Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Using smart and connected health services to cope with pandemics: : The interaction effects of event and coping appraisals

Published: 01 November 2024 Publication History

Abstract

Pandemics like COVID-19 disrupt conventional healthcare services, pushing toward smart and connected health solutions including mobile healthcare applications. However, the dynamics of disruptive events influencing smart health service adoption are not well-understood. By incorporating the concept of event disruption into cognitive appraisal theory, this paper develops a research model on how individuals’ event appraisals (event disruption and event threat) interact with coping appraisals (response efficacy and self-efficacy) of smart and connected health services in driving their future usage of smart and connected health services as a coping method. We tested the model using a mixed-methods approach with quantitative and qualitative data. First, we conducted an online survey to collect quantitative data from individuals with experience in using smart and connected health services. The results showed that the moderating effect of the cognitive appraisals of an external event stimulated the usage of smart and connected health services. We then collected archival qualitative data via multiple social media platforms during the COVID-19 pandemic to cross-validate the results of the quantitative study. Implications for theory and practice are discussed.

References

[1]
G. Fagherazzi, C. Goetzinger, M.A. Rashid, G.A. Aguayo, L. Huiart, Digital health strategies to fight covid-19 worldwide: challenges, recommendations, and a call for papers, J. Med. Internet. Res. 22 (6) (2020) e19284,.
[2]
P. Webster, Virtual health care in the era of covid-19, Lancet 395 (10231) (2020) 1180–1181,.
[3]
M. Chen, J. Qu, Y. Xu, J. Chen, Smart and connected health: what can we learn from funded projects?, Data Inf. Manage 2 (3) (2018) 141–152,.
[4]
F. Firouzi, B. Farahani, M. Daneshmand, et al., Harnessing the power of smart and connected health to tackle covid-19: IoT, AI, robotics, and blockchain for a better world, IEEe Internet. Things. J. 8 (16) (2021) 12826–12846,.
[5]
S. Mondal, P. Mitra, The role of emerging technologies to fight against COVID-19 pandemic: an exploratory review, Trans. Indian Natl. Acad. Eng. 7 (2022) 157–174,.
[6]
Parks Associates, New consumer trends in telecare and connected health, http://www.Parksassociates.Com/blog/article/new-consumer-trends-in-telecare-and-connected-health, 2021.
[7]
L.W. Samson, W. Tarazi, G. Turrini, S. Sheingold, Medicare Beneficiaries’ Use of Telehealth in 2020: Trends By Beneficiary Characteristics and Location, Office of the Assistant Secretary for Planning and Evaluation, Washington, DC, 2021.
[8]
P.J. Ågerfalk, K. Conboy, M.D. Myers, Information systems in the age of pandemics: COVID-19 and beyond. 29(3), 2020, pp.203-207.10.1080/0960085X.2020.1771968.
[9]
J. Hart, A. Sutcliffe, Is it all about the Apps or the Device?: User experience and technology acceptance among iPad users, Int. J. Hum.-Comput. Stud. 130 (2019) 93–112,.
[10]
J.Y. Thong, S.-J. Hong, K.Y. Tam, The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance, Int. J. Hum.-Comput. Stud. 64 (9) (2006) 799–810,.
[11]
R. Lazarus, Cognition and emotion in motivation, Am. Psychol. 46 (4) (1991) 352–367,.
[12]
K.R. Scherer, The dynamic architecture of emotion: evidence for the component process model, Cogn. Emot. 23 (7) (2009) 1307–1351,.
[13]
F.P. Morgeson, T.R. Mitchell, D. Liu, Event system theory: An event-oriented approach to the organizational sciences, Acad. Manag. Rev. 40 (4) (2015) 515–537,.
[14]
V. Venkatesh, S.A. Brown, H. Bala, Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems, MIS Quart. 37 (1) (2013) 21–54,.
[15]
V. Venkatesh, J.Y. Thong, X. Xu, Unified theory of acceptance and use of technology: a synthesis and the road ahead, J. Assoc. Inf. Syst. 17 (5) (2016) 328–376,.
[16]
M. Matthews, H. Sun, Mindful adaptation of technology (MAT) in extreme research contexts: A theoretical proposal, in: Proceedings of the 54th Hawaii International Conference on System Sciences, 2021, pp. 4713–4722,.
[17]
T.W. Lee, T.R. Mitchell, B.C. Holtom, L.S. Mcdaneil, J.W. Hill, The unfolding model of voluntary turnover: a replication and extension, Acad. Manag. J. 42 (4) (1999) 450–462,.
[18]
A.O. De Guinea, J. Webster, An investigation of information systems use patterns: Technological events as triggers, the effect of time, and consequences for performance, MIS Quart. 37 (4) (2013) 1165–1188,.
[19]
K.Y. Huang, Coping with organizational information technology events: a perceived organizational support and relationship-focused coping perspective, in: Proceedings of the 54th Hawaii International Conference on System Sciences, 2021, pp. 6442–6451,.
[20]
N. Meti, P.G. Rossos, M.C. Cheung, S. Singh, Virtual cancer care during and beyond the COVID-19 pandemic: we need to get it right, JCo Oncol. Pract. 16 (9) (2020) 527–529,.
[21]
K. Li, D.J. Kim, K.R. Lang, R.J. Kauffman, M. Naldi, How should we understand the digital economy in Asia? Critical assessment and research agenda, Electron. Commer. Res. Appl. 44 (2020),.
[22]
S. Oreg, J.M. Bartunek, G. Lee, B. Do, An affect-based model of recipients’ responses to organizational change events, Acad. Manag. Rev. 43 (1) (2018) 65–86,.
[23]
A. Beaudry, A. Pinsonneault, Understanding user responses to information technology: a coping model of user adaptation, MIS Quart. 29 (3) (2005) 493–524,.
[24]
A.C. Johnston, M. Warkentin, M. Siponen, An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric, MIS Quart. 39 (1) (2015) 113–134,.
[25]
B.P. Dohrenwend, K.G. Raphael, S. Schwartz, A. Stueve, A. Skodol, The structured event probe and narrative rating method for measuring stressful life events, In L. Goldberger & S. Breznitz (Eds.), Handbook of Stress: Theoretical and Clinical Aspects. 1993, pp.174–199. 10.1037/t25008-000.
[26]
A.J. Hoffman, W. Ocasio, Not all events are attended equally: toward a middle-range theory of industry attention to external events, Organ. Sci. 12 (4) (2001) 414–434,.
[27]
F.P. Morgeson, D.S. Derue, Event criticality, urgency, and duration: understanding how events disrupt teams and influence team leader intervention, Leadersh. Q. 17 (3) (2006) 271–287,.
[28]
S.W. Schuetz, P. Benjamin Lowry, D.A. Pienta, J. Bennett Thatcher, The effectiveness of abstract versus concrete fear appeals in information security, J. Manag. Inf. Syst. 37 (3) (2020) 723–757,.
[29]
M. Grimes, J. Marquardson, Quality matters: evoking subjective norms and coping appraisals by system design to increase security intentions, Decis. Support. Syst. 119 (2019) 23–34,.
[30]
R. Mousavi, R. Chen, D.J. Kim, K. Chen, Effectiveness of privacy assurance mechanisms in users’ privacy protection on social networking sites from the perspective of protection motivation theory, Decis. Support. Syst. 135 (2020),.
[31]
A.C. Johnston, M. Warkentin, Fear appeals and information security behaviors: an empirical study, MIS Quart. 34 (3) (2010) 549–566,.
[32]
M.E. Zellmer-Bruhn, Interruptive events and team knowledge acquisition, Manag. Sci. 49 (4) (2003) 514–528,.
[33]
Y. Lee, Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective, Decis. Support. Syst. 50 (2) (2011) 361–369,.
[34]
J.D. Wall, M.W. Buche, To fear or not to fear? A critical review and analysis of fear appeals in the information security context, Commun. Assoc. Inf. Syst. 41 (1) (2017) 277–300,.
[35]
J.E. Maddux, R.W. Rogers, Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change, J. Exp. Soc. Psychol. 19 (5) (1983) 469–479,.
[36]
K. Witte, M. Allen, A meta-analysis of fear appeals: implications for effective public health campaigns, Health Educ. Behav. 27 (5) (2000) 591–615,.
[37]
K. Witte, Putting the fear back into fear appeals: the extended parallel process model, Commun. Monographs 59 (4) (1992) 329–349,.
[38]
D. Kahneman, A perspective on judgment and choice: Mapping bounded rationality, Am. Psychol. 58 (9) (2003) 697–720,.
[39]
C.K. Riemenschneider, D.J. Armstrong, The development of the perceived distinctiveness antecedent of information systems professional identity, MIS Quart. 45 (3) (2021) 1149–1186,.
[40]
J.R. Evans, A. Mathur, The value of online surveys, Internet Res. 15 (2) (2005) 195–219,.
[41]
F.P. Morgeson, The external leadership of self-managing teams: Intervening in the context of novel and disruptive events, J. Appl. Psychol. 90 (3) (2005) 497–508,.
[42]
S.R. Boss, D.F. Galletta, P.B. Lowry, G.D. Moody, P. Polak, What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors, MIS Quart. 39 (4) (2015) 837–864,.
[43]
L. Khansa, J. Kuem, M. Siponen, S.S. Kim, To cyberloaf or not to cyberloaf: the impact of the announcement of formal organizational controls, J. Manag. Inf. Syst. 34 (1) (2017) 141–176,.
[44]
Z. Zhou, Y. Fang, D.R. Vogel, X.L. Jin, X. Zhang, Attracted to or locked in? Predicting continuance intention in social virtual world services, J. Manag. Inf. Syst. 29 (1) (2012) 273–306,.
[45]
S. Tyupa, A theoretical framework for back-translation as a quality assessment tool, New Voices Transl. Stud. 7 (1) (2011) 35–46,.
[46]
D.H.A. Kwak, X. Ma, S. Kim, When does social desirability become a problem? Detection and reduction of social desirability bias in information systems research, Inf. Manag. 58 (7) (2021),.
[47]
W.W. Chin, J.B. Thatcher, R.T. Wright, Assessing common method bias: problems with the ULMC technique, MIS Quart. 36 (3) (2012) 1003–1019,.
[48]
P.M. Podsakoff, D.W. Organ, Self-reports in organizational research: problems and prospects, J. Manage 12 (4) (1986) 531–544,.
[49]
N.K. Malhotra, S.S. Kim, A. Patil, Common method variance in is research: a comparison of alternative approaches and a reanalysis of past research, Manag. Sci. 52 (12) (2006) 1865–1883,.
[50]
J. Benitez, J. Henseler, A. Castillo, F. Schuberth, How to perform and report an impactful analysis using partial least squares: guidelines for confirmatory and explanatory is research, Inf. Manag. 57 (2) (2020),.
[51]
J.F. Hair Jr, G.T.M. Hult, C.M. Ringle, M. Sarstedt, A primer on partial least squares structural equation modeling (pls-sem), Int. J. Res. Method Educ. 38 (2) (2015) 220–221,.
[52]
C. Fornell, D.F. Larcker, Structural equation models with unobservable variables and measurement error: algebra and statistics, J. Mark. Res. 18 (3) (1981) 382–388,.
[53]
A. Diamantopoulos, Incorporating formative measures into covariance-based structural equation models, MIS Quart. 35 (2) (2011) 335–358,.
[54]
J. Hair, C.L. Hollingsworth, A.B. Randolph, A.Y.L. Chong, An updated and expanded assessment of pls-sem in information systems research, Ind. Manag. Data Syst. 117 (3) (2017) 442–458,.
[55]
L. Athens, Naturalistic inquiry in theory and practice, J. Contemp. Ethnogr. 39 (1) (2010) 87–125,.
[56]
S. Chatterjee, J.W. Merhout, S Sarker, A.S. Lee, An examination of the electronic market hypothesis in the us home mortgage industry: a deductive case study, Inf. Technol. People 26 (1) (2013) 4–27,.
[57]
Z. Tang, Z. Zhou, M. Warkentin, A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: a sequential mixed-methods approach, Inf. Manag. 59 (3) (2022),.
[58]
Z. Zhou, X.L. Jin, C. Hsu, Z. Tang, User empowerment and well-being with mHealth apps during pandemics: a mix-methods investigation in china, J. Assoc. Inf. Sci. Technol. 74 (12) (2022) 1401–1418,.
[59]
X. Zhang, Knowledge management system use and job performance, MIS Quart. 41 (3) (2017) 811–840,.
[60]
M.B. Miles, A.M. Huberman, Drawing valid meaning from qualitative data: toward a shared craft, Educ. Researcher 13 (5) (1984) 20–30,.
[61]
V. Venkatesh, S. Goyal, Expectation disconfirmation and technology adoption: polynomial modeling and response surface analysis, MIS Quart. 34 (2) (2010) 281–303,.
[62]
M. Siponen, T. Klaavuniemi, Why is the hypothetico-deductive (HD) method in information systems not an hd method?, Inf. Organ. 30 (1) (2020),.
[63]
L. Chen, H. Liu, Z. Zhou, M. Chen, Y. Chen, IT-business alignment, big data analytics capability, and strategic decision-making: moderating roles of event criticality and disruption of COVID-19, Decis. Support. Syst. 161 (2022),.
[64]
M.M. Kamal, The triple-edged sword of COVID-19: understanding the use of digital technologies and the impact of productive, disruptive, and destructive nature of the pandemic, Inf. Syst. Manag. 37 (4) (2020) 310–317,.
[65]
I. Reychav, R. Beeri, A. Balapour, D.R. Raban, R. Sabherwal, J. Azuri, