The privacy-personalization paradox in mHealth services acceptance of different age groups

[1]  D. Campbell,et al.  Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.

[2]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[3]  M. Sobel Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .

[4]  L. Verbrugge,et al.  Gender and health: an update on hypotheses and evidence. , 1985, Journal of health and social behavior.

[5]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[6]  Gayle J. Yaverbaum,et al.  Computer science education in the People's Republic of China in the late 1980s , 1988, CACM.

[7]  D. DavisFred,et al.  User Acceptance of Computer Technology , 1989 .

[8]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[9]  R. Kelly Rainer,et al.  The Influence of Individual Differences on Skill in End-User Computing , 1992, J. Manag. Inf. Syst..

[10]  B. Hughes A Model for the Comprehensive Assessment of Older People and Their Carers , 1993 .

[11]  Tawfiq M. Abu-Ghazzeh MOVEMENT AND WAYFINDING IN THE KING SAUD UNIVERSITY BUILT ENVIRONMENT: A LOOK AT FRESHMAN ORIENTATION AND ENVIRONMENTAL INFORMATION , 1996 .

[12]  R. L. Babcock,et al.  Computer anxiety in young and older adults: Implications for human-computer interactions in older populations , 1997 .

[13]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[14]  Robert J. Vokurka,et al.  The empirical assessment of construct validity , 1998 .

[15]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[16]  V. Venkatesh,et al.  AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .

[17]  Bernard C. Y. Tan,et al.  A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..

[18]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[19]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[20]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[21]  David Gefen,et al.  Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.

[22]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[23]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[24]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[25]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[26]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[27]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[28]  Daniel Z. Levin,et al.  The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..

[29]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[30]  Leo R. Vijayasarathy,et al.  Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..

[31]  John Riedl,et al.  E-Commerce Recommendation Applications , 2004, Data Mining and Knowledge Discovery.

[32]  Viswanath Venkatesh,et al.  Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior , 2005, IEEE Transactions on Engineering Management.

[33]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[34]  ThaeMin Lee,et al.  THE IMPACT OF PERCEPTIONS OF INTERACTIVITY ON CUSTOMER TRUST AND TRANSACTION INTENTIONS IN MOBILE COMMERCE , 2005 .

[35]  Seigyoung Auh The effects of soft and hard service attributes on loyalty: the mediating role of trust , 2005 .

[36]  Honglei Li,et al.  Technology acceptance model for internet banking: an invariance analysis , 2005, Inf. Manag..

[37]  Amy J. Chaffin,et al.  COGNITIVE LEARNING APPLIED TO OLDER ADULT LEARNERS AND TECHNOLOGY , 2005 .

[38]  Robert S. H. Istepanian,et al.  Ubiquitous M-Health Systems and the Convergence Towards 4G Mobile Technologies , 2006 .

[39]  R. Istepanian,et al.  M-Health: Emerging Mobile Health Systems , 2006 .

[40]  J. J. Po-An Hsieh,et al.  ScholarWorks @ Georgia State University , 2016 .

[41]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[42]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[43]  Izak Benbasat,et al.  The Effects of Personalizaion and Familiarity on Trust and Adoption of Recommendation Agents , 2006, MIS Q..

[44]  David Gefen,et al.  On the Need to Include National Culture as a Central Issue in E-Commerce Trust Beliefs , 2006, J. Glob. Inf. Manag..

[45]  Izak Benbasat,et al.  E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact , 2007, MIS Q..

[46]  Alper Ertürk,et al.  Increasing organizational citizenship behaviors of Turkish academicians , 2007 .

[47]  Jari Salo,et al.  A conceptual model of trust in the online environment , 2007, Online Inf. Rev..

[48]  Rod P. Githens,et al.  Understanding interpersonal interaction in an online professional development course , 2007 .

[49]  Kristopher J Preacher,et al.  Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models , 2008, Behavior research methods.

[50]  Keng Siau,et al.  An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns , 2008, J. Assoc. Inf. Syst..

[51]  Jian-ming Wang,et al.  Gender difference in knowledge of tuberculosis and associated health-care seeking behaviors: a cross-sectional study in a rural area of China , 2008, BMC public health.

[52]  Deborah Compeau,et al.  Assessing Between-Group Differences in Information Systems Research: A Comparison of Covariance-and Component-Based SEM , 2009, MIS Q..

[53]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[54]  Ping Yu,et al.  Health IT acceptance factors in long-term care facilities: A cross-sectional survey , 2009, Int. J. Medical Informatics.

[55]  Kai H. Lim,et al.  Web strategies to promote internet shopping: is cultural-customization needed? , 2009 .

[56]  Heng Xu,et al.  Exploring the role of overt vs. covert personalization strategy in privacy calculus , 2009 .

[57]  Jyun-Cheng Wang,et al.  Social interaction and continuance intention in online auctions: A social capital perspective , 2009, Decis. Support Syst..

[58]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[59]  Benjamin Schüz,et al.  Planning bridges the intention–behaviour gap: Age makes a difference and strategy use explains why , 2010, Psychology & health.

[60]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[61]  A. Haines,et al.  The effectiveness of M-health technologies for improving health and health services: a systematic review protocol , 2010, BMC Research Notes.

[62]  C. Advokat What are the cognitive effects of stimulant medications? Emphasis on adults with attention-deficit/hyperactivity disorder (ADHD) , 2010, Neuroscience & Biobehavioral Reviews.

[63]  Mihail Cocosila,et al.  Adoption of mobile ICT for health promotion: an empirical investigation , 2010, Electron. Mark..

[64]  S Akter,et al.  mHealth - an Ultimate Platform to Serve the Unserved , 2010, Yearbook of Medical Informatics.

[65]  Hua Wang,et al.  Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model , 2010, Comput. Hum. Behav..

[66]  Martina Ziefle,et al.  Acceptance of pervasive healthcare systems: A comparison of different implementation concepts , 2010, 2010 4th International Conference on Pervasive Computing Technologies for Healthcare.

[67]  Bob Lee,et al.  Age differences in constraints encountered by seniors in their use of computers and the internet , 2011, Comput. Hum. Behav..

[68]  Paul A. Pavlou,et al.  State of the information privacy literature: where are we now and where should we go? , 2011 .

[69]  Jukka Ylitalo,et al.  PLS marker variable approach to diagnosing and controlling for method variance , 2011, ICIS.

[70]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[71]  Shahriar Akter,et al.  Trustworthiness in mHealth information services: An assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS) , 2011, J. Assoc. Inf. Sci. Technol..

[72]  Sonja Utz,et al.  Internet use and online social support among same sex attracted individuals of different ages , 2011, Comput. Hum. Behav..

[73]  Ing-Long Wu,et al.  The adoption of mobile healthcare by hospital's professionals: An integrative perspective , 2011, Decis. Support Syst..

[74]  Khaled Hassanein,et al.  Protection Motivation Theory, Task-Technology Fit and the Adoption of Personal Health Records by Chronic Care Patients: The Role of Educational Interventions , 2011, AMCIS.

[75]  Kallol Kumar Bagchi,et al.  Exploring the role of espoused values on e-service adoption: A comparative analysis of the US and Nigerian users , 2012, Comput. Hum. Behav..

[76]  Richard E. Lucas,et al.  Cross-sectional age differences in personality: Evidence from nationally representative samples from Switzerland and the United States , 2012 .

[77]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[78]  David C. Yen,et al.  The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..

[79]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[80]  Chuan-Hoo Tan,et al.  Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..

[81]  Mika Immonen,et al.  Telecare services for aging people: Assessment of critical factors influencing the adoption intention , 2013, Comput. Hum. Behav..

[82]  Shahriar Akter,et al.  Continuance of mHealth services at the bottom of the pyramid: the roles of service quality and trust , 2012, Electronic Markets.

[83]  Xitong Guo,et al.  UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS , 2013 .

[84]  Yongqiang Sun,et al.  The dark side of elderly acceptance of preventive mobile health services in China , 2013, Electron. Mark..

[85]  Tsipi Heart,et al.  Older adults: Are they ready to adopt health-related ICT? , 2013, Int. J. Medical Informatics.

[86]  Shuk Ying Ho,et al.  The Effects of Web Personalization on User Attitude and Behavior: An Integration of the Elaboration Likelihood Model and Consumer Search Theory , 2014, MIS Q..

[87]  Edward Shih-Tse Wang Perceived control and gender difference on the relationship between trialability and intent to play new online games , 2014, Comput. Hum. Behav..

[88]  Chun-Ming Chang,et al.  Examining the role of perceived value in virtual communities continuance: its antecedents and the influence of experience , 2014, Behav. Inf. Technol..

[89]  Upkar Varshney,et al.  Mobile health: Four emerging themes of research , 2014, Decis. Support Syst..

[90]  GuoXitong,et al.  Understanding gender differences in m-health adoption: a modified theory of reasoned action model. , 2014 .

[91]  Gerald C. Kane,et al.  What's in IT for employees? Understanding the relationship between use and performance in enterprise social software , 2015, J. Strateg. Inf. Syst..