All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99

ViewsDownloads

Relative Articles

More...

Consumer Risk Perceptions in Mobile Health Services Adoption: Do They Matter?

DOI: 10.4236/etsn.2022.112005, PP. 67-84

Keywords: Mobile Service, Information and Communication Technology, Consumer Adoption, Perceived Risk, Healthcare

Full-Text   Cite this paper   Add to My Lib

Abstract:

The purpose of this study is to investigate empirically the role of consumer perceived risks in the adoption of mobile health services. A theoretical model including the perceived risk associated with the activity targeted by a mobile health service and the perceived risk associated with the mobile service itself was developed and tested empirically in the context of an application supporting smoking cessation. The model was validated in a cross-sectional experiment conducted with 422 consumers in the UK and Canada. Findings show that while risk triggered by the nature of a health promotion activity is a strong driver of the adoption of the supporting mobile health service, risk related to the actual application targeting that activity is a comparatively weaker obstacle. The two contrasting risk perspectives are highly significant as they together explain over 31% of the variance in consumer intention to use the mobile health service, independently from other adoption factors. Overall, this study demonstrates that consumer risk perceptions alone are a multifaceted and meaningful component in mobile health services adoption, and that this element should not be overlooked in more complex research models.

References

[1]  Chen, M.F. and Lin, N.P. (2018) Incorporation of Health Consciousness into the Technology Readiness and Acceptance Model to Predict app Download and Usage Intentions. Internet Research, 28, 351-373.
https://doi.org/10.1108/IntR-03-2017-0099
[2]  Cole-Lewis, H. and Kershaw, T. (2010) Text Messaging as a Tool for Behavior Change in Disease Prevention and Management. Epidemiologic Reviews, 32, 56-69.
https://doi.org/10.1093/epirev/mxq004
[3]  Okazaki, S., Blas, S.S. and Castaneda, J.A. (2015) Physicians’ Adoption of Mobile Health Monitoring Systems in Spain: Competing Models and Impact of Prior Experience. Journal of Electronic Commerce Research, 16, 194-217.
[4]  Cocosila, M., and Archer, N. (2018) Modeling Consumer Acceptance of Electronic Personal Health Records. Journal of Electronic Commerce Research, 19, 119-134.
[5]  Downer, S.R., Meara, J.G. and Da Costa, A.C. (2005) Use of SMS Text Messaging to Improve Outpatient Attendance. Medical Journal of Australia, 183, 366-368.
https://doi.org/10.5694/j.1326-5377.2005.tb07085.x
[6]  Wells, J.D., Campbell, D.E., Valacich, J.S. and Featherman, M. (2010) The Effect of Perceived Novelty on the Adoption of Information Technology Innovations: A Risk/ Reward Perspective. Decision Sciences, 41, 813-843.
https://doi.org/10.1111/j.1540-5915.2010.00292.x
[7]  Venkatesh, V., Speier, C. and Morris, M.G. (2002) User Acceptance Enablers in Individual Decision Making about Technology: Toward an Integrated Model. Decision Sciences, 33, 297-316.
https://doi.org/10.1111/j.1540-5915.2002.tb01646.x
[8]  Laroche, M., McDougall, G.H.G., Bergeron, J. and Yang, Z. (2004) Exploring How Intangibility Affects Perceived Risk. Journal of Service Research, 6, 373-389.
https://doi.org/10.1177/1094670503262955
[9]  Stone, R.N. and Gronhaug, K. (1993) Perceived Risk: Further Considerations for the Marketing Discipline. European Journal of Marketing, 27, 39-50.
https://doi.org/10.1108/03090569310026637
[10]  Lim, N. (2003) Consumers’ Perceived Risk: Sources versus Consequences. Electronic Commerce Research and Applications, 2, 216-228.
https://doi.org/10.1016/S1567-4223(03)00025-5
[11]  Stone, R.N. and Mason, B.J. (1995) Attitude and Risk: Exploring the Relationship. Psychology and Marketing, 12, 135-153.
https://doi.org/10.1002/mar.4220120205
[12]  Featherman, M., and Pavlou, P. (2003) Predicting e-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human Computer Studies, 59, 451-474.
https://doi.org/10.1016/S1071-5819(03)00111-3
[13]  Im, I., Kim, Y. and Han, H.J. (2008) The Effects of Perceived Risk and Technology Type on Users’ Acceptance of Technologies. Information & Management, 45, 1-9.
https://doi.org/10.1016/j.im.2007.03.005
[14]  Lu, X., Li, Y., Zhang, Z., and Rai, B. (2014) Consumer Learning Embedded in Electronic Word of Mouth. Journal of Electronic Commerce Research, 15, 300-316.
[15]  Pavlou, P.A. (2003) Consumer Acceptance of Electronic Commerce—Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce, 7, 69-103.
https://doi.org/10.1080/10864415.2003.11044275
[16]  Glover, S. and Benbasat, I. (2010) A Comprehensive Model of Perceived Risk of e-Commerce Transactions. International Journal of Electronic Commerce, 15, 47-78.
https://doi.org/10.2753/JEC1086-4415150202
[17]  Lapointe, L. and Rivard, S. (2005) A Multilevel Model of Resistance to Information Technology Implementation. MIS Quarterly, 293, 461-491.
https://doi.org/10.2307/25148692
[18]  Lapointe, L. and Rivard, S. (2006) Learning from Physicians’ Resistance to CIS Implementation. Canadian Medical Association Journal, 174, 1573-1584.
https://doi.org/10.1503/cmaj.050281
[19]  Cenfetelli, R.T. and Schwarz, A. (2011) Identifying and Testing the Inhibitors of Technology Usage Intentions. Information Systems Research, 22, 808-823.
https://doi.org/10.1287/isre.1100.0295
[20]  Tan, X., Qin, L., Kim, Y. and Hsu, J. (2012) Impact of Privacy Concern in Social Networking Web Sites. Internet Research, 22, 211-233.
https://doi.org/10.1108/10662241211214575
[21]  Zhou, T. (2017) Understanding Location-Based Services Users’ Privacy Concern: An Elaboration Likelihood Model Perspective. Internet Research, 27, 506-519.
https://doi.org/10.1108/IntR-04-2016-0088
[22]  Conchar, M.P., Zinkhan, G.M., Peters, C. and Olavarrieta, S. (2004) An Integrated Framework for the Conceptualization of Consumers’ Perceived-Risk Processing. Journal of the Academy of Marketing Science, 32, 418-436.
https://doi.org/10.1177/0092070304267551
[23]  Rogers, R.W. (1975) A Protection Motivation Theory of Fear Appeals and Attitude Change. The Journal of Psychology, 91, 93-114.
https://doi.org/10.1080/00223980.1975.9915803
[24]  Johnston, A.C. and Warkentin, M. (2010) Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly, 34, 549-566.
https://doi.org/10.2307/25750691
[25]  Muthitcharoen, A.M., Palvia, P.C. and Grover, V. (2011) Building a Model of Technology Preference: The Case of Channel Choices. Decision Sciences, 42, 205-237.
https://doi.org/10.1111/j.1540-5915.2010.00306.x
[26]  Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003) User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27, 425-478.
https://doi.org/10.2307/30036540
[27]  Bock, G.W., Zmud, R.W., Kim, Y.G. and Lee, J.N. (2005) Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate. MIS Quarterly, 29, 87-111.
https://doi.org/10.2307/25148669
[28]  Gilovich, T. and Medvec V.H. (1995) The Experience of Regret: What, When, and Why. Psychological Review, 102, 379-395.
https://doi.org/10.1037/0033-295X.102.2.379
[29]  Lowry, P.B., Gaskin, J. and Moody, G. (2015) Proposing the Multi-Motive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions. Journal of the Association for Information Systems, 16, 515-579.
https://doi.org/10.17705/1jais.00403
[30]  Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1992) Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. Journal of Applied Social Psychology, 22, 1111-1132.
https://doi.org/10.1111/j.1559-1816.1992.tb00945.x
[31]  Venkatesh, V., Thong, J.Y.L. and Xu, X. (2012) Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Quarterly, 36, 157-178.
https://doi.org/10.2307/41410412
[32]  Featherman, M.S., Valacich, J.S. and Wells., J.D. (2006) Is That Authentic or Artificial? Understanding Consumer Perceptions of Risk in e-Service Encounters. Information Systems Journal, 16, 107-134.
https://doi.org/10.1111/j.1365-2575.2006.00211.x
[33]  Chung, J.E. (2015) Antismoking Campaign Videos on YouTube and Audience Response: Application of Social Media Assessment Metrics. Computers in Human Behavior, 51, 114-121.
https://doi.org/10.1016/j.chb.2015.04.061
[34]  Shearer, J. and Shanahan, M. (2006) Cost Effectiveness Analysis of Smoking Cessation Interventions. Australian and New Zealand Journal of Public Health, 30, 428-434.
https://doi.org/10.1111/j.1467-842X.2006.tb00458.x
[35]  Song, H., Kim, J., Kwon, R.J. and Jung, Y. (2013) Anti-Smoking Educational Game Using Avatars as Visualized Possible Selves. Computers in Human Behavior, 29, 2029-2036.
https://doi.org/10.1016/j.chb.2013.04.008
[36]  Free, C., Knight, R., Robertson, S., Whittaker, R., Edwards, P., Zhou, W. and Roberts, I. (2011) Smoking Cessation Support Delivered via Mobile Phone Text Messaging (txt2stop): A Single-Blind, Randomised Trial. The Lancet, 378, 49-55.
https://doi.org/10.1016/S0140-6736(11)60701-0
[37]  Moldrup, C. (2007) Individualised Health Marketing Using SMS—A Smoking Cessation Case. Journal of Medical Marketing, 7, 255-259.
https://doi.org/10.1057/palgrave.jmm.5050087
[38]  Chow, C.K., Redfern, J., Hillis, G.S., Thakkar, J., Santo, K., Hackett, M.L., Jan, S., Graves, N., de Keizer, L., Barry, T. and Bompoint, S. (2015) Effect of Lifestyle-Focused Text Messaging on Risk Factor Modification in Patients with Coronary Heart Disease: A Randomized Clinical Trial. Journal of the American Medical Association, 314, 1255-1263.
https://doi.org/10.1001/jama.2015.10945
[39]  Fjeldsoe, B.S., Marshall, A.L. and Miller, Y.D. (2009) Behavior Change Interventions Delivered by Mobile Telephone Short-Message Service. American Journal of Preventive Medicine, 36, 165-173.
https://doi.org/10.1016/j.amepre.2008.09.040
[40]  Patrick, K., Raab, F., Adams, M., Dillon, L., Zabinski, M., Rock, C., Griswold, W. and Norman, G. (2009) A Text Message-Based Intervention for Weight Loss: Randomized Controlled Trial. Journal of Medical Internet Research, 11, e1.
https://doi.org/10.2196/jmir.1100
[41]  Naughton, F., Prevost, A.T., Gilbert, H. and Sutton, S. (2012) Randomized Controlled Trial Evaluation of a Tailored Leaflet and SMS Text Message Self-Help Intervention for Pregnant Smokers (MiQuit). Nicotine & Tobacco Research, 14, 569-577.
https://doi.org/10.1093/ntr/ntr254
[42]  Whittaker, R., Borland, R., Bullen, C., Lin, R.B., McRobbie, H. and Rodgers, A. (2009) Mobile Phone-Based Interventions for Smoking Cessation. Cochrane Database of Systematic Reviews, 11, CD006611.
https://doi.org/10.1002/14651858.CD006611.pub2
[43]  Venkatesh, V. and Davis, F. (2000) A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46, 186-204.
https://doi.org/10.1287/mnsc.46.2.186.11926
[44]  Horne, R., Weinman, J. and Hankins, M. (1999) The Beliefs about Medicines Questionnaire: The Development and Evaluation of a New Method for Assessing the Cognitive Representation of Medication. Psychology & Health, 14, 1-24.
https://doi.org/10.1080/08870449908407311
[45]  Horne, R., Graupnera, L., Frosta, S., Weinmanb, J., Wright, S.M. and Hankins, M. (2004) Medicine in a Multi-Cultural Society: The Effect of Cultural Background on Beliefs about Medications. Social Science and Medicine, 59, 1307-1313.
https://doi.org/10.1016/j.socscimed.2004.01.009
[46]  Dimoka, A., Hong, Y. and Pavlou, P.A. (2012) On Product Uncertainty in Online Markets: Theory and Evidence. MIS Quarterly, 36, 395-395.
https://doi.org/10.2307/41703461
[47]  Sun, Y., Bhattacherjee, A. and Ma, Q. (2009) Extending Technology Usage to Work Settings: The Role of Perceived Work Compatibility in ERP Implementation. Information and Management, 46, 351-356.
https://doi.org/10.1016/j.im.2009.06.003
[48]  Sharma, R., Yetton, P. and Crawford, J. (2009) Estimating the Effect of Common Method Variance: The Method-Method Pair Technique with an Illustration from TAM Research. MIS Quarterly, 33, 473-490.
https://doi.org/10.2307/20650305
[49]  Pavlou, P.A., Liang, H.G. and Xue, Y.J. (2007) Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective. MIS Quarterly, 31, 105-136.
https://doi.org/10.2307/25148783
[50]  Bontis, N., Crossan, M.M. and Hulland, J. (2002) Managing an Organizational Learning System by Aligning Stocks and Flows. Journal of Management Studies, 39, 437-469.
https://doi.org/10.1111/1467-6486.t01-1-00299
[51]  Chin, W.W. (1998) The Partial Least Squares Approach for Structural Equation Modeling. In: Marcoulides, A., Ed., Modern Methods for Business Research, Lawrence Erlbaum Associates, Mahwah, NJ, 295-336.
[52]  Thomas, R.D., Lu, I.R.R. and Cedzynski, M. (2005) Partial Least Squares: A Critical Review and a Potential Alternative. Proceedings of Administrative Sciences Association of Canada (ASAC) Conference, Toronto, 28-31 May 2005.
[53]  Lohmoller, J.B. (1989) Latent Variable Path Modeling with Partial Least Squares. Physica-Verlag, Heidelberg.
https://doi.org/10.1007/978-3-642-52512-4
[54]  Ringle, C.M., Wende, S. and Will, S. (2005) SmartPLS 2.0 (M3) Beta.
http://www.smartpls.de
[55]  Gefen, D. and Straub, D. (2005) A Practical Guide to Factorial Validity Using PLS-Graph: Tutorial and Annotated Example. Communications of the Association for Information Systems, 16, 91-109.
https://doi.org/10.17705/1CAIS.01605
[56]  Hair, J.F., Ringle, C.M. and Sarstedt, M. (2011) PLS-SEM: Indeed a Silver Bullet. Journal of Marketing Theory and Practice, 19, 139-152.
https://doi.org/10.2753/MTP1069-6679190202
[57]  Bontis, N. (2004) National Intellectual Capital Index: A United Nations Initiative for the Arab Region. Journal of Intellectual Capital, 5, 13-39.
https://doi.org/10.1108/14691930410512905
[58]  Fornell, C. and Larcker, D.F. (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18, 39-50.
https://doi.org/10.1177/002224378101800104
[59]  Jarvenpaa, S.L., Shaw, T.R. and Staples, D.S. (2004) Toward Contextualized Theories of Trust: The Role of Trust in Global Virtual Teams. Information Systems Research, 15, 250-267.
https://doi.org/10.1287/isre.1040.0028
[60]  Cenfetelli, R.T. and Bassellier, G. (2009) Interpretation of Formative Measurement in Information Systems Research. MIS Quarterly, 33, 689-708.
https://doi.org/10.2307/20650323
[61]  Ou, C.X., Pavlou, P. and Davison, R. (2014) Swift Guanxi in Online Marketplaces: The Role of Computer-Mediated Communication Technologies. MIS Quarterly, 38, 209-230.
https://doi.org/10.25300/MISQ/2014/38.1.10
[62]  Cunningham, L.F., Gerlach, J. and Harper, M.D. (2004) Assessing Perceived Risk of Consumers in Internet Airline Reservations Services. Journal of Air Transportation, 9, 21-35.
[63]  Moon, J.W. and Kim, Y.G. (2001) Extending the TAM for a World-Wide-Web Context. Information and Management, 38, 217-230.
https://doi.org/10.1016/S0378-7206(00)00061-6
[64]  Bontis, N., Keow, W.C.C. and Richardson, S. (2000) Intellectual Capital and Business Performance in Malaysian Industries. Journal of Intellectual Capital, 1, 85-100.
https://doi.org/10.1108/14691930010324188
[65]  Hair Jr., J.F., Hult, G.T.M., Ringle, C. and Sarstedt, M. (2017) A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). SAGE Publications, Thousand Oaks, CA.
[66]  Hertzum, M. (2003) Making Use of Scenarios: A Field Study of Conceptual Design. International Journal of Human-Computer Studies, 58, 215-239.
https://doi.org/10.1016/S1071-5819(02)00138-6
[67]  Jarke, M. (1999) Scenarios for Modeling. Communications of the ACM, 421, 47-48.
https://doi.org/10.1145/291469.293167

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133