Adoption of personal health records by chronic disease patients: A research model and an empirical study

Abstract With the increasing prevalence of chronic disease throughout the world, electronic Personal Health Records (ePHRs) have been suggested as a way to improve chronic disease self-management. However, ePHRs are not yet widely used by consumers. Protection Motivation Theory (PMT) has been successfully used to explain health related behaviours among chronic disease patients. In addition, Information Systems (IS) theories such as Task Technology Fit (TTF) have been successfully used to explain information technology adoption. This study leverages these theories along with the health self-management readiness concept of the Patient Activation Measure (PAM) to propose a theoretical model of ePHR adoption by chronic disease patients for the task of self-management. The role of educational interventions on various elements of the proposed model is also examined. A survey-based study of 230 Type 2 Diabetes patients is used to empirically validate the proposed model via structural equation modeling techniques. Results reveal that the PMT, TTF and PAM constructs all have significant direct and indirect effects on the intention to adopt an ePHR. In addition, the educational intervention analysis indicates that the provision of advanced ePHR education positively influences various constructs in the model, while the use of fear appeals does not have an effect.

[1]  Ebrahim Randeree INVESTIGATING LITERACY AS A PREDICTOR OF ADOPTION AND USAGE , 2009 .

[2]  L Greening,et al.  Adolescents' Health Attitudes and Adherence to Treatment for Insulin‐Dependent Diabetes Mellitus , 1998, Journal of developmental and behavioral pediatrics : JDBP.

[3]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[4]  R. Lennox,et al.  Conventional wisdom on measurement: A structural equation perspective. , 1991 .

[5]  D. Harrison McKnight,et al.  Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use , 2006, Inf. Syst. Res..

[6]  Detmar W. Straub,et al.  Validation in Information Systems Research: A State-of-the-Art Assessment , 2001, MIS Q..

[7]  Elske Ammenwerth,et al.  BMC Medical Informatics and Decision Making , 2022 .

[8]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[9]  R. Frank Falk,et al.  A Primer for Soft Modeling , 1992 .

[10]  Paul Norman,et al.  Predicting adherence to eye patching in children with amblyopia: an application of protection motivation theory. , 2003, British journal of health psychology.

[11]  Joan Meyers-Levy,et al.  The Influence of Message Framing and Issue Involvement , 1990 .

[12]  P. Sheeran,et al.  Combining motivational and volitional interventions to promote exercise participation: protection motivation theory and implementation intentions. , 2002, British journal of health psychology.

[13]  J. E. Maddux,et al.  Cognitive Processes in Health Enhancement: Investigation of a Combined Protection Motivation and Self-Efficacy Model , 1986 .

[14]  Viswanath Venkatesh,et al.  Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation , 1999, MIS Q..

[15]  Erwin R. Seydel,et al.  Risk-appraisal, outcome and self-efficacy expectancies: Cognitive factors in preventive behaviour related to cancer , 1990 .

[16]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[17]  Marko Sarstedt,et al.  Goodness-of-fit indices for partial least squares path modeling , 2013, Comput. Stat..

[18]  R. Plotnikoff,et al.  Protection Motivation Theory and Physical Activity , 2009, Journal of health psychology.

[19]  Neville Owen,et al.  Protection Motivation Theory and Adolescents' Perceptions of Exercise1 , 1992 .

[20]  Andrew N. K. Chen,et al.  Healthcare Information Technology Adoption and Protection Motivation: A Study of Computerized Physicial Order Entry Systems , 2008, AMCIS.

[21]  Dale Goodhue,et al.  Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers , 2012, Inf. Syst. Res..

[22]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[23]  Angelika Dimoka,et al.  On Product Uncertainty in Online Markets: Theory and Evidence , 2011, MIS Q..

[24]  J. Sensmeier,et al.  The journey toward a personal health record. , 2010, Nursing management.

[25]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..

[26]  Martin Fishbein,et al.  Using the theory of reasoned action to develop educational interventions: applications to illicit drug use , 1987 .

[27]  Melissa C. Brouwers,et al.  Uncertainty orientation and protection motivation theory : the role of individual differences in health compliance , 1993 .

[28]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[29]  Yili Hong,et al.  Product Uncertainty in Online Marketplaces in China: An Econometric Model , 2010, AMCIS.

[30]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[31]  James B. Hunt,et al.  The Protection Motivation Model: A Normative Model of Fear Appeals: , 1991 .

[32]  N. Archer,et al.  A Comparison of Physician Pre-Adoption and Adoption Views on Electronic Health Records in Canadian Medical Practices , 2011, Journal of medical Internet research.

[33]  Sally Morton,et al.  Meta-Analysis: Chronic Disease Self-Management Programs for Older Adults , 2005, Annals of Internal Medicine.

[34]  Debra L. Shapiro,et al.  Interactional fairness judgments: The influence of causal accounts , 1987 .

[35]  Diane M. Strong,et al.  Extending task technology fit with computer self-efficacy , 2006, DATB.

[36]  Min Xi,et al.  Patient Perception , Preference and Participation Measuring self-management of patients ’ and employees ’ health : Further validation of the Patient Activation Measure ( PAM ) based on its relation to employee characteristics § , 2009 .

[37]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[38]  Thomas O. Meservy,et al.  Risky Behavior in Online Social Media: Protection Motivation and Social Influence , 2010, AMCIS.

[39]  James Pope,et al.  Implementing EHRs requires a shift in thinking. PHRs--the building blocks of EHRs--may be the quickest path to the fulfillment of disease management. , 2006, Health management technology.

[40]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[41]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[42]  R. W. Rogers,et al.  Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.

[43]  David C. Yen,et al.  Determinants of users' intention to adopt wireless technology: An empirical study by integrating TTF with TAM , 2010, Comput. Hum. Behav..

[44]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[45]  C. Schmid,et al.  Self-management education for adults with type 2 diabetes: a meta-analysis of the effect on glycemic control. , 2002, Diabetes care.

[46]  Izak Benbasat,et al.  The Effects of Presentation Formats and Task Complexity on Online Consumers' Product Understanding , 2007, MIS Q..

[47]  Wynne W. Chin How to Write Up and Report PLS Analyses , 2010 .

[48]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[49]  Jim Bellows,et al.  Is Patient Activation Associated With Outcomes of Care for Adults With Chronic Conditions? , 2007, The Journal of ambulatory care management.

[50]  Robin Blair,et al.  Phone-free virtual visits. Aetna covers online doctor-patient communication for insured members in Florida and California. , 2006, Health management technology.

[51]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[52]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[53]  E. Seydel,et al.  Protection Motivation Theory , 2022 .

[54]  J. Breaugh Important considerations in using statistical procedures to control for nuisance variables in non-experimental studies , 2008 .

[55]  N. Clark,et al.  Effects of educational interventions for self management of asthma in children and adolescents: systematic review and meta-analysis , 2003, BMJ : British Medical Journal.

[56]  Judith H Hibbard,et al.  Development and testing of a short form of the patient activation measure. , 2005, Health services research.

[57]  E. Borgida,et al.  Mishandling the Gift of Life: Noncompliance in Renal Transplant Patients , 1999 .

[58]  J. Hibbard,et al.  How do People with Different Levels of Activation Self-Manage their Chronic Conditions? , 2009, The patient.

[59]  Fatemeh Zahedi,et al.  Exploring the influence of perceptual factors in the success of web-based spatial DSS , 2007, Decis. Support Syst..

[60]  Steven Prentice-Dunn,et al.  Protection motivation theory. , 1997 .

[61]  J. Hibbard,et al.  Development of the Patient Activation Measure (PAM): conceptualizing and measuring activation in patients and consumers. , 2004, Health services research.

[62]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[63]  Ya-Yueh Shih,et al.  The study of behavioral intention for mobile commerce: via integrated model of TAM and TTF , 2013 .

[64]  M Fishbein,et al.  Developing effective behavior change interventions: some lessons learned from behavioral research. , 1995, NIDA research monograph.

[65]  J. Hibbard,et al.  Why Does Patient Activation Matter? An Examination of the Relationships Between Patient Activation and Health-Related Outcomes , 2012, Journal of General Internal Medicine.

[66]  Lijiang Shen The Effectiveness of Empathy- Versus Fear-Arousing Antismoking PSAs , 2011, Health communication.

[67]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[68]  Melinda Whetstone,et al.  Factors influencing intention to use personal health records , 2009 .

[69]  K. Courneya,et al.  Protection motivation theory and the prediction of physical activity among adults with type 1 or type 2 diabetes in a large population sample. , 2010, British journal of health psychology.

[70]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[71]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[72]  S. Norris,et al.  Effectiveness of self-management training in type 2 diabetes: a systematic review of randomized controlled trials. , 2001, Diabetes care.

[73]  Jonathan N. Hawley,et al.  Patient Activation Is Associated With Healthy Behaviors and Ease in Managing Diabetes in an Indigent Population , 2009, The Diabetes educator.

[74]  K. Courneya,et al.  Predictors of aerobic physical activity and resistance training among Canadian adults with type 2 diabetes: An application of the Protection Motivation Theory , 2009 .

[75]  Robert P. Minch,et al.  Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009 .

[76]  Ben-Tzion Karsh,et al.  Review Paper: A Systematic Review of Patient Acceptance of Consumer Health Information Technology , 2009, J. Am. Medical Informatics Assoc..

[77]  Mun Y. Yi,et al.  Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk , 2013, Decis. Support Syst..

[78]  Ronald C Plotnikoff,et al.  Predicting short and long-term exercise intentions and behaviour in patients with coronary artery disease: A test of protection motivation theory , 2009, Psychology & health.

[79]  William Lewis,et al.  PLS, Small Sample Size, and Statistical Power in MIS Research , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[80]  Dale Goodhue,et al.  Understanding user evaluations of information systems , 1995 .

[81]  Louise B Russell,et al.  Time requirements for diabetes self-management: too much for many? , 2005, The Journal of family practice.

[82]  Younghwa Lee,et al.  Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..

[83]  R. Benediktsson,et al.  Outcomes of educational interventions in type 2 diabetes: WEKA data-mining analysis. , 2007, Patient education and counseling.

[84]  J. Spence,et al.  Does Protection Motivation Theory Explain Exercise Intentions and Behavior During Home‐Based Cardiac Rehabilitation? , 2009, Journal of cardiopulmonary rehabilitation and prevention.

[85]  L. Cronbach Coefficient alpha and the internal structure of tests , 1951 .

[86]  S. K. Wurtele,et al.  Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. , 1987, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[87]  Angelika Dimoka,et al.  Where Does TAM Reside in the Brain? The Neural Mechanisms Underlying Technology Adoption , 2008, ICIS.

[88]  E. McKinney,et al.  Extending the Technology Acceptance Model Extending the Technology Acceptance Model and the Task and the Task-Technology Fit Model to Technology Fit Model to Consumer E Consumer E- -Commerce Commerce , 2004 .

[89]  Shumaila Y. Yousafzai,et al.  Technology acceptance: a meta‐analysis of the TAM: Part 2 , 2007 .

[90]  A. Alwan Global status report on noncommunicable diseases 2010. , 2011 .

[91]  Tung-Ching Lin,et al.  Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit , 2008, Inf. Manag..

[92]  Sharon E. Straus,et al.  Personal health records: a scoping review , 2011, J. Am. Medical Informatics Assoc..

[93]  Manolis Tsiknakis,et al.  Organizational factors affecting successful adoption of innovative eHealth services: A case study employing the FITT framework , 2009, Int. J. Medical Informatics.

[94]  Daniel H Solomon,et al.  Self-management education programs in chronic disease: a systematic review and methodological critique of the literature. , 2004, Archives of internal medicine.

[95]  Glenn Gamst,et al.  Applied Multivariate Research: Design and Interpretation , 2005 .

[96]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[97]  Steven Prentice-Dunn,et al.  Protection Motivation Theory and Skin Cancer Risk: The Role of Individual Differences in Responses to Persuasive Appeals , 2005 .

[98]  L. Cameron,et al.  Colon cancer information as a source of exercise motivation , 2006 .

[99]  Fred D. Davis,et al.  A critical assessment of potential measurement biases in the technology acceptance model: three experiments , 1996, Int. J. Hum. Comput. Stud..

[100]  Khaled Hassanein,et al.  Consumers' acceptance and use of personal health record systems: A theoretical model , 2009, ECIS.

[101]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[102]  R. E. Hoye,et al.  Is Patient Activation Associated With Future Health Outcomes and Healthcare Utilization Among Patients With Diabetes? , 2009, The Journal of ambulatory care management.

[103]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[104]  Richard S. Lazarus,et al.  Emotions and adaptation: Conceptual and empirical relations. , 1968 .

[105]  H. Winklhofer,et al.  Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .

[106]  Yulin Fang,et al.  Repurchase intention in B2C e-commerce - A relationship quality perspective , 2011, Inf. Manag..

[107]  Judith A Effken,et al.  Validating the personal health records adoption model using a modified e-Delphi. , 2013, Journal of advanced nursing.

[108]  Andrew N. K. Chen,et al.  Evaluating the effects of task-individual-technology fit in multi-DSS models context: A two-phase view , 2011, Decis. Support Syst..

[109]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[110]  Jan-Bernd Lohmöller,et al.  Latent Variable Path Modeling with Partial Least Squares , 1989 .

[111]  P. Sheeran,et al.  Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. , 2006, Psychological bulletin.

[112]  K. Courneya,et al.  Cancer prevention as a source of exercise motivation: An experimental test using protection motivation theory , 2001 .

[113]  S. Prentice-Dunn,et al.  Effects of persuasive message order on coping with breast cancer information. , 2001, Health education research.