarwal, R. (2007). Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities. Information Systems Research, 18(1), 42–67. https://doi.org/10.1287/isre.1070.0113
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
  • Marge, M., Banerjee, S., & Rudnicky, A. I. (2010). Using the Amazon Mechanical Turk for transcription of spoken language. 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas, TX, USA (5270–5273). IEEE.
  • Mason, W., & Suri, S. (2012). Conducting behavioral research on Amazon’s mechanical Turk. Behavior Research Methods, 44(1), 1–23. https://doi.org/10.3758/s13428-011-0124-6
  • McCall, G. J. (2003). The me and the not-me. In Advances in identity theory and research (pp. 11–25). Springer US. https://doi.org/10.1007/978-1-4419-9188-1_2
  • McCall, M. P., Hineline, M. T., Anton, M. T., Highlander, A., & Jones, D. J. (2022). The socioeconomic indicators linked to parent health-related technology use: Cross-sectional survey. Journal of Medical Internet Research, 24(11), e37455. https://doi.org/10.2196/37455
  • McCall, G. J., & Simmons, J. L. (1978). Identities and interactions (Revised edition)* ed.). The Free Press.
  • McLeay, F., Olya, H., Liu, H., Jayawardhena, C., & Dennis, C. (2022). A multi-analytical approach to studying customers motivations to use innovative totally autonomous vehicles. Technological Forecasting and Social Change, 174, 121252. https://doi.org/10.1016/j.techfore.2021.121252
  • McMillan, S. J., & Morrison, M. (2006). Coming of age with the internet: A qualitative exploration of how the internet has become an integral part of young people’s lives. New Media & Society, 8(1), 73–95. https://doi.org/10.1177/1461444806059871
  • Milne, G. R. (1997). Consumer participation in mailing lists: A field experiment. Journal of Public Policy & Marketing, 16(2), 298–309. https://doi.org/10.1177/074391569701600210
  • Milne-Ives, M., van Velthoven, M. H., & Meinert, E. (2020). Mobile apps for real-world evidence in health care. Journal of the American Medical Informatics Association, 27(6), 976–980.
  • Mirbabaie, M., Stieglitz, S., Brünker, F., Hofeditz, L., Ross, B., & Frick, N. R. (2021). Understanding collaboration with virtual assistants–the role of social identity and the extended self. Business & Information Systems Engineering, 63(1), 21–37. https://doi.org/10.1007/s12599-020-00672-x
  • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222. https://doi.org/10.1287/isre.2.3.192
  • Mortensen, K., & Hughes, T. L. (2018). Comparing Amazon’s mechanical Turk platform to conventional data collection methods in the health and medical research literature. Journal of General Internal Medicine, 33(4), 533–538. https://doi.org/10.1007/s11606-017-4246-0
  • Munn, Z., Peters, M. D., Stern, C., Tufanaru, C., McArthur, A., & Aromataris, E. (2018). Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Medical Research Methodology, 18(1), 1–7. https://doi.org/10.1186/s12874-018-0611-x
  • Narayanan, A. (2012). A review of eight software packages for structural equation modeling. The American Statistician, 66(2), 129–138. https://doi.org/10.1080/00031305.2012.708641
  • Netto, Y. C., & Maçada, A. C. G. (2019). The influence of social media filter bubbles and echo chambers on it identity construction. In Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8–14. https://aisel.aisnet.org/ecis2019_rip/65
  • Nowak, G. J., & Phelps, J. E. (1992). Understanding privacy concerns: An assessment of consumers’ information-related knowledge and beliefs. Journal of Direct Marketing, 6(4), 28–39. https://doi.org/10.1002/dir.4000060407
  • Nunnally, J. C. (1978). Psychometric theory 2nd ed. Mcgraw hill book company.
  • O’Leary, M. B., Wilson, J. M., & Metiu, A. (2014). Beyond being there: The symbolic role of communication and identification in perceptions of proximity to geographically dispersed colleagues. MIS Quarterly, 38(4), 1219–1243. https://doi.org/10.25300/MISQ/2014/38.4.13
  • Omboni, S., Padwal, R. S., Alessa, T., Benczúr, B., Green, B. B., Hubbard, I., Kario, K., Khan, N. A., Konradi, A., Logan, A. G., Lu, Y., Mars, M., McManus, R. J., Melville, S., Neumann, C. L., Parati, G., Renna, N. F., Ryvlin, P. … Schutte, A. E. (2022). The worldwide impact of telemedicine during COVID-19: Current evidence and recommendations for the future. Connected Health, 1, 7. https://doi.org/10.20517/ch.2021.03
  • Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., & Patsakis, C. (2018). Security and privacy analysis of mobile health applications: The alarming state of practice. IEEE Access, 6, 9390–9403.
