Smart services in healthcare: A risk-benefit-analysis of pay-as-you-live services from customer perspective in Germany
暂无分享,去创建一个
[1] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[2] I. Ajzen. The theory of planned behavior , 1991 .
[3] Donghua Tao,et al. Intention to Use and Actual Use of Electronic Information Resources: Further Exploring Technology Acceptance Model (TAM) , 2009, AMIA.
[4] Gülden Turhan,et al. An assessment towards the acceptance of wearable technology to consumers in Turkey: the application to smart bra and t-shirt products , 2013 .
[5] Yiwen Gao,et al. International Journal of Medical Informatics , 2016 .
[6] Manmeet Mahinderjit Singh,et al. WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS , 2016 .
[7] Dong-Hee Shin,et al. An acceptance model for smart watches: Implications for the adoption of future wearable technology , 2015, Internet Res..
[8] Jan Marco Leimeister,et al. Digital services for consumers , 2014, Electron. Mark..
[9] Yiwen Gao,et al. An empirical study of wearable technology acceptance in healthcare , 2015, Ind. Manag. Data Syst..
[10] Sumeet Gupta,et al. Value-based Adoption of Mobile Internet: An empirical investigation , 2007, Decis. Support Syst..
[11] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[12] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[13] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[14] Hsu-Shih Shih,et al. A Study of the Acceptance of Wearable Technology for Consumers -An Analytical Network Process Perspective , 2014 .
[15] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[16] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[17] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[18] Dan J. Kim. An Investigation on the New Mobile Service/Technology Adoption , 2005, AMCIS.
[19] Student Demetra Lupu-Visanescu. CONCISE CHARACTERIZATION OF THE EVOLUTION AND BEARINGS OF WORLD-WIDE ECONOMY AND THEIR INFLUENCE OVER THE MOBILITY OF TRADING COMPANIES , 2009 .
[20] Moez Limayem,et al. Force of Habit and Information Systems Usage: Theory and Initial Validation , 2003, J. Assoc. Inf. Syst..
[21] W. Chutimaskul,et al. Factors influencing the Thai elderly intention to use smartphone for e-Health services , 2012, 2012 IEEE Symposium on Humanities, Science and Engineering Research.
[22] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[23] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[24] Nadine Guhr,et al. Mobile Applications and Access to Personal Information: A Discussion of Users' Privacy Concerns , 2013, ICIS.
[25] Glen Allmendinger,et al. Four strategies for the age of smart services. , 2005, Harvard business review.
[26] M. Fishbein. A theory of reasoned action: some applications and implications. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[27] Philipp Mayring. Qualitative Inhaltsanalyse : Grundlagen und Techniken , 2003 .
[28] Keng-Boon Ooi,et al. What catalyses mobile apps usage intention: an empirical analysis , 2015, Ind. Manag. Data Syst..
[29] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[30] Heng Xu,et al. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.
[31] Richard Baskerville,et al. Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..
[32] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[33] Heshan Sun,et al. Understanding User Revisions When Using Information Systems Features: Adaptive System Use and Triggers , 2012, MIS Q..
[34] Munkee Choi,et al. User acceptance of wearable devices: An extended perspective of perceived value , 2016, Telematics Informatics.
[35] F. Bookstein,et al. Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory: , 1982 .
[36] Narcis Eduard Mitu,et al. Development Directions Of Services And Products In Insurances , 2007 .
[37] Nils Urbach,et al. Quantify-me: Consumer Acceptance of Wearable Self-tracking Devices , 2016, ECIS.
[38] Nabil Ahmed Sultan,et al. Reflective thoughts on the potential and challenges of wearable technology for healthcare provision and medical education , 2015, Int. J. Inf. Manag..
[39] Ananthanarayanan Parasuraman,et al. An Updated and Streamlined Technology Readiness Index , 2015 .
[40] Lucy E. Dunne,et al. A survey of the historical scope and current trends of wearable technology applications , 2016, SEMWEB.
[41] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[42] W. Peng,et al. Keep Using My Health Apps: Discover Users' Perception of Health and Fitness Apps with the UTAUT2 Model. , 2015, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[43] Mary Beth Rosson,et al. Measuring Mobile Users' Concerns for Information Privacy , 2012, ICIS.
[44] Ching-Fu Chen. Investigating structural relationships between service quality, perceived value, satisfaction, and behavioral intentions for air passengers: Evidence from Taiwan , 2008 .
[45] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[46] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[47] Fuyuan Xu,et al. An Empirical Study on Factors Influencing Consumers' Initial Trust in Wearable Commerce , 2016, J. Comput. Inf. Syst..
[48] Adamantios Diamantopoulos,et al. Advancing formative measurement models , 2008 .
[49] Eric McAdams,et al. Wearable sensor systems: The challenges , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[50] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[51] Claus-Peter H. Ernst,et al. The Influence of Privacy Risk on Smartwatch Usage , 2016, AMCIS.
[52] Rainer Alt,et al. Electronic Markets on customer-orientation , 2016, Electron. Mark..
[53] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[54] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[55] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[56] V. Zeithaml. Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence: , 1988 .
[57] Jason Bennett Thatcher,et al. Conceptualizing models using multidimensional constructs: a review and guidelines for their use , 2012, Eur. J. Inf. Syst..
[58] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[59] Joseph Wei,et al. How Wearables Intersect with the Cloud and the Internet of Things : Considerations for the developers of wearables. , 2014, IEEE Consumer Electronics Magazine.
[60] Straub,et al. Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .