How does IT identity affect individuals' use behaviors associated with personal health devices (PHDs)? An empirical study

Abstract This study investigates the effects of information technology (IT) identity on the use of personal health devices (PHDs). We conducted an online survey of individuals who used a PHD to achieve a health-related goal. The results confirm that IT identity is a multidimensional construct with three reflective dimensions. The results exhibit that the identity verification process (IT characterizes through IT experience) fosters IT identity, which, in turn, encourages individuals to engage in beneficial post-adoption behaviors such as feature use and enhanced use. The findings also reveal that perceived health status moderates the relationship between IT identity and positive use behaviors.

[1]  R. Gurrea,et al.  The role played by perceived usability, satisfaction and consumer trust on website loyalty , 2006, Inf. Manag..

[2]  Jason Bennett Thatcher,et al.  The IT Identity Threat: A Conceptual Definition and Operational Measure , 2019, J. Manag. Inf. Syst..

[3]  Jeanette Van Akkeren,et al.  An epidemic of pain in an Australian radiology practice , 2007, Eur. J. Inf. Syst..

[4]  Rosío Alvarez,et al.  Examining technology, structure and identity during an Enterprise System implementation , 2008, Inf. Syst. J..

[5]  Nili Steinfeld,et al.  "I agree to the terms and conditions": (How) do users read privacy policies online? An eye-tracking experiment , 2016, Comput. Hum. Behav..

[6]  Richard Baskerville,et al.  Managing culture creep: Toward a strategic model of user IT culture , 2010, J. Strateg. Inf. Syst..

[7]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[8]  Laku Chidambaram,et al.  How Much Bandwidth Is Enough? A Longitudinal Examination of Media Characteristics and Group Outcomes , 1999, MIS Q..

[9]  Sean A. Munson,et al.  Understanding pivotal experiences in behavior change for the design of technologies for personal wellbeing , 2018, J. Biomed. Informatics.

[10]  David F. Midgley,et al.  Formative versus reflective measurement models: two applications of formative measurement | NOVA. The University of Newcastle's Digital Repository , 2008 .

[11]  Siddharth Suri,et al.  Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.

[12]  Michael J. Shaw,et al.  Task-technology fit for mobile information systems , 2010, J. Inf. Technol..

[13]  J. E. Stets,et al.  Bringing Identity Theory into Environmental Sociology* , 2003 .

[14]  Richard P. Bagozzi,et al.  The Role of Signaling Identity in the Adoption of Personal Technologies , 2014, J. Assoc. Inf. Syst..

[15]  Zoonky Lee,et al.  Social influence on technology acceptance behavior: self-identity theory perspective , 2006, DATB.

[16]  Robert Ho,et al.  Handbook of Univariate and Multivariate Data Analysis and Interpretation with SPSS , 2006 .

[17]  Ronald E. Rice,et al.  Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.

[18]  Carsten Sørensen,et al.  Organisational usability of mobile computing - Volatility and control in mobile foreign exchange trading , 2008, Int. J. Hum. Comput. Stud..

[19]  Borka Jerman-Blazic,et al.  User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study , 2016, Telematics Informatics.

[20]  Theodoros Kargidis,et al.  A readiness assessment tool for GDPR compliance certification , 2019, Computer Fraud & Security.

[21]  P. Burke,et al.  Identity theory and social identity theory , 2000 .

[22]  David C. Yen,et al.  The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..

[23]  Margaret Morrison,et al.  Coming of age with the internet , 2006, New Media Soc..

[24]  Robert E. Kraut,et al.  Building Member Attachment in Online Communities: Applying Theories of Group Identity and Interpersonal Bonds , 2012, MIS Q..

[25]  Elizabeth M. Poposki,et al.  Detecting and Deterring Insufficient Effort Responding to Surveys , 2012 .

[26]  Felix B. Tan,et al.  A Study of Web-Designers' Criteria for Effective Business-to-Consumer (B2c) Websites Using the Repertory Grid Technique , 2009 .

[27]  Lin Yan,et al.  Writing to the unknown: bloggers and the presence of backpackers , 2011, Inf. Technol. People.

[28]  Swann Self-Verification Theory , 2012 .

[29]  Stephen G. West,et al.  Structural equation models with non-normal variables: Problems and remedies , 1995 .

[30]  Abdul Boztas,et al.  The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? , 2019, Digit. Investig..

[31]  Henry C. Lucas,et al.  Technology Use and Performance: A Field Study of Broker Workstations* , 1999 .

[32]  Stacie Petter,et al.  "Haters Gonna Hate": PLS and Information Systems Research , 2018, Data Base.

[33]  Sonja Utz,et al.  The function of self-disclosure on social network sites: Not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection , 2015, Comput. Hum. Behav..

[34]  Wynne W. Chin,et al.  Looking Forward: Toward an Understanding of the Nature and Definition of IT Acceptance , 2007, J. Assoc. Inf. Syst..

[35]  Esma Aïmeur,et al.  When changing the look of privacy policies affects user trust: An experimental study , 2016, Comput. Hum. Behav..

[36]  H. Winklhofer,et al.  Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .

[37]  Jignya Patel,et al.  Exploring the Formation of IT Identity: A Technology-Value Fit Model , 2019, AMCIS.

[38]  Harminder Singh,et al.  Understanding the effect of e-learning on individual performance: The role of digital literacy , 2015, Comput. Educ..

[39]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[40]  Arun Rai,et al.  Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis , 2002, Inf. Syst. Res..

[41]  Justin M. Berg,et al.  in Cyberspace : How Boundary Work in Online Social Networks Impacts Professional Relationships , 2013 .

[42]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[43]  Tseng-Lung Huang Psychological mechanisms of brand love and information technology identity in virtual retail environments , 2019, Journal of Retailing and Consumer Services.

[44]  Ritu Agarwal,et al.  The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..

[45]  Pouyan Esmaeilzadeh,et al.  Healthcare consumers' opt-in intentions to Health Information Exchanges (HIEs): An empirical study , 2018, Comput. Hum. Behav..

[46]  Gavriel Salvendy,et al.  The relation between usability and product success in cell phones , 2012, Behav. Inf. Technol..

[47]  Ritu Agarwal,et al.  Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..

[48]  A. Aron,et al.  Self-expansion motivation and including other in the self. , 1997 .

[49]  Mercy Mpinganjira,et al.  Precursors of trust in virtual health communities: A hierarchical investigation , 2018, Inf. Manag..

[50]  Laura G. E. Smith,et al.  "We must be the change we want to see in the world": integrating norms and identities through social interaction , 2015 .

[51]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[52]  Siew Fan Wong,et al.  Compliance to personal data protection principles: A study of how organizations frame privacy policy notices , 2017, Telematics Informatics.

[53]  Michael Schwartz,et al.  Wearables and the Internet of Things for Health: Wearable, Interconnected Devices Promise More Efficient and Comprehensive Health Care , 2016, IEEE Pulse.

[54]  Joseph S. Valacich,et al.  Online Impulse Buying: Understanding the Interplay between Consumer Impulsiveness and Website Quality , 2011, J. Assoc. Inf. Syst..

[55]  Jengchung V. Chen,et al.  Information privacy policies: The effects of policy characteristics and online experience , 2015, Comput. Stand. Interfaces.

[56]  Judith Gebauer,et al.  User requirements of mobile technology: results from a content analysis of user reviews , 2008, Inf. Syst. E Bus. Manag..

[57]  Rajiv Sabherwal,et al.  How reliable are self-assessments using mobile technology in healthcare? The effects of technology identity and self-efficacy , 2019, Comput. Hum. Behav..

[58]  Yongsheng Ma,et al.  Design of a feature-based order acceptance and scheduling module in an ERP system , 2014, Comput. Ind..

[59]  Nick Bontis,et al.  Family and work-related consequences of addiction to organizational pervasive technologies , 2011, Inf. Manag..

[60]  Wanda J. Orlikowski,et al.  Performing catharsis: The use of online discussion forums in organizational change , 2008, Inf. Organ..

[61]  Koen Luyckx,et al.  Introduction: Toward an Integrative View of Identity , 2011 .

[62]  Izak Benbasat,et al.  Addressing the What and How of Online Services: Positioning Supporting-Services Functionality and Service Quality for Business-to-Consumer Success , 2008, Inf. Syst. Res..

[63]  J. Christopher Westland,et al.  Lower bounds on sample size in structural equation modeling , 2010, Electron. Commer. Res. Appl..

[64]  Qing Zhu,et al.  Health information privacy concerns, antecedents, and information disclosure intention in online health communities , 2017, Inf. Manag..

[65]  Ritu Agarwal,et al.  Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective , 2012, Inf. Syst. Res..

[66]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[67]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[68]  Na Liu,et al.  Understanding the Influence of Social Identity on Social Support Seeking Behaviors in Virtual Healthcare Community , 2010, ICIS.

[69]  Yong-Chan Kim,et al.  Ethnicity, place, and communication technology: Effects of ethnicity on multi-dimensional internet connectedness , 2007, Inf. Technol. People.

[70]  Viswanath Venkatesh,et al.  Mobile Application Usability: Conceptualization and Instrument Development , 2015, MIS Q..

[71]  Allen Newell,et al.  The psychology of human-computer interaction , 1983 .

[72]  J. Hirsh,et al.  Mechanisms of Identity Conflict , 2016, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[73]  Rich Ling,et al.  From ubicomp to ubiex(pectations) , 2014, Telematics Informatics.

[74]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[75]  Greta L. Polites,et al.  The Optimal Experience: Social Identity and IT Identity as Antecedents of Group Flow in Social Media Use , 2020, HICSS.

[76]  Ute Hillmer Technology Acceptance in Mechatronics: The Influence of Identity on Technology Acceptance , 2009 .

[77]  Dongsong Zhang,et al.  The Effects of Tree-View Based Presentation Adaptation on Model Web Browsing , 2011, MIS Q..

[78]  Eric T. G. Wang,et al.  Building Community Citizenship Behaviors: The Relative Role of Attachment and Satisfaction , 2015, J. Assoc. Inf. Syst..

[79]  Robin L. Wakefield,et al.  Dare to Be Green: The Role of Environmental Passion and Green IT Identity on Green IT Practices , 2019, AMCIS.

[80]  Ping Zhang,et al.  Technical opinionMotivational affordances , 2008 .

[81]  Pei-Luen Patrick Rau,et al.  The acceptance of personal health devices among patients with chronic conditions , 2015, Int. J. Medical Informatics.

[82]  Roberta Lamb,et al.  Information and Communication Technology Challenges to Scientific Professional Identity , 2005, Inf. Soc..

[83]  Ignacio Siles,et al.  Web Technologies of the Self: The Arising of the "Blogger" Identity , 2012, J. Comput. Mediat. Commun..

[84]  Hermie Hermens,et al.  Usability in telemedicine systems - A literature survey , 2016, Int. J. Medical Informatics.

[85]  Liette Lapointe,et al.  Enhanced Use of IT: A New Perspective on Post-Adoption , 2014, J. Assoc. Inf. Syst..

[86]  P. Krebs,et al.  Health App Use Among US Mobile Phone Owners: A National Survey , 2015, JMIR mHealth and uHealth.

[87]  Anol Bhattacherjee,et al.  Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..

[88]  B. Muthén,et al.  How to Use a Monte Carlo Study to Decide on Sample Size and Determine Power , 2002 .

[89]  M. Seligman,et al.  Learned helplessness in humans: critique and reformulation. , 1978, Journal of abnormal psychology.

[90]  Neena Sinha,et al.  Determining factors in the adoption and recommendation of mobile wallet services in India: Analysis of the effect of innovativeness, stress to use and social influence , 2020, Int. J. Inf. Manag..

[91]  B. Byrne,et al.  Structural Equation Modeling: Perspectives on the Present and the Future , 2001 .

[92]  Philippa Clarke,et al.  What features of the built environment matter most for mobility? Using wearable sensors to capture real-time outdoor environment demand on gait performance. , 2019, Gait & posture.

[93]  Jin Ha Lee,et al.  The I in Team: IT Identity and Project Behavior , 2019, AMCIS.

[94]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[95]  George J. McCall,et al.  The Me and the Not-Me , 2003 .

[96]  Vaishali Patel,et al.  Public attitudes toward health information exchange: perceived benefits and concerns. , 2011, The American journal of managed care.

[97]  Judith C. Simon,et al.  The Iterative Effect of IT Identity on Employee Cybersecurity Compliance Behaviors , 2017, AMCIS.

[98]  Kai Wang,et al.  Determinants of mobile value-added service continuance: The mediating role of service experience , 2015, Inf. Manag..

[99]  Ping Yu,et al.  Using diffusion of innovation theory to understand the factors impacting patient acceptance and use of consumer e-health innovations: a case study in a primary care clinic , 2015, BMC Health Services Research.

[100]  S. Michie,et al.  Behavior Change Techniques in Popular Alcohol Reduction Apps: Content Analysis , 2015, Journal of medical Internet research.

[101]  J. Eccles Who Am I and What Am I Going to Do With My Life? Personal and Collective Identities as Motivators of Action , 2009 .

[102]  B. Crisp Belonging, connectedness and social exclusion , 2010 .

[103]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[104]  Anne Holbrook,et al.  Views on health information sharing and privacy from primary care practices using electronic medical records , 2011, Int. J. Medical Informatics.

[105]  Tian-chao Guo,et al.  The formation of social identity and self-identity based on knowledge contribution in virtual communities: An inductive route model , 2015, Comput. Hum. Behav..

[106]  Elizabeth Murray,et al.  Using digital interventions for self-management of chronic physical health conditions: A meta-ethnography review of published studies. , 2017, Patient education and counseling.

[107]  Soumya Ray,et al.  The Central Role of Engagement in Online Communities , 2014, Inf. Syst. Res..

[108]  Kristi Yuthas,et al.  The blockchain and how it can influence conceptions of the self , 2020 .

[109]  Varol O. Kayhan,et al.  The nature, dimensionality, and effects of perceptions of community governance , 2015, Inf. Manag..

[110]  Jisook An,et al.  Effects of Health Status and Health Behaviors on Depression Among Married Female Immigrants in South Korea. , 2015, Asian nursing research.

[111]  Debra Mashek,et al.  The Self-Expansion Model of Motivation and Cognition in Close Relationships , 2013 .

[112]  Brad A. Myers,et al.  The performance of hand postures in front- and back-of-device interaction for mobile computing , 2008, Int. J. Hum. Comput. Stud..

[113]  Jane Vincent,et al.  Emotional attachment and mobile phones , 2005, Thumb Culture.

[114]  Rajiv Sabherwal,et al.  Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps , 2019, Int. J. Inf. Manag..

[115]  Tina Blegind Jensen,et al.  Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons , 2007 .

[116]  Yogesh Kumar Dwivedi,et al.  An empirical validation of a unified model of electronic government adoption (UMEGA) , 2017, Gov. Inf. Q..

[117]  Eileen M. Trauth,et al.  Odd girl out: an individual differences perspective on women in the IT profession , 2002, Inf. Technol. People.

[118]  P. Burke,et al.  A sociological approach to self and identity , 2003 .

[119]  Deborah Compeau,et al.  Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..

[120]  Angappa Gunasekaran,et al.  A review for mobile commerce research and applications , 2007, Decis. Support Syst..

[121]  Michael Boyer O'Leary,et al.  Beyond Being There: The Symbolic Role of Communication and Identification in Perceptions of Proximity to Geographically Dispersed Colleagues , 2014, MIS Q..

[122]  Annemette Kjærgaard,et al.  Who do you think you are? A review of the complex interplay between information systems, identification and identity , 2014, Eur. J. Inf. Syst..

[123]  Thompson S. H. Teo,et al.  Product attributes and brand equity in the mobile domain: The mediating role of customer experience , 2012, Int. J. Inf. Manag..

[124]  S. Walsh,et al.  Needing to connect: The effect of self and others on young people's involvement with their mobile phones , 2010 .

[125]  Marie-Claude Boudreau,et al.  IT-driven identity work: Creating a group identity in a digital environment , 2014, Inf. Organ..

[126]  Gregory N. Connolly,et al.  Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers , 2014, J. Am. Medical Informatics Assoc..

[127]  Blake Ives,et al.  IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.

[128]  Suprateek Sarker,et al.  Understanding Virtual Team Development: An Interpretive Study , 2003, J. Assoc. Inf. Syst..

[129]  Kalle Lyytinen HCI Research: Future Directions that Matter , 2010 .

[130]  Jason Bennett Thatcher,et al.  Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity , 2013 .

[131]  Albert H. Segars,et al.  Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .

[132]  Cheryl Tatano Beck,et al.  The content validity index: are you sure you know what's being reported? Critique and recommendations. , 2006, Research in nursing & health.

[133]  Michelle Carter,et al.  IT Identity: Developing Valid Measures through CFA-Based MTMM Analysis , 2013, ICIS.

[134]  Poul Houman Andersen,et al.  Emotions, trust and relationship development in business relationships: A conceptual model for buyer–seller dyads , 2006 .

[135]  Robert C. Nickerson,et al.  Whither Wireless? Future Directions in Mobility , 2008, Commun. Assoc. Inf. Syst..

[136]  Antonio Carlos Gastaud Maçada,et al.  The Influence of Social Media filter bubbles and echo Chambers on IT Identity Construction , 2019, ECIS.

[137]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[138]  Clifford Nass,et al.  Etiquette equality: exhibitions and expectations of computer politeness , 2004, CACM.

[139]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[140]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[141]  Thomas F. Stafford,et al.  Perceived critical mass and the adoption of a communication technology , 2007, Eur. J. Inf. Syst..

[142]  Rajeev Sharma,et al.  Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .

[143]  Alicia D. Cast,et al.  A Theory of Self-Esteem , 2002 .

[144]  L. Piwek,et al.  The Rise of Consumer Health Wearables: Promises and Barriers , 2016, PLoS medicine.

[145]  Dianne Cyr,et al.  Design aesthetics leading to m-loyalty in mobile commerce , 2006, Inf. Manag..

[146]  Varun Grover,et al.  Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications , 2015, MIS Q..

[147]  Lorrie Faith Cranor,et al.  Timing is everything?: the effects of timing and placement of online privacy indicators , 2009, CHI.

[148]  Pamela Tierney,et al.  Employee Creativity in Taiwan: An Application of Role Identity Theory , 2003 .

[149]  M. Hogg,et al.  Book Review: Social identifications: A social psychology of intergroup relations and group processes , 1991 .

[150]  Viswanath Venkatesh,et al.  Changes in Employees' Job Characteristics During an Enterprise System Implementation: A Latent Growth Modeling Perspective , 2013, MIS Q..

[151]  Hangjung Zo,et al.  User acceptance of location-based social networking services: An extended perspective of perceived value , 2013, Online Inf. Rev..

[152]  Yunan Chen,et al.  Privacy management in dynamic groups: understanding information privacy in medical practices , 2013, CSCW.

[153]  Brian C. Drolet,et al.  Pagers, Smartphones, and HIPAA: Finding the Best Solution for Electronic Communication of Protected Health Information , 2017, Journal of Medical Systems.

[154]  Thomas Franke,et al.  Abandonment of personal quantification: A review and empirical study investigating reasons for wearable activity tracking attrition , 2020, Comput. Hum. Behav..

[155]  Yuanxiang Li,et al.  Online Privacy Policy of the Thirty Dow Jones Corporations: Compliance with FTC Fair Information Practice Principles and Readability Assessment , 2012 .

[156]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[157]  Elaine Byrne,et al.  The role of identity in health information systems development: A case analysis from Mozambique , 2005 .

[158]  Trisha T. C. Lin,et al.  Sociable people beware? Investigating smartphone versus nonsmartphone dependency symptoms among young Singaporeans , 2015 .

[159]  Sejung Marina Choi,et al.  Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .

[160]  Alexander Richter,et al.  Malleable End-User Software , 2013, Bus. Inf. Syst. Eng..

[161]  Clare Linda Sullivan,et al.  EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era , 2019, Comput. Law Secur. Rev..

[162]  Ricardo Gomez,et al.  Facebook's "Free Basics" and Implications for Development: IT Identity and Social Capital , 2017, HICSS.

[163]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .