Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences
暂无分享,去创建一个
[1] Marcos A. Simplício,et al. Mobile health in emerging countries: A survey of research initiatives in Brazil , 2013, Int. J. Medical Informatics.
[2] Mark Tomlinson,et al. Point of care in your pocket: a research agenda for the field of m-health. , 2012, Bulletin of the World Health Organization.
[3] Robert P. Abelson,et al. Beliefs as possessions: A functional perspective. , 1989 .
[4] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[5] Hua Wang,et al. Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model , 2010, Comput. Hum. Behav..
[6] Daniel R. Headrick,et al. Machines as the Measure of Men: Science, Technology, and Ideologies of Western Dominance , 1990 .
[7] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[8] Ingoo Han,et al. What drives the adoption of mobile data services? An approach from a value perspective , 2009, J. Inf. Technol..
[9] R. Kelly Rainer,et al. The Influence of Individual Differences on Skill in End-User Computing , 1992, J. Manag. Inf. Syst..
[10] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[11] Fred D. Davis,et al. Dead Or Alive? The Development, Trajectory And Future Of Technology Adoption Research , 2007, J. Assoc. Inf. Syst..
[12] E. Vance Wilson,et al. Modeling patients' acceptance of provider-delivered e-health. , 2004, Journal of the American Medical Informatics Association : JAMIA.
[13] Anol Bhattacherjee,et al. Physicians' resistance toward healthcare information technology: a theoretical model and empirical test , 2007, Eur. J. Inf. Syst..
[14] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[15] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[16] Yongqiang Sun,et al. The dark side of elderly acceptance of preventive mobile health services in China , 2013, Electron. Mark..
[17] Martin Hilbert,et al. The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.
[18] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[19] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[20] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[21] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[22] Steven Prentice-Dunn,et al. Protection motivation theory. , 1997 .
[23] A. Bandura. Social Foundations of Thought and Action , 1986 .
[24] Quentin Williams,et al. m-Health adoption and sustainability prognosis from a care givers' and patients' perspective , 2010, SAICSIT '10.
[25] Benjamin Schüz,et al. Planning bridges the intention–behaviour gap: Age makes a difference and strategy use explains why , 2010, Psychology & health.
[26] Dorothy Trainor. Drugs and the elderly: reassessing attitudes , 1981 .
[27] D. Estrin,et al. Open mHealth Architecture: An Engine for Health Care Innovation , 2010, Science.
[28] GuoXitong,et al. Understanding gender differences in m-health adoption: a modified theory of reasoned action model. , 2014 .
[29] J. Rhudy,et al. Gender differences in pain: do emotions play a role? , 2005, Gender medicine.
[30] M. Goldberg,et al. What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .
[31] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[32] David J. Cook,et al. E-Health, Telehealth and Telemedicine , 2002 .
[33] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[34] A. Chasteen,et al. The Moderating Role of Age-Group Identification and Perceived Threat on Stereotype Threat among Older Adults , 2009, International journal of aging & human development.
[35] Cheolho Yoon,et al. Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms , 2013, Inf. Technol. People.
[36] Icek Ajzen,et al. Action versus inaction: Anticipated affect in the theory of planned behavior. , 2013 .
[37] Ming-Jye Wang,et al. What factors affect physicians' decisions to use an e-health care system? , 2012 .
[38] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[39] Gad Saad,et al. Applications of evolutionary psychology in marketing , 2000 .
[40] Seung Heon Han,et al. Contractor’s Risk Attitudes in the Selection of International Construction Projects , 2005 .
[41] Younghwa Lee,et al. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..
[42] W. K. Davis,et al. Gender Differences in Diabetes Attitudes and Adherence , 1995, The Diabetes educator.
[43] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[44] K. Patrick,et al. Health and the mobile phone. , 2008, American journal of preventive medicine.
[45] Robert E. Umbaugh. AUBREY G. CHERNICK , 1992 .