2,268
Views
115
CrossRef citations to date
0
Altmetric
Articles

User acceptance of mobile health services from users’ perspectives: The role of self-efficacy and response-efficacy in technology acceptance

, , , , &

References

  • Istepanian RSH, Lacal JC, editors. Emerging mobile communication technologies for health: Some imperative notes on m-health2003: IEEE.
  • Guo X, Han X, Zhang X, Dang Y, Chen C. Investigating m-Health acceptance from a protection motivation theory perspective: Gender and age differences. Telemedicine and E-Health. 2015.
  • Akter S, D’Ambra J, Ray P. Development and validation of an instrument to measure user perceived service quality of mHealth. Information and Management 2013;50(4):181–95.
  • Zhang X, Guo X, Lai K-h, Guo F, Li C. Understanding gender differences in m-health adoption: A modified theory of reasoned action model. Telemedicine and E-Health 2014;20(1):39–46.
  • Bhattacherjee A, Hikmet N. Physicians’ resistance toward healthcare information technology: A theoretical model and empirical test. European Journal of Information Systems 2007;16(6):725–37.
  • Venkatesh V, Morris MG, Davis GB, Davis FD. User acceptance of information technology: Toward a unified view. MIS Quarterly 2003;27(3):425–78.
  • Adams DA, Nelson RR, Todd PA. Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly 1992:227–47:0276–7783.
  • Venkatesh V, Morris MG, Davis GB, Davis FD. User acceptance of information technology: Toward a unified view. MIS Quarterly 2003;27(3):0276–7783.
  • Yu C-S. Factors affecting individuals to adopt mobile banking: Empirical evidence from the UTAUT model. Journal of Electronic Commerce Research 2012;13(2):104–21.
  • Saadé R, Bahli B. The impact of cognitive absorption on perceived usefulness and perceived ease of use in on-line learning: An extension of the technology acceptance model. Information and Management 2005;42(2):317–27.
  • Park I, Sharman R, Rao HR. Disaster experience and hospital information systems: An examination of perceived information assurance, risk, resilience, and his usefulness. Journal of Consumer Research 2015;12(4):382–405.
  • Quinn CC, Khokhar B, Weed K, Barr E, Gruber-Baldini AL. Older adult self-efficacy study of mobile phone diabetes management. Diabetes Technology and Therapeutics 2015;17(7):455–461.
  • Nour MM, Chen J, Allman-Farinelli M. Efficacy and external validity of electronic and mobile phone-based interventions promoting vegetable intake in young adults: A systematic review protocol. JMIR Research Protocols 2015;4(3):e92.
  • Brown-Connolly NE, Concha JB, English J. Mobile health is worth it! Economic benefit and impact on health of a population-based mobile screening program in New Mexico. Telemedicine and E-Health 2014;20(1):1530–5627.
  • Akter S, D’Ambra J, Ray P. Service quality of mHealth platforms: Development and validation of a hierarchical model using PLS. Electronic Markets 2010;20(3–4):209–27.
  • Hung M-C, Jen W-Y. The adoption of mobile health management services: An empirical study. Journal of Medical Systems 2012;36(3):1381–8:0148–5598.
  • Wu J-H, Wang S-C, Lin L-M. Mobile computing acceptance factors in the healthcare industry: A structural equation model. International Journal of Medical Informatics 2007;76(1):66–77.
  • Johnston AC, Warkentin M. Fear appeals and information security behaviors: An empirical study. MIS Quarterly 2010;34(3):0276–7783.
  • Guo X, Zhang X, Sun Y. The privacy–personalization paradox in mHealth services acceptance of different age groups. Electronic Commerce Research and Applications 2016;16(2):55–65.
  • Venkatesh V. Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research 2000;11(4):342–65.
  • Ajzen I, Fishbein M. Understanding attitudes and predicting social behaviour. Engewood Cliffs: Prentice-Hall; 1980.
  • Kapoor K, Dwivedi Y, C. Piercy N, Lal B, Weerakkody V. RFID integrated systems in libraries: Extending TAM model for empirically examining the use. Journal of Enterprise Information Management 2014;27(6):731–58.
  • Chau PY, Hu PJH. Information technology acceptance by individual professionals: A model comparison approach*. Decision Sciences 2001;32(4):699–719.
  • Gentry L, Calantone R. A comparison of three models to explain shop‐bot use on the web. Psychology and Marketing. 2002;19(11):945–56.
  • Fishbein M, Ajzen I. Belief, attitude, intention and behaviour: An introduction to theory and research. Reading, MA: Addison-Wesley; 1975.
  • Davis FD. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. 1989:319–40.
  • Bandura A. Self-efficacy mechanism in human agency. American Psychologist. 1982;37(2):122.
  • Bandura A. Social foundations of thought and action. Englewood Cliffs, NJ: Prentice Hall; 1986.
  • Compeau DR, Higgins CA. Computer self-efficacy: Development of a measure and initial test. MIS Quarterly 1995;19(2):189–211.
  • Huang Y-C, Tsay W-D, Huang C-H, Lin Y-H, Lai M-C, editors. The influence factors of electronic bill presentment and payment—A case study of mobile phone bill2011: IEEE.
  • Agarwal R, Sambamurthy V, Stair RM. Research report: The evolving relationship between general and specific computer self-efficacy—an empirical assessment. Information Systems Research 2000;11(4):418–30.
  • Rogers RW. A protection motivation theory of fear appeals and attitude change. The Journal of Psychology 1975;91(1):93–114.
  • Witte K. Putting the fear back into fear appeals: The extended parallel process model. Communications Monographs 1992;59(4):329–49.
  • Anderson CL, Agarwal R. Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly 2010;34(3):613–43.
  • Yoon C, Kim H. Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology and People 2013;26(4):401–19.
  • Davis FD. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 1989;13(3):319–39.
  • Davis FD, Bagozzi RP, Warshaw PR. User acceptance of computer technology: A comparison of two theoretical models. Management Science 1989;35(8):982–1003.
  • Wilson EV, Lankton NK. Modeling patients’ acceptance of provider-delivered e-health. Journal of the American Medical Informatics Association. 2004;11(4):241.
  • Yu P, Li H, Gagnon M-P. Health IT acceptance factors in long-term care facilities: A cross-sectional survey. International Journal of Medical Informatics 2009;78(4):219–29.
  • Schwarzer R, Antoniuk A, Gholami M. A brief intervention changing oral self-care, self-efficacy, and self-monitoring. British Journal of Health Psychology 2015;20(1):56–67.
  • Johnston AC, Warkentin M. Fear appeals and information security behaviors: An empirical study. Management Information Systems Quarterly 2010;34(3):549–66.
  • Gefen D, Straub DW, Boudreau MC. Structural equation modeling and regression: Guidelines for research practice. Communications of AIS 2000;7(7):1–78.
  • Fornell C, Larcker DF. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research (JMR). 1981;18(1):39–50.
  • Chin WW. The partial least squares approach to structural equation modeling. Modern Methods for Business Research 1998;295(2):295–336.
  • Fornell C, Larcker DF. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 1981;18(1):39–50.
  • Okazaki S, Blas SS, Castañeda JA. Physicians’ adoption of mobile health monitoring systems in Spain: Competing models and impact of prior experience. Journal of Electronic Commerce Research 2015;16(3):194.
  • Ng S-N, Matanjun D, D’Souza U, Alfred R. Understanding pharmacists’ intention to use medical apps. Electronic Journal of Health Informatics 2015;9(1):e7.
  • Hanus B, Wu YA. Impact of users’ security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management. 2016; Forthcoming.
  • Vance A, Siponen M, Pahnila S. Motivating IS security compliance: Insights from habit and protection motivation theory. Information and Management 2012;49(3):190–8.
  • Larsen AL, McArdle JJ, Robertson T, Dunton GF. Nutrition self-efficacy is unidirectionally related to outcome expectations in children. Appetite 2015;84:166–70.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.