How does IT identity affect individuals' use behaviors associated with personal health devices (PHDs)? An empirical study
暂无分享,去创建一个
[1] R. Gurrea,et al. The role played by perceived usability, satisfaction and consumer trust on website loyalty , 2006, Inf. Manag..
[2] Jason Bennett Thatcher,et al. The IT Identity Threat: A Conceptual Definition and Operational Measure , 2019, J. Manag. Inf. Syst..
[3] Jeanette Van Akkeren,et al. An epidemic of pain in an Australian radiology practice , 2007, Eur. J. Inf. Syst..
[4] Rosío Alvarez,et al. Examining technology, structure and identity during an Enterprise System implementation , 2008, Inf. Syst. J..
[5] Nili Steinfeld,et al. "I agree to the terms and conditions": (How) do users read privacy policies online? An eye-tracking experiment , 2016, Comput. Hum. Behav..
[6] Richard Baskerville,et al. Managing culture creep: Toward a strategic model of user IT culture , 2010, J. Strateg. Inf. Syst..
[7] Joel J. P. C. Rodrigues,et al. Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.
[8] Laku Chidambaram,et al. How Much Bandwidth Is Enough? A Longitudinal Examination of Media Characteristics and Group Outcomes , 1999, MIS Q..
[9] Sean A. Munson,et al. Understanding pivotal experiences in behavior change for the design of technologies for personal wellbeing , 2018, J. Biomed. Informatics.
[10] David F. Midgley,et al. Formative versus reflective measurement models: two applications of formative measurement | NOVA. The University of Newcastle's Digital Repository , 2008 .
[11] Siddharth Suri,et al. Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.
[12] Michael J. Shaw,et al. Task-technology fit for mobile information systems , 2010, J. Inf. Technol..
[13] J. E. Stets,et al. Bringing Identity Theory into Environmental Sociology* , 2003 .
[14] Richard P. Bagozzi,et al. The Role of Signaling Identity in the Adoption of Personal Technologies , 2014, J. Assoc. Inf. Syst..
[15] Zoonky Lee,et al. Social influence on technology acceptance behavior: self-identity theory perspective , 2006, DATB.
[16] Robert Ho,et al. Handbook of Univariate and Multivariate Data Analysis and Interpretation with SPSS , 2006 .
[17] Ronald E. Rice,et al. Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.
[18] Carsten Sørensen,et al. Organisational usability of mobile computing - Volatility and control in mobile foreign exchange trading , 2008, Int. J. Hum. Comput. Stud..
[19] Borka Jerman-Blazic,et al. User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study , 2016, Telematics Informatics.
[20] Theodoros Kargidis,et al. A readiness assessment tool for GDPR compliance certification , 2019, Computer Fraud & Security.
[21] P. Burke,et al. Identity theory and social identity theory , 2000 .
[22] David C. Yen,et al. The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..
[23] Margaret Morrison,et al. Coming of age with the internet , 2006, New Media Soc..
[24] Robert E. Kraut,et al. Building Member Attachment in Online Communities: Applying Theories of Group Identity and Interpersonal Bonds , 2012, MIS Q..
[25] Elizabeth M. Poposki,et al. Detecting and Deterring Insufficient Effort Responding to Surveys , 2012 .
[26] Felix B. Tan,et al. A Study of Web-Designers' Criteria for Effective Business-to-Consumer (B2c) Websites Using the Repertory Grid Technique , 2009 .
[27] Lin Yan,et al. Writing to the unknown: bloggers and the presence of backpackers , 2011, Inf. Technol. People.
[28] Swann. Self-Verification Theory , 2012 .
[29] Stephen G. West,et al. Structural equation models with non-normal variables: Problems and remedies , 1995 .
[30] Abdul Boztas,et al. The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? , 2019, Digit. Investig..
[31] Henry C. Lucas,et al. Technology Use and Performance: A Field Study of Broker Workstations* , 1999 .
[32] Stacie Petter,et al. "Haters Gonna Hate": PLS and Information Systems Research , 2018, Data Base.
[33] Sonja Utz,et al. The function of self-disclosure on social network sites: Not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection , 2015, Comput. Hum. Behav..
[34] Wynne W. Chin,et al. Looking Forward: Toward an Understanding of the Nature and Definition of IT Acceptance , 2007, J. Assoc. Inf. Syst..
[35] Esma Aïmeur,et al. When changing the look of privacy policies affects user trust: An experimental study , 2016, Comput. Hum. Behav..
[36] H. Winklhofer,et al. Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .
[37] Jignya Patel,et al. Exploring the Formation of IT Identity: A Technology-Value Fit Model , 2019, AMCIS.
[38] Harminder Singh,et al. Understanding the effect of e-learning on individual performance: The role of digital literacy , 2015, Comput. Educ..
[39] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[40] Arun Rai,et al. Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis , 2002, Inf. Syst. Res..
[41] Justin M. Berg,et al. in Cyberspace : How Boundary Work in Online Social Networks Impacts Professional Relationships , 2013 .
[42] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .
[43] Tseng-Lung Huang. Psychological mechanisms of brand love and information technology identity in virtual retail environments , 2019, Journal of Retailing and Consumer Services.
[44] Ritu Agarwal,et al. The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..
[45] Pouyan Esmaeilzadeh,et al. Healthcare consumers' opt-in intentions to Health Information Exchanges (HIEs): An empirical study , 2018, Comput. Hum. Behav..
[46] Gavriel Salvendy,et al. The relation between usability and product success in cell phones , 2012, Behav. Inf. Technol..
[47] Ritu Agarwal,et al. Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..
[48] A. Aron,et al. Self-expansion motivation and including other in the self. , 1997 .
[49] Mercy Mpinganjira,et al. Precursors of trust in virtual health communities: A hierarchical investigation , 2018, Inf. Manag..
[50] Laura G. E. Smith,et al. "We must be the change we want to see in the world": integrating norms and identities through social interaction , 2015 .
[51] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[52] Siew Fan Wong,et al. Compliance to personal data protection principles: A study of how organizations frame privacy policy notices , 2017, Telematics Informatics.
[53] Michael Schwartz,et al. Wearables and the Internet of Things for Health: Wearable, Interconnected Devices Promise More Efficient and Comprehensive Health Care , 2016, IEEE Pulse.
[54] Joseph S. Valacich,et al. Online Impulse Buying: Understanding the Interplay between Consumer Impulsiveness and Website Quality , 2011, J. Assoc. Inf. Syst..
[55] Jengchung V. Chen,et al. Information privacy policies: The effects of policy characteristics and online experience , 2015, Comput. Stand. Interfaces.
[56] Judith Gebauer,et al. User requirements of mobile technology: results from a content analysis of user reviews , 2008, Inf. Syst. E Bus. Manag..
[57] Rajiv Sabherwal,et al. How reliable are self-assessments using mobile technology in healthcare? The effects of technology identity and self-efficacy , 2019, Comput. Hum. Behav..
[58] Yongsheng Ma,et al. Design of a feature-based order acceptance and scheduling module in an ERP system , 2014, Comput. Ind..
[59] Nick Bontis,et al. Family and work-related consequences of addiction to organizational pervasive technologies , 2011, Inf. Manag..
[60] Wanda J. Orlikowski,et al. Performing catharsis: The use of online discussion forums in organizational change , 2008, Inf. Organ..
[61] Koen Luyckx,et al. Introduction: Toward an Integrative View of Identity , 2011 .
[62] Izak Benbasat,et al. Addressing the What and How of Online Services: Positioning Supporting-Services Functionality and Service Quality for Business-to-Consumer Success , 2008, Inf. Syst. Res..
[63] J. Christopher Westland,et al. Lower bounds on sample size in structural equation modeling , 2010, Electron. Commer. Res. Appl..
[64] Qing Zhu,et al. Health information privacy concerns, antecedents, and information disclosure intention in online health communities , 2017, Inf. Manag..
[65] Ritu Agarwal,et al. Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective , 2012, Inf. Syst. Res..
[66] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[67] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[68] Na Liu,et al. Understanding the Influence of Social Identity on Social Support Seeking Behaviors in Virtual Healthcare Community , 2010, ICIS.
[69] Yong-Chan Kim,et al. Ethnicity, place, and communication technology: Effects of ethnicity on multi-dimensional internet connectedness , 2007, Inf. Technol. People.
[70] Viswanath Venkatesh,et al. Mobile Application Usability: Conceptualization and Instrument Development , 2015, MIS Q..
[71] Allen Newell,et al. The psychology of human-computer interaction , 1983 .
[72] J. Hirsh,et al. Mechanisms of Identity Conflict , 2016, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[73] Rich Ling,et al. From ubicomp to ubiex(pectations) , 2014, Telematics Informatics.
[74] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[75] Greta L. Polites,et al. The Optimal Experience: Social Identity and IT Identity as Antecedents of Group Flow in Social Media Use , 2020, HICSS.
[76] Ute Hillmer. Technology Acceptance in Mechatronics: The Influence of Identity on Technology Acceptance , 2009 .
[77] Dongsong Zhang,et al. The Effects of Tree-View Based Presentation Adaptation on Model Web Browsing , 2011, MIS Q..
[78] Eric T. G. Wang,et al. Building Community Citizenship Behaviors: The Relative Role of Attachment and Satisfaction , 2015, J. Assoc. Inf. Syst..
[79] Robin L. Wakefield,et al. Dare to Be Green: The Role of Environmental Passion and Green IT Identity on Green IT Practices , 2019, AMCIS.
[80] Ping Zhang,et al. Technical opinionMotivational affordances , 2008 .
[81] Pei-Luen Patrick Rau,et al. The acceptance of personal health devices among patients with chronic conditions , 2015, Int. J. Medical Informatics.
[82] Roberta Lamb,et al. Information and Communication Technology Challenges to Scientific Professional Identity , 2005, Inf. Soc..
[83] Ignacio Siles,et al. Web Technologies of the Self: The Arising of the "Blogger" Identity , 2012, J. Comput. Mediat. Commun..
[84] Hermie Hermens,et al. Usability in telemedicine systems - A literature survey , 2016, Int. J. Medical Informatics.
[85] Liette Lapointe,et al. Enhanced Use of IT: A New Perspective on Post-Adoption , 2014, J. Assoc. Inf. Syst..
[86] P. Krebs,et al. Health App Use Among US Mobile Phone Owners: A National Survey , 2015, JMIR mHealth and uHealth.
[87] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[88] B. Muthén,et al. How to Use a Monte Carlo Study to Decide on Sample Size and Determine Power , 2002 .
[89] M. Seligman,et al. Learned helplessness in humans: critique and reformulation. , 1978, Journal of abnormal psychology.
[90] Neena Sinha,et al. Determining factors in the adoption and recommendation of mobile wallet services in India: Analysis of the effect of innovativeness, stress to use and social influence , 2020, Int. J. Inf. Manag..
[91] B. Byrne,et al. Structural Equation Modeling: Perspectives on the Present and the Future , 2001 .
[92] Philippa Clarke,et al. What features of the built environment matter most for mobility? Using wearable sensors to capture real-time outdoor environment demand on gait performance. , 2019, Gait & posture.
[93] Jin Ha Lee,et al. The I in Team: IT Identity and Project Behavior , 2019, AMCIS.
[94] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[95] George J. McCall,et al. The Me and the Not-Me , 2003 .
[96] Vaishali Patel,et al. Public attitudes toward health information exchange: perceived benefits and concerns. , 2011, The American journal of managed care.
[97] Judith C. Simon,et al. The Iterative Effect of IT Identity on Employee Cybersecurity Compliance Behaviors , 2017, AMCIS.
[98] Kai Wang,et al. Determinants of mobile value-added service continuance: The mediating role of service experience , 2015, Inf. Manag..
[99] Ping Yu,et al. Using diffusion of innovation theory to understand the factors impacting patient acceptance and use of consumer e-health innovations: a case study in a primary care clinic , 2015, BMC Health Services Research.
[100] S. Michie,et al. Behavior Change Techniques in Popular Alcohol Reduction Apps: Content Analysis , 2015, Journal of medical Internet research.
[101] J. Eccles. Who Am I and What Am I Going to Do With My Life? Personal and Collective Identities as Motivators of Action , 2009 .
[102] B. Crisp. Belonging, connectedness and social exclusion , 2010 .
[103] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[104] Anne Holbrook,et al. Views on health information sharing and privacy from primary care practices using electronic medical records , 2011, Int. J. Medical Informatics.
[105] Tian-chao Guo,et al. The formation of social identity and self-identity based on knowledge contribution in virtual communities: An inductive route model , 2015, Comput. Hum. Behav..
[106] Elizabeth Murray,et al. Using digital interventions for self-management of chronic physical health conditions: A meta-ethnography review of published studies. , 2017, Patient education and counseling.
[107] Soumya Ray,et al. The Central Role of Engagement in Online Communities , 2014, Inf. Syst. Res..
[108] Kristi Yuthas,et al. The blockchain and how it can influence conceptions of the self , 2020 .
[109] Varol O. Kayhan,et al. The nature, dimensionality, and effects of perceptions of community governance , 2015, Inf. Manag..
[110] Jisook An,et al. Effects of Health Status and Health Behaviors on Depression Among Married Female Immigrants in South Korea. , 2015, Asian nursing research.
[111] Debra Mashek,et al. The Self-Expansion Model of Motivation and Cognition in Close Relationships , 2013 .
[112] Brad A. Myers,et al. The performance of hand postures in front- and back-of-device interaction for mobile computing , 2008, Int. J. Hum. Comput. Stud..
[113] Jane Vincent,et al. Emotional attachment and mobile phones , 2005, Thumb Culture.
[114] Rajiv Sabherwal,et al. Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps , 2019, Int. J. Inf. Manag..
[115] Tina Blegind Jensen,et al. Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons , 2007 .
[116] Yogesh Kumar Dwivedi,et al. An empirical validation of a unified model of electronic government adoption (UMEGA) , 2017, Gov. Inf. Q..
[117] Eileen M. Trauth,et al. Odd girl out: an individual differences perspective on women in the IT profession , 2002, Inf. Technol. People.
[118] P. Burke,et al. A sociological approach to self and identity , 2003 .
[119] Deborah Compeau,et al. Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..
[120] Angappa Gunasekaran,et al. A review for mobile commerce research and applications , 2007, Decis. Support Syst..
[121] Michael Boyer O'Leary,et al. Beyond Being There: The Symbolic Role of Communication and Identification in Perceptions of Proximity to Geographically Dispersed Colleagues , 2014, MIS Q..
[122] Annemette Kjærgaard,et al. Who do you think you are? A review of the complex interplay between information systems, identification and identity , 2014, Eur. J. Inf. Syst..
[123] Thompson S. H. Teo,et al. Product attributes and brand equity in the mobile domain: The mediating role of customer experience , 2012, Int. J. Inf. Manag..
[124] S. Walsh,et al. Needing to connect: The effect of self and others on young people's involvement with their mobile phones , 2010 .
[125] Marie-Claude Boudreau,et al. IT-driven identity work: Creating a group identity in a digital environment , 2014, Inf. Organ..
[126] Gregory N. Connolly,et al. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers , 2014, J. Am. Medical Informatics Assoc..
[127] Blake Ives,et al. IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.
[128] Suprateek Sarker,et al. Understanding Virtual Team Development: An Interpretive Study , 2003, J. Assoc. Inf. Syst..
[129] Kalle Lyytinen. HCI Research: Future Directions that Matter , 2010 .
[130] Jason Bennett Thatcher,et al. Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity , 2013 .
[131] Albert H. Segars,et al. Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .
[132] Cheryl Tatano Beck,et al. The content validity index: are you sure you know what's being reported? Critique and recommendations. , 2006, Research in nursing & health.
[133] Michelle Carter,et al. IT Identity: Developing Valid Measures through CFA-Based MTMM Analysis , 2013, ICIS.
[134] Poul Houman Andersen,et al. Emotions, trust and relationship development in business relationships: A conceptual model for buyer–seller dyads , 2006 .
[135] Robert C. Nickerson,et al. Whither Wireless? Future Directions in Mobility , 2008, Commun. Assoc. Inf. Syst..
[136] Antonio Carlos Gastaud Maçada,et al. The Influence of Social Media filter bubbles and echo Chambers on IT Identity Construction , 2019, ECIS.
[137] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[138] Clifford Nass,et al. Etiquette equality: exhibitions and expectations of computer politeness , 2004, CACM.
[139] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[140] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[141] Thomas F. Stafford,et al. Perceived critical mass and the adoption of a communication technology , 2007, Eur. J. Inf. Syst..
[142] Rajeev Sharma,et al. Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .
[143] Alicia D. Cast,et al. A Theory of Self-Esteem , 2002 .
[144] L. Piwek,et al. The Rise of Consumer Health Wearables: Promises and Barriers , 2016, PLoS medicine.
[145] Dianne Cyr,et al. Design aesthetics leading to m-loyalty in mobile commerce , 2006, Inf. Manag..
[146] Varun Grover,et al. Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications , 2015, MIS Q..
[147] Lorrie Faith Cranor,et al. Timing is everything?: the effects of timing and placement of online privacy indicators , 2009, CHI.
[148] Pamela Tierney,et al. Employee Creativity in Taiwan: An Application of Role Identity Theory , 2003 .
[149] M. Hogg,et al. Book Review: Social identifications: A social psychology of intergroup relations and group processes , 1991 .
[150] Viswanath Venkatesh,et al. Changes in Employees' Job Characteristics During an Enterprise System Implementation: A Latent Growth Modeling Perspective , 2013, MIS Q..
[151] Hangjung Zo,et al. User acceptance of location-based social networking services: An extended perspective of perceived value , 2013, Online Inf. Rev..
[152] Yunan Chen,et al. Privacy management in dynamic groups: understanding information privacy in medical practices , 2013, CSCW.
[153] Brian C. Drolet,et al. Pagers, Smartphones, and HIPAA: Finding the Best Solution for Electronic Communication of Protected Health Information , 2017, Journal of Medical Systems.
[154] Thomas Franke,et al. Abandonment of personal quantification: A review and empirical study investigating reasons for wearable activity tracking attrition , 2020, Comput. Hum. Behav..
[155] Yuanxiang Li,et al. Online Privacy Policy of the Thirty Dow Jones Corporations: Compliance with FTC Fair Information Practice Principles and Readability Assessment , 2012 .
[156] Rex B. Kline,et al. Principles and Practice of Structural Equation Modeling , 1998 .
[157] Elaine Byrne,et al. The role of identity in health information systems development: A case analysis from Mozambique , 2005 .
[158] Trisha T. C. Lin,et al. Sociable people beware? Investigating smartphone versus nonsmartphone dependency symptoms among young Singaporeans , 2015 .
[159] Sejung Marina Choi,et al. Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .
[160] Alexander Richter,et al. Malleable End-User Software , 2013, Bus. Inf. Syst. Eng..
[161] Clare Linda Sullivan,et al. EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era , 2019, Comput. Law Secur. Rev..
[162] Ricardo Gomez,et al. Facebook's "Free Basics" and Implications for Development: IT Identity and Social Capital , 2017, HICSS.
[163] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .