Adoption of personal health records by chronic disease patients: A research model and an empirical study
暂无分享,去创建一个
[1] Ebrahim Randeree. INVESTIGATING LITERACY AS A PREDICTOR OF ADOPTION AND USAGE , 2009 .
[2] L Greening,et al. Adolescents' Health Attitudes and Adherence to Treatment for Insulin‐Dependent Diabetes Mellitus , 1998, Journal of developmental and behavioral pediatrics : JDBP.
[3] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[4] R. Lennox,et al. Conventional wisdom on measurement: A structural equation perspective. , 1991 .
[5] D. Harrison McKnight,et al. Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use , 2006, Inf. Syst. Res..
[6] Detmar W. Straub,et al. Validation in Information Systems Research: A State-of-the-Art Assessment , 2001, MIS Q..
[7] Elske Ammenwerth,et al. BMC Medical Informatics and Decision Making , 2022 .
[8] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[9] R. Frank Falk,et al. A Primer for Soft Modeling , 1992 .
[10] Paul Norman,et al. Predicting adherence to eye patching in children with amblyopia: an application of protection motivation theory. , 2003, British journal of health psychology.
[11] Joan Meyers-Levy,et al. The Influence of Message Framing and Issue Involvement , 1990 .
[12] P. Sheeran,et al. Combining motivational and volitional interventions to promote exercise participation: protection motivation theory and implementation intentions. , 2002, British journal of health psychology.
[13] J. E. Maddux,et al. Cognitive Processes in Health Enhancement: Investigation of a Combined Protection Motivation and Self-Efficacy Model , 1986 .
[14] Viswanath Venkatesh,et al. Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation , 1999, MIS Q..
[15] Erwin R. Seydel,et al. Risk-appraisal, outcome and self-efficacy expectancies: Cognitive factors in preventive behaviour related to cancer , 1990 .
[16] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[17] Marko Sarstedt,et al. Goodness-of-fit indices for partial least squares path modeling , 2013, Comput. Stat..
[18] R. Plotnikoff,et al. Protection Motivation Theory and Physical Activity , 2009, Journal of health psychology.
[19] Neville Owen,et al. Protection Motivation Theory and Adolescents' Perceptions of Exercise1 , 1992 .
[20] Andrew N. K. Chen,et al. Healthcare Information Technology Adoption and Protection Motivation: A Study of Computerized Physicial Order Entry Systems , 2008, AMCIS.
[21] Dale Goodhue,et al. Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers , 2012, Inf. Syst. Res..
[22] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[23] Angelika Dimoka,et al. On Product Uncertainty in Online Markets: Theory and Evidence , 2011, MIS Q..
[24] J. Sensmeier,et al. The journey toward a personal health record. , 2010, Nursing management.
[25] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[26] Martin Fishbein,et al. Using the theory of reasoned action to develop educational interventions: applications to illicit drug use , 1987 .
[27] Melissa C. Brouwers,et al. Uncertainty orientation and protection motivation theory : the role of individual differences in health compliance , 1993 .
[28] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[29] Yili Hong,et al. Product Uncertainty in Online Marketplaces in China: An Econometric Model , 2010, AMCIS.
[30] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[31] James B. Hunt,et al. The Protection Motivation Model: A Normative Model of Fear Appeals: , 1991 .
[32] N. Archer,et al. A Comparison of Physician Pre-Adoption and Adoption Views on Electronic Health Records in Canadian Medical Practices , 2011, Journal of medical Internet research.
[33] Sally Morton,et al. Meta-Analysis: Chronic Disease Self-Management Programs for Older Adults , 2005, Annals of Internal Medicine.
[34] Debra L. Shapiro,et al. Interactional fairness judgments: The influence of causal accounts , 1987 .
[35] Diane M. Strong,et al. Extending task technology fit with computer self-efficacy , 2006, DATB.
[36] Min Xi,et al. Patient Perception , Preference and Participation Measuring self-management of patients ’ and employees ’ health : Further validation of the Patient Activation Measure ( PAM ) based on its relation to employee characteristics § , 2009 .
[37] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[38] Thomas O. Meservy,et al. Risky Behavior in Online Social Media: Protection Motivation and Social Influence , 2010, AMCIS.
[39] James Pope,et al. Implementing EHRs requires a shift in thinking. PHRs--the building blocks of EHRs--may be the quickest path to the fulfillment of disease management. , 2006, Health management technology.
[40] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[41] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[42] R. W. Rogers,et al. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.
[43] David C. Yen,et al. Determinants of users' intention to adopt wireless technology: An empirical study by integrating TTF with TAM , 2010, Comput. Hum. Behav..
[44] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[45] C. Schmid,et al. Self-management education for adults with type 2 diabetes: a meta-analysis of the effect on glycemic control. , 2002, Diabetes care.
[46] Izak Benbasat,et al. The Effects of Presentation Formats and Task Complexity on Online Consumers' Product Understanding , 2007, MIS Q..
[47] Wynne W. Chin. How to Write Up and Report PLS Analyses , 2010 .
[48] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[49] Jim Bellows,et al. Is Patient Activation Associated With Outcomes of Care for Adults With Chronic Conditions? , 2007, The Journal of ambulatory care management.
[50] Robin Blair,et al. Phone-free virtual visits. Aetna covers online doctor-patient communication for insured members in Florida and California. , 2006, Health management technology.
[51] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[52] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[53] E. Seydel,et al. Protection Motivation Theory , 2022 .
[54] J. Breaugh. Important considerations in using statistical procedures to control for nuisance variables in non-experimental studies , 2008 .
[55] N. Clark,et al. Effects of educational interventions for self management of asthma in children and adolescents: systematic review and meta-analysis , 2003, BMJ : British Medical Journal.
[56] Judith H Hibbard,et al. Development and testing of a short form of the patient activation measure. , 2005, Health services research.
[57] E. Borgida,et al. Mishandling the Gift of Life: Noncompliance in Renal Transplant Patients , 1999 .
[58] J. Hibbard,et al. How do People with Different Levels of Activation Self-Manage their Chronic Conditions? , 2009, The patient.
[59] Fatemeh Zahedi,et al. Exploring the influence of perceptual factors in the success of web-based spatial DSS , 2007, Decis. Support Syst..
[60] Steven Prentice-Dunn,et al. Protection motivation theory. , 1997 .
[61] J. Hibbard,et al. Development of the Patient Activation Measure (PAM): conceptualizing and measuring activation in patients and consumers. , 2004, Health services research.
[62] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[63] Ya-Yueh Shih,et al. The study of behavioral intention for mobile commerce: via integrated model of TAM and TTF , 2013 .
[64] M Fishbein,et al. Developing effective behavior change interventions: some lessons learned from behavioral research. , 1995, NIDA research monograph.
[65] J. Hibbard,et al. Why Does Patient Activation Matter? An Examination of the Relationships Between Patient Activation and Health-Related Outcomes , 2012, Journal of General Internal Medicine.
[66] Lijiang Shen. The Effectiveness of Empathy- Versus Fear-Arousing Antismoking PSAs , 2011, Health communication.
[67] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[68] Melinda Whetstone,et al. Factors influencing intention to use personal health records , 2009 .
[69] K. Courneya,et al. Protection motivation theory and the prediction of physical activity among adults with type 1 or type 2 diabetes in a large population sample. , 2010, British journal of health psychology.
[70] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[71] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[72] S. Norris,et al. Effectiveness of self-management training in type 2 diabetes: a systematic review of randomized controlled trials. , 2001, Diabetes care.
[73] Jonathan N. Hawley,et al. Patient Activation Is Associated With Healthy Behaviors and Ease in Managing Diabetes in an Indigent Population , 2009, The Diabetes educator.
[74] K. Courneya,et al. Predictors of aerobic physical activity and resistance training among Canadian adults with type 2 diabetes: An application of the Protection Motivation Theory , 2009 .
[75] Robert P. Minch,et al. Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009 .
[76] Ben-Tzion Karsh,et al. Review Paper: A Systematic Review of Patient Acceptance of Consumer Health Information Technology , 2009, J. Am. Medical Informatics Assoc..
[77] Mun Y. Yi,et al. Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk , 2013, Decis. Support Syst..
[78] Ronald C Plotnikoff,et al. Predicting short and long-term exercise intentions and behaviour in patients with coronary artery disease: A test of protection motivation theory , 2009, Psychology & health.
[79] William Lewis,et al. PLS, Small Sample Size, and Statistical Power in MIS Research , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[80] Dale Goodhue,et al. Understanding user evaluations of information systems , 1995 .
[81] Louise B Russell,et al. Time requirements for diabetes self-management: too much for many? , 2005, The Journal of family practice.
[82] Younghwa Lee,et al. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..
[83] R. Benediktsson,et al. Outcomes of educational interventions in type 2 diabetes: WEKA data-mining analysis. , 2007, Patient education and counseling.
[84] J. Spence,et al. Does Protection Motivation Theory Explain Exercise Intentions and Behavior During Home‐Based Cardiac Rehabilitation? , 2009, Journal of cardiopulmonary rehabilitation and prevention.
[85] L. Cronbach. Coefficient alpha and the internal structure of tests , 1951 .
[86] S. K. Wurtele,et al. Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. , 1987, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[87] Angelika Dimoka,et al. Where Does TAM Reside in the Brain? The Neural Mechanisms Underlying Technology Adoption , 2008, ICIS.
[88] E. McKinney,et al. Extending the Technology Acceptance Model Extending the Technology Acceptance Model and the Task and the Task-Technology Fit Model to Technology Fit Model to Consumer E Consumer E- -Commerce Commerce , 2004 .
[89] Shumaila Y. Yousafzai,et al. Technology acceptance: a meta‐analysis of the TAM: Part 2 , 2007 .
[90] A. Alwan. Global status report on noncommunicable diseases 2010. , 2011 .
[91] Tung-Ching Lin,et al. Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit , 2008, Inf. Manag..
[92] Sharon E. Straus,et al. Personal health records: a scoping review , 2011, J. Am. Medical Informatics Assoc..
[93] Manolis Tsiknakis,et al. Organizational factors affecting successful adoption of innovative eHealth services: A case study employing the FITT framework , 2009, Int. J. Medical Informatics.
[94] Daniel H Solomon,et al. Self-management education programs in chronic disease: a systematic review and methodological critique of the literature. , 2004, Archives of internal medicine.
[95] Glenn Gamst,et al. Applied Multivariate Research: Design and Interpretation , 2005 .
[96] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[97] Steven Prentice-Dunn,et al. Protection Motivation Theory and Skin Cancer Risk: The Role of Individual Differences in Responses to Persuasive Appeals , 2005 .
[98] L. Cameron,et al. Colon cancer information as a source of exercise motivation , 2006 .
[99] Fred D. Davis,et al. A critical assessment of potential measurement biases in the technology acceptance model: three experiments , 1996, Int. J. Hum. Comput. Stud..
[100] Khaled Hassanein,et al. Consumers' acceptance and use of personal health record systems: A theoretical model , 2009, ECIS.
[101] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[102] R. E. Hoye,et al. Is Patient Activation Associated With Future Health Outcomes and Healthcare Utilization Among Patients With Diabetes? , 2009, The Journal of ambulatory care management.
[103] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[104] Richard S. Lazarus,et al. Emotions and adaptation: Conceptual and empirical relations. , 1968 .
[105] H. Winklhofer,et al. Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .
[106] Yulin Fang,et al. Repurchase intention in B2C e-commerce - A relationship quality perspective , 2011, Inf. Manag..
[107] Judith A Effken,et al. Validating the personal health records adoption model using a modified e-Delphi. , 2013, Journal of advanced nursing.
[108] Andrew N. K. Chen,et al. Evaluating the effects of task-individual-technology fit in multi-DSS models context: A two-phase view , 2011, Decis. Support Syst..
[109] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[110] Jan-Bernd Lohmöller,et al. Latent Variable Path Modeling with Partial Least Squares , 1989 .
[111] P. Sheeran,et al. Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. , 2006, Psychological bulletin.
[112] K. Courneya,et al. Cancer prevention as a source of exercise motivation: An experimental test using protection motivation theory , 2001 .
[113] S. Prentice-Dunn,et al. Effects of persuasive message order on coping with breast cancer information. , 2001, Health education research.