Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences

Abstract Background: Mobile health (m-health) services are becoming increasingly important and widely accepted. However, empirical studies on potential users' m-health acceptance behavior remain underexplored. Indeed, m-health adoption is not only a technology acceptance behavior, but also a health-related behavior. Materials and Methods: Based on the Protection Motivation Theory, this article explores users' m-health adoption behavior from the perspectives of threat appraisal and coping appraisal, and also examines the moderating role of gender and age through a survey of potential users. The survey was conducted among 500 potential m-health service participants. Results: Our results show that threat appraisal and coping appraisal factors influence adoption intention through attitude. It is also found that gender and age play different moderating roles with threat appraisal and coping appraisal factors. Conclusions: Gender and age play different roles between threat appraisal and coping appraisal factors...

[1]  Marcos A. Simplício,et al.  Mobile health in emerging countries: A survey of research initiatives in Brazil , 2013, Int. J. Medical Informatics.

[2]  Mark Tomlinson,et al.  Point of care in your pocket: a research agenda for the field of m-health. , 2012, Bulletin of the World Health Organization.

[3]  Robert P. Abelson,et al.  Beliefs as possessions: A functional perspective. , 1989 .

[4]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[5]  Hua Wang,et al.  Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model , 2010, Comput. Hum. Behav..

[6]  Daniel R. Headrick,et al.  Machines as the Measure of Men: Science, Technology, and Ideologies of Western Dominance , 1990 .

[7]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[8]  Ingoo Han,et al.  What drives the adoption of mobile data services? An approach from a value perspective , 2009, J. Inf. Technol..

[9]  R. Kelly Rainer,et al.  The Influence of Individual Differences on Skill in End-User Computing , 1992, J. Manag. Inf. Syst..

[10]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[11]  Fred D. Davis,et al.  Dead Or Alive? The Development, Trajectory And Future Of Technology Adoption Research , 2007, J. Assoc. Inf. Syst..

[12]  E. Vance Wilson,et al.  Modeling patients' acceptance of provider-delivered e-health. , 2004, Journal of the American Medical Informatics Association : JAMIA.

[13]  Anol Bhattacherjee,et al.  Physicians' resistance toward healthcare information technology: a theoretical model and empirical test , 2007, Eur. J. Inf. Syst..

[14]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[15]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[16]  Yongqiang Sun,et al.  The dark side of elderly acceptance of preventive mobile health services in China , 2013, Electron. Mark..

[17]  Martin Hilbert,et al.  The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.

[18]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[19]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[20]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[21]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[22]  Steven Prentice-Dunn,et al.  Protection motivation theory. , 1997 .

[23]  A. Bandura Social Foundations of Thought and Action , 1986 .

[24]  Quentin Williams,et al.  m-Health adoption and sustainability prognosis from a care givers' and patients' perspective , 2010, SAICSIT '10.

[25]  Benjamin Schüz,et al.  Planning bridges the intention–behaviour gap: Age makes a difference and strategy use explains why , 2010, Psychology & health.

[26]  Dorothy Trainor Drugs and the elderly: reassessing attitudes , 1981 .

[27]  D. Estrin,et al.  Open mHealth Architecture: An Engine for Health Care Innovation , 2010, Science.

[28]  GuoXitong,et al.  Understanding gender differences in m-health adoption: a modified theory of reasoned action model. , 2014 .

[29]  J. Rhudy,et al.  Gender differences in pain: do emotions play a role? , 2005, Gender medicine.

[30]  M. Goldberg,et al.  What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .

[31]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[32]  David J. Cook,et al.  E-Health, Telehealth and Telemedicine , 2002 .

[33]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[34]  A. Chasteen,et al.  The Moderating Role of Age-Group Identification and Perceived Threat on Stereotype Threat among Older Adults , 2009, International journal of aging & human development.

[35]  Cheolho Yoon,et al.  Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms , 2013, Inf. Technol. People.

[36]  Icek Ajzen,et al.  Action versus inaction: Anticipated affect in the theory of planned behavior. , 2013 .

[37]  Ming-Jye Wang,et al.  What factors affect physicians' decisions to use an e-health care system? , 2012 .

[38]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[39]  Gad Saad,et al.  Applications of evolutionary psychology in marketing , 2000 .

[40]  Seung Heon Han,et al.  Contractor’s Risk Attitudes in the Selection of International Construction Projects , 2005 .

[41]  Younghwa Lee,et al.  Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..

[42]  W. K. Davis,et al.  Gender Differences in Diabetes Attitudes and Adherence , 1995, The Diabetes educator.

[43]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[44]  K. Patrick,et al.  Health and the mobile phone. , 2008, American journal of preventive medicine.

[45]  Robert E. Umbaugh AUBREY G. CHERNICK , 1992 .