7,168
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Factors influencing the adoption of telemedicine health services during COVID-19 pandemic crisis: an integrative research model

ORCID Icon, ORCID Icon & ORCID Icon
Pages 769-793 | Received 06 May 2020, Accepted 10 Nov 2020, Published online: 08 Dec 2020

References

  • Abdalla, Y. S. 2019. “Critical Factors Determining Adoption of Telemedicine.” International Journal of Online and Biomedical Engineering (Ijoe) 15 (11): 124–138.
  • Akter, S., P. Ray, and J. D’Ambra. 2013. “Continuance of mHealth Services at the Bottom of the Pyramid: The Roles of Service Quality and Trust.” Electronic Markets 23 (1): 29–47.
  • Alaboudi, A., A. Atkins, B. Sharp, A. Balkhair, M. Alzahrani, and T. Sunbul. 2016. “Barriers and Challenges in Adopting Saudi Telemedicine Network: The Perceptions of Decision Makers of Healthcare Facilities in Saudi Arabia.” Journal of Infection and Public Health 9 (6): 725–733.
  • Albarrak, A. I., R. Mohammed, N. Almarshoud, L. Almujalli, R. Aljaeed, S. Altuwaijiri, and T. Albohairy. 2019. “Assessment of Physician’s Knowledge, Perception and Willingness of Telemedicine in Riyadh Region, Saudi Arabia.” Journal of Infection and Public Health.
  • Allam, A., Z. Kostova, K. Nakamoto, and P. J. Schulz. 2015. “The Effect of Social Support Features and Gamification on a Web-based Intervention for Rheumatoid Arthritis Patients: Randomized Controlled Trial.” Journal of Medical Internet Research 17 (1): e14.
  • Anderson, C. L., and R. Agarwal. 2010. “Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions.” MIS Quarterly 34 (3): 613–643.
  • Anderson, J. C., and D. W. Gerbing. 1988. “Structural Equation Modeling in Practice: A Review and Recommended Two-step Approach.” Psychological Bulletin 103 (3): 411.
  • Atanasovski, B., M. Bogdanovic, G. Velinov, L. Stoimenov, A. S. Dimovski, B. Koteska, … B. Jakimovski. 2018. “On Defining a Model Driven Architecture for an Enterprise E-health System.” Enterprise Information Systems 12 (8–9): 915–941.
  • Bandura, A. 1997. Self-efficacy: The Exercise of Control. New York, NY, US: W H Freeman/Times Books/Henry Holt & .
  • Bandura, A., W. Freeman, and R. Lightsey. 1999. Self-efficacy: The Exercise of Control. USA: Springer.
  • Barlow, J., D. Singh, S. Bayer, and R. Curry. 2007. “A Systematic Review of the Benefits of Home Telecare for Frail Elderly People and Those with Long-term Conditions.” Journal of Telemedicine and Telecare 13 (4): 172–179.
  • Bilgrami, Z., A. Abutaleb, K. Chudy-Onwugaje, P. Langenberg, M. Regueiro, D. A. Schwartz, … S. M. Quezada. 2020. “Effect of TELEmedicine for Inflammatory Bowel Disease on Patient Activation and Self-efficacy.” Digestive Diseases and Sciences 65 (1): 96–103.
  • Bossen, C., L. G. Jensen, and F. W. Udsen. 2013. “Evaluation of a Comprehensive EHR Based on the DeLone and McLean Model for IS Success: Approach, Results, and Success Factors.” International Journal of Medical Informatics 82 (10): 940–953.
  • Chiang, D.-L., Y.-T. Huang, T.-S. Chen, and F.-P. Lai. 2020. “Applying Time-constraint Access Control of Personal Health Record in Cloud Computing.” Enterprise Information Systems 14 (2): 266–281. doi:10.1080/17517575.2018.1522452.
  • Chin, W. W. 1998. Commentary: Issues and Opinion on Structural Equation Modeling. USA: JSTOR.
  • Chin, W. W., B. L. Marcolin, and P. R. Newsted. 2003. “A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from A Monte Carlo Simulation Study and an Electronic-mail Emotion/adoption Study.” Information Systems Research 14 (2): 189–217.
  • Cho, J. 2016. “The Impact of Post-adoption Beliefs on the Continued Use of Health Apps.” International Journal of Medical Informatics 87: 75–83.
  • Chow, M., L. Chan, B. Lo, W.-P. Chu, T. Chan, and Y.-M. Lai. 2013. “Exploring the Intention to Use a Clinical Imaging Portal for Enhancing Healthcare Education.” Nurse Education Today 33 (6): 655–662.
  • Cohen, J. 1988. Statistical Power Analysis for the Behavioural Sciences. Hillside. NJ: Lawrence Earlbaum Associates.
  • Compeau, D. R., and C. A. Higgins. 1995. “Computer Self-efficacy: Development of a Measure and Initial Test.” MIS Quarterly 19 (2): 189–211.
  • Cresswell, K., and A. Sheikh. 2013. “Organizational Issues in the Implementation and Adoption of Health Information Technology Innovations: An Interpretative Review.” International Journal of Medical Informatics 82 (5): e73–e86.
  • Delone, W. H., and E. R. McLean. 2003. “The DeLone and McLean Model of Information Systems Success: A Ten-year Update.” Journal of Management Information Systems 19 (4): 9–30.
  • DeLone, W. H., and E. R. McLean. 1992. “Information Systems Success: The Quest for the Dependent Variable.” Information Systems Research 3 (1): 60–95.
  • Deng, Z. 2013. “Understanding Public Users’ Adoption of Mobile Health Service.” International Journal of Mobile Communications 11 (4): 351–373.
  • Deng, Z., and S. Liu. 2017. “Understanding Consumer Health Information-seeking Behavior from the Perspective of the Risk Perception Attitude Framework and Social Support in Mobile Social Media Websites.” International Journal of Medical Informatics 105: 98–109.
  • Floyd, D. L., S. Prentice‐Dunn, and R. W. Rogers. 2000. “A Meta‐analysis of Research on Protection Motivation Theory.” Journal of Applied Social Psychology 30 (2): 407–429.
  • Fornell, C., and D. F. Larcker. 1981. “Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics.” Journal of Marketing Research 18 (3): 382–388.
  • Gorla, N., T. M. Somers, and B. Wong. 2010. “Organizational Impact of System Quality, Information Quality, and Service Quality.” The Journal of Strategic Information Systems 19 (3): 207–228.
  • Graham Christian, M., and N. Jones. 2020. “Impact of IoT on Geriatric Telehealth.” Working with Older People 24 (3): 231–243. doi:10.1108/wwop-04-2020-0012.
  • Guo, X., X. Han, X. Zhang, Y. Dang, and C. Chen. 2015. “Investigating M-health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences.” Telemedicine and e-Health 21 (8): 661–669.
  • Guo, X., Y. Sun, N. Wang, Z. Peng, and Z. Yan. 2013. “The Dark Side of Elderly Acceptance of Preventive Mobile Health Services in China.” Electronic Markets 23 (1): 49–61.
  • Hadji, B., and P. Degoulet. 2016. “Information System End-user Satisfaction and Continuance Intention: A Unified Modeling Approach.” Journal of Biomedical Informatics 61: 185–193.
  • Hair, J. F., Jr, G. T. M. Hult, C. Ringle, and M. Sarstedt. 2016. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). USA: Sage Publications.
  • Healthline. 2020. “Here’s What Could Happen If Doctors Get COVID-19”. Retrieved 10 April 2020 https://www.healthline.com/health-news/what-happens-if-nurses-and-doctors-get-covid-19
  • Healy, J. C. 2008. “Implementing e-Health in Developing Countries: Guidance and Principles”. ICT Applications and Cyber security Division (CYB). Policies and Strategies Department.[monografía en Internet]. Bureau for Telecommunication Development International Telecommunication Union.
  • Henseler, J., C. M. Ringle, and R. R. Sinkovics. 2009. “The Use of Partial Least Squares Path Modeling in International Marketing.” In New Challenges to International Marketing, 20: 277–319. Emerald Group Publishing Limited.
  • Hollander, J. E., and B. G. Carr. 2020. “Virtually Perfect? Telemedicine for COVID-19.” New England Journal of Medicine 382 (18): 1679–1681.
  • Hoque, R., and G. Sorwar. 2017. “Understanding Factors Influencing the Adoption of mHealth by the Elderly: An Extension of the UTAUT Model.” International Journal of Medical Informatics 101: 75–84.
  • Hsu, W.-Y. 2019. “A Customer-oriented Skin Detection and Care System in Telemedicine Applications.” The Electronic Library 37(6): 1007–1021.
  • Ifinedo, P. 2012. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers & Security 31 (1): 83–95.
  • Isaković, M., U. Sedlar, M. Volk, and J. Bešter. 2016. “Usability Pitfalls of Diabetes mHealth Apps for the Elderly.” Journal of Diabetes Research 2016: 1604609.
  • Jandavath, R. K. N., and A. Byram. 2016. “Healthcare Service Quality Effect on Patient Satisfaction and Behavioural Intentions in Corporate Hospitals in India.” International Journal of Pharmaceutical and Healthcare Marketing 10 (1): 48–74.
  • Kaium, M. A., Y. Bao, M. Z. Alam, and M. R. Hoque. 2020. “Understanding Continuance Usage Intention of mHealth in a Developing Country.” International Journal of Pharmaceutical and Healthcare Marketing 14 (2): 251–272.
  • Kashyap, R. (2020). Applications of Wireless Sensor Networks in Healthcare IoT and WSN Applications for Modern Agricultural Advancements: Emerging Research and Opportunities (pp. 8–40): IGI Global.
  • Kayyali, R., A. Peletidi, M. Ismail, Z. Hashim, P. Bandeira, and J. Bonnah. 2017. “Awareness and Use of mHealth Apps: A Study from England.” Pharmacy 5 (2): 33.
  • Kettinger, W. J., and C. C. Lee. 1994. “Perceived Service Quality and User Satisfaction with the Information Services Function.” Decision Sciences 25 (5–6): 737–766.
  • Lankton, N. K., and E. V. Wilson. 2007. “Factors Influencing Expectations of E-health Services within a Direct-effects Model of User Satisfaction.” E-Service Journal 5 (2): 85–112.
  • Lee, Y. 2011. “Understanding Anti-plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective.” Decision Support Systems 50 (2): 361–369.
  • Li, E. Y. 1997. “Perceived Importance of Information System Success Factors: A Meta Analysis of Group Differences.” Information & Management 32 (1): 15–28.
  • Li, Y., H. Wang, Y. Li, and L. Li. 2019. “Patient Assignment Scheduling in a Cloud Healthcare System Based on Petri Net and Greedy-based Heuristic.” Enterprise Information Systems 13 (4): 515–533.
  • Lindell, M. K., and D. J. Whitney. 2001. “Accounting for Common Method Variance in Cross-sectional Research Designs.” Journal of Applied Psychology 86 (1): 114.
  • Maddux, J. E., and R. W. Rogers. 1983. “Protection Motivation and Self-efficacy: A Revised Theory of Fear Appeals and Attitude Change.” Journal of Experimental Social Psychology 19 (5): 469–479.
  • Maillet, É., L. Mathieu, and C. Sicotte. 2015. “Modeling Factors Explaining the Acceptance, Actual Use and Satisfaction of Nurses Using an Electronic Patient Record in Acute Care Settings: An Extension of the UTAUT.” International Journal of Medical Informatics 84 (1): 36–47.
  • Mason, R. O. 1978. “Measuring Information Output: A Communication Systems Approach.” Information & Management 1 (4): 219–234.
  • Mayoka, K. G., A. S. Rwashana, V. W. Mbarika, and S. Isabalija. 2012. “A Framework for Designing Sustainable Telemedicine Information Systems in Developing Countries.” Journal of Systems and Information Technology 14 (3): 200–219.
  • Miller, L. M. S., and R. A. Bell. 2012. “Online Health Information Seeking: The Influence of Age, Information Trustworthiness, and Search Challenges.” Journal of Aging and Health 24 (3): 525–541.
  • Mishra, A. N., C. Anderson, C. M. Angst, and R. Agarwal. 2012. “Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective.” Information Systems Research 23 (3–part–1): 738–760.
  • Moazzami, B., N. Razavi-Khorasani, A. D. Moghadam, E. Farokhi, and N. Rezaei. 2020. “COVID-19 and Telemedicine: Immediate Action Required for Maintaining Healthcare Providers Well-being.” Journal of Clinical Virology 126: 104345.
  • Moriarty, C. M. 2009. Effects of Self-efficacy and Response Efficacy Messages in Health News: Changing Health Attitudes and Behavioral Intentions. USA: University of Illinois at Urbana-Champaign.
  • Nicolaou, A. I., M. Ibrahim, and E. Van Heck. 2013. “Information Quality, Trust, and Risk Perceptions in Electronic Data Exchanges.” Decision Support Systems 54 (2): 986–996.
  • Nysveen, H., and P. E. Pedersen. 2016. “Consumer Adoption of RFID-enabled Services. Applying an Extended UTAUT Model.” Information Systems Frontiers 18 (2): 293–314.
  • Pai, R. R., and S. Alathur. 2019. “Assessing Awareness and Use of Mobile Phone Technology for Health and Wellness: Insights from India.” Health Policy and Technology 8 (3): 221–227.
  • Pitt, L. F., R. T. Watson, and C. B. Kavan. 1995. “Service Quality: A Measure of Information Systems Effectiveness.” MIS Quarterly 19 (2): 173–187.
  • Pratono, A. H., and A. Maharani. 2018. “Long-term Care in Indonesia: The Role of Integrated Service Post for Elderly.” Journal of Aging and Health 30 (10): 1556–1573.
  • Quest, H. (2020). COVID-19 Frequently Asked Questions, 2020, https://patients.healthquest.org/novel-coronavirus-covid-19-update-2-2/nuvance-health-community-events-and-volunteersd-for-covid-19-2-2/
  • Rahi, S. 2017. Structural Equation Modeling Using SmartPLS. USA: CreateSpace Independent Publishing Platform.
  • Rahi, S., and M. Abd. Ghani. 2019. “Integration of Expectation Confirmation Theory and Self-determination Theory in Internet Banking Continuance Intention.” Journal of Science and Technology Policy Management. doi:10.1108/JSTPM-06-2018-0057.
  • Rahi, S., M. Abd.Ghani, and A. Hafaz Ngah. 2019. “Integration of Unified Theory of Acceptance and Use of Technology in Internet Banking Adoption Setting: Evidence from Pakistan.” Technology in Society 58: 101120. doi:10.1016/j.techsoc.2019.03.003.
  • Rahi, S., M. Othman Mansour Majeed, M. Alghizzawi, and M. Alnaser Feras. 2019. “Integration of UTAUT Model in Internet Banking Adoption Context: The Mediating Role of Performance Expectancy and Effort Expectancy.” Journal of Research in Interactive Marketing 13 (3): 411–435. doi:10.1108/jrim-02-2018-0032.
  • Rahi, S., M. M. Khan, and M. Alghizzawi. 2020. “Extension of Technology Continuance Theory (TCT) with Task Technology Fit (TTF) in the Context of Internet Banking User Continuance Intention.” International Journal of Quality & Reliability Management. doi:10.1108/IJQRM-03-2020-0074.
  • Ringle, C. M., S. Wende, and J.-M. Becker. 2015. SmartPLS 3. Boenningstedt: SmartPLS GmbH.
  • Rogers, R. W. 1975. “A Protection Motivation Theory of Fear Appeals and Attitude Change1.” The Journal of Psychology 91 (1): 93–114.
  • Ryu, S. 2012. “Telemedicine: Opportunities and Developments in Member States: Report on the Second Global Survey on eHealth 2009 (Global Observatory for eHealth Series, Volume 2).” Healthcare Informatics Research 18 (2): 153–155.
  • Seethamraju, R., K. S. Diatha, and S. Garg. 2018. “Intention to Use a Mobile-based Information Technology Solution for Tuberculosis Treatment Monitoring–applying a UTAUT Model.” Information Systems Frontiers 20 (1): 163–181.
  • Shannon, C., and W. Weaver. 1949. The Mathematics Theory of Communication. Urbana, Ill: Univ. Illinois Press.
  • Sun, Y., N. Wang, X. Guo, and Z. Peng. 2013. “Understanding the Acceptance of Mobile Health Services: A Comparison and Integration of Alternative Models.” Journal of Electronic Commerce Research 14 (2): 183.
  • Tang, V., K. L. Choy, G. T. Ho, H. Y. Lam, and Y. P. Tsang. 2019. “An IoMT-based Geriatric Care Management System for Achieving Smart Health in Nursing Homes.” Industrial Management & Data Systems 119 (8): 1819–1840.
  • Tsiouris, K. M., D. Gatsios, V. Tsakanikas, A. A. Pardalis, I. Kouris, T. Androutsou, … F. Mostajeran. 2020. “Designing Interoperable Telehealth Platforms: Bridging IoT Devices with Cloud Infrastructures.” Enterprise Information Systems 14 (8): 1–25.
  • Van Dyk, L. 2013. The Development of a Telemedicine Service Maturity Model. Stellenbosch: Stellenbosch University.
  • Venkatesh, V., J. Y. Thong, and X. Xu (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology.
  • Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis. 2003. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly 27 (3): 425–478.
  • Wang, X., L. White, X. Chen, Y. Gao, H. Li, and Y. Luo. 2015. “An Empirical Study of Wearable Technology Acceptance in Healthcare.” Industrial Management & Data Systems  115 (9): 1704–1723.
  • Weinstein, N. D. 1993. “Testing Four Competing Theories of Health-protective Behavior.” Health Psychology 12 (4): 324.
  • West, D. M. 2015. “Using Mobile Technology to Improve Maternal Health and Fight Ebola: A Case Study of Mobile Innovation in Nigeria.” Center for Technological Innovation at Brookings 19: 308–312.
  • Wu, L., J.-Y. Li, and C.-Y. Fu. 2011. “The Adoption of Mobile Healthcare by Hospital’s Professionals: An Integrative Perspective.” Decision Support Systems 51 (3): 587–596.
  • Xu, B., L. Xu, H. Cai, L. Jiang, Y. Luo, and Y. Gu. 2017. “The Design of an m-Health Monitoring System Based on a Cloud Computing Platform.” Enterprise Information Systems 11 (1): 17–36.
  • Yeşilyurt, E., A. H. Ulaş, and D. Akan. 2016. “Teacher Self-efficacy, Academic Self-efficacy, and Computer Self-efficacy as Predictors of Attitude toward Applying Computer-supported Education.” Computers in Human Behavior 64: 591–601.
  • Zhang, L., and W. C. McDowell. 2009. “Am I Really at Risk? Determinants of Online Users’ Intentions to Use Strong Passwords.” Journal of Internet Commerce 8 (3–4): 180–197.
  • Zhang, X., S. Liu, L. Wang, Y. Zhang, and J. Wang. 2019. “Mobile Health Service Adoption in China: Integration of Theory of Planned Behavior, Protection Motivation Theory and Personal Health Differences.” Online Information Review 44 (1): 1–23. doi:10.1108/oir-11-2016-0339.
  • Zhang, X., S. Liu, X. Chen, L. Wang, B. Gao, and Q. Zhu. 2018. “Health Information Privacy Concerns, Antecedents, and Information Disclosure Intention in Online Health Communities.” Information & Management 55 (4): 482–493.
  • Zhou, T., and H. Li. 2014. “Understanding Mobile SNS Continuance Usage in China from the Perspectives of Social Influence and Privacy Concern.” Computers in Human Behavior 37: 283–289.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.