  • Payne, J. E., Turk, M. T., Kalarchian, M. A., & Pellegrini, C. A. (2022). Adherence to mobile-app-based dietary self-monitoring—Impact on weight loss in adults. Obesity Science & Practice, 8(3), 279–288. https://doi.org/10.1002/osp4.566
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. https://doi.org/10.1509/jppm.19.1.27.16941
  • Pires, I. M., Marques, G., Garcia, N. M., Flórez-Revuelta, F., Ponciano, V., & Oniani, S. (2020). A research on the classification and applicability of the mobile health applications. Journal of Personalized Medicine, 10(1), 11. https://doi.org/10.3390/jpm10010011
  • Purwanto, A., Asbari, M., Fahlevi, M., Mufid, A., Agistiawati, E., Cahyono, Y., & Suryani, P. (2020). Impact of work from home (WFH) on Indonesian teachers performance during the Covid-19 pandemic: An exploratory study. International Journal of Advanced Science and Technology, 29(5), 6235–6244. http://sersc.org/journals/index.php/IJAST/article/view/15627
  • Qudah, B., & Luetsch, K. (2019). The influence of mobile health applications on patient-healthcare provider relationships: A systematic, narrative review. Patient Education and Counseling, 102(6), 1080–1089. https://doi.org/10.1016/j.pec.2019.01.021
  • R Core Team. (2019). R version 3.6. 0.—R Foundation for Statistical Computing.
  • Reychav, I., Beeri, R., Balapour, A., Raban, D. R., Sabherwal, R., & Azuri, J. (2019). How reliable are self-assessments using mobile technology in healthcare? The effects of technology identity and self-efficacy. Computers in Human Behavior, 91, 52–61. https://doi.org/10.1016/j.chb.2018.09.024
  • Riemenschneider, C. K., & Armstrong, D. J. (2021). THE development of the perceived distinctiveness antecedent of information systems professional identity. MIS Quarterly, 45(3), 1149–1186. https://doi.org/10.25300/MISQ/2021/14626
  • Robert, L. P., Jr., & Sykes, T. A. (2017). Extending the concept of control beliefs: Integrating the role of advice networks. Information Systems Research, 28(1), 84–96. https://doi.org/10.1287/isre.2016.0666
  • Rosseel, Y. (2012). Lavaan: An R package for structural equation modeling and more. Version 0.5–12 (BETA). Journal of Statistical Software, 48(2), 1–36. https://doi.org/10.18637/jss.v048.i02
  • Sama, P. R., Eapen, Z. J., Weinfurt, K. P., Shah, B. R., & Schulman, K. A. (2014). An evaluation of mobile health application tools. JMIR MHealth and UHealth, 2(2), e3088. https://doi.org/10.2196/mhealth.3088
  • Savoli, A., & Bhatt, M. (2017). The impact of IT identity on users’ emotions: A conceptual framework in health-care setting. AMCIS 2017 Proceedings. Boston, MA, USA. https://aisel.aisnet.org/amcis2017/Healthcare/Presentations/22
  • Schmalz, M., Carter, M., & Lee, J. H. (2018). It’s not you, it’s me: Identity, self-verification, and Amazon reviews. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 49(2), 79–92. https://doi.org/10.1145/3229335.3229341
  • Schmalz, M., Carter, M., & Lee, J. H. (2019). The I in team: IT identity and project behavior. AMCIS 2019 Proceedings. Cancun, Mexico. https://aisel.aisnet.org/amcis2019/it_project_mgmt/it_project_mgmt/5
  • Schuetz, S., Lowry, P. B., Pienta, D., & Thatcher, J. (2020). Improving the design of information security messages by leveraging the effects of temporal distance and argument nature. Journal of the Association for Information Systems (JAIS), 22(5), 1376–1428. https://doi.org/10.17705/1jais.00697
  • Schwarz, A., & Chin, W. (2007). Looking forward: Toward an understanding of the nature and definition of IT acceptance. Journal of the Association for Information Systems, 8(4), 4. https://doi.org/10.17705/1jais.00123
  • Short, C. E., DeSmet, A., Woods, C., Williams, S. L., Maher, C., Middelweerd, A., Müller, A. M., Wark, P. A., Vandelanotte, C., Poppe, L., Hingle, M. D., & Crutzen, R. (2018). Measuring engagement in eHealth and mHealth behavior change interventions: Viewpoint of methodologies. Journal of Medical Internet Research, 20(11), e9397. https://doi.org/10.2196/jmir.9397
  • Silva, B. M., Rodrigues, J. J., de la Torre Díez, I., López-Coronado, M., & Saleem, K. (2015). Mobile-health: A review of current state in 2015. Journal of Biomedical Informatics, 56, 265–272. https://doi.org/10.1016/j.jbi.2015.06.003
  • Stets, J. E., & Biga, C. F. (2003). Bringing identity theory into environmental sociology. Sociological Theory, 21(4), 398–423. https://doi.org/10.1046/j.1467-9558.2003.00196.x
  • Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49. https://doi.org/10.1287/isre.13.1.36.97
  • Stritch, J. M., Pedersen, M. J., & Taggart, G. (2017). The opportunities and limitations of using mechanical Turk (MTURK) in public administration and management scholarship. International Public Management Journal, 20(3), 489–511. https://doi.org/10.1080/10967494.2016.1276493
  • Stryker, S., & Burke, P. J. (2000). The past, present, and future of an identity theory. Social Psychology Quarterly, 63(4), 284–297. https://doi.org/10.2307/2695840
  • Sun, N., & Rau, P.-L. P. (2015). The acceptance of personal health devices among patients with chronic conditions. International Journal of Medical Informatics, 84(4), 288–297. https://doi.org/10.1016/j.ijmedinf.2015.01.002
  • Svetina, D., Rutkowski, L., & Rutkowski, D. (2020). Multiple-group invariance with categorical outcomes using updated guidelines: An illustration using M plus and the lavaan/semtools packages. Structural Equation Modeling: A Multidisciplinary Journal, 27(1), 111–130. https://doi.org/10.1080/10705511.2019.1602776
  • Swann, W. B., Jr. (2012). Self-verification theory. In P. Van Lang, A. Kruglanski, & E. Higgins (Eds.), Handbook of theories of social psychology. Sage.
  • Tajfel, H. (1981). Human groups and social categories: Studies in social psychology. Cup Archive.
  • Taylor, C. O., Flaks-Manov, N., Ramesh, S., & Choe, E. K. (2021). Willingness to share wearable device data for research among mechanical turk workers: Web-based survey study. Journal of Medical Internet Research, 23(10), e19789. https://doi.org/10.2196/19789
  • Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 125–143. https://doi.org/10.2307/249443
  • Tsai, H.-T., & Bagozzi, R. P. (2014). Contribution behavior in virtual communities: Cognitive, emotional, and social influences. Mis Quarterly, 38(1), 143–164. https://doi.org/10.25300/MISQ/2014/38.1.07
  • Tsarenko, Y., & Tojib, D. R. (2009). Examining customer privacy concerns in dealings with financial institutions. Journal of Consumer Marketing, 26(7), 468–476. https://doi.org/10.1108/07363760911001529
  • van Zandwijk, J. P., & Boztas, A. (2019). The iPhone Health App from a forensic perspective: Can steps and distances registered during walking and running be used as digital evidence? Digital Investigation, 28, S126–S133.
  • Venkatesh, V. (1999). Creation of favorable user perceptions: exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239–260. https://doi.org/10.2307/249753
  • Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365. https://doi.org/10.1287/isre.11.4.342.11872
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. https://doi.org/10.2307/30036540
  • Vignoles, V. L., Schwartz, S. J., & Luyckx, K. (2011). Introduction: Toward an integrative view of identity. In Handbook of identity theory and research (pp. 1–27). Springer New York. https://doi.org/10.1007/978-1-4419-7988-9_1
  • Walsh, S. P., White, K. M., & Young, R. M. (2010). Needing to connect: The effect of self and others on young people’s involvement with their mobile phones. Australian Journal of Psychology, 62(4), 194–203. https://doi.org/10.1080/00049530903567229
  • Wang, X., Markert, C., & Sasangohar, F. (2023). Investigating popular mental health mobile application downloads and activity during the COVID-19 pandemic. Human Factors: The Journal of the Human Factors and Ergonomics Society, 65(1), 50–61. https://doi.org/10.1177/0018720821998110
  • Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of on-line privacy concerns and willingness to provide personal and financial information. Journal of Marketing Communications, 11(1), 21–40. https://doi.org/10.1080/1352726042000263575
  • Weinstein, R. S., Lopez, A. M., Joseph, B. A., Erps, K. A., Holcomb, M., Barker, G. P., & Krupinski, E. A. (2014). Telemedicine, telehealth, and mobile health applications that work: Opportunities and barriers. The American Journal of Medicine, 127(3), 183–187. https://doi.org/10.1016/j.amjmed.2013.09.032
  • Wei, Y., Yu, H., Geng, J., Wu, B., Guo, Z., He, L., & Chen, Y. (2018). Hospital efficiency and utilization of high-technology medical equipment: A panel data analysis. Health Policy and Technology, 7(1), 65–72. https://doi.org/10.1016/j.hlpt.2018.01.001
  • Weng, Q., Wang, W., & Patel, J. (2019). Exploring the formation of IT identity: A technology-value fit model. AMCIS 2019 Proceedings. Cancun, Mexico. https://aisel.aisnet.org/amcis2019/adv_info_systems_research/adv_info_systems_research/13
  • Workman, M. (2014). New media and the changing face of information technology use: The importance of task pursuit, social influence, and experience. Computers in Human Behavior, 31, 111–117. https://doi.org/10.1016/j.chb.2013.10.008
  • Zhang, X., Han, X., Dang, Y., Meng, F., Guo, X., & Lin, J. (2017). User acceptance of mobile health services from users’ perspectives: The role of self-efficacy and response-efficacy in technology acceptance. Informatics for Health and Social Care, 42(2), 194–206. https://doi.org/10.1080/17538157.2016.1200053
  • Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management, 55(4), 482–493. https://doi.org/10.1016/j.im.2017.11.003

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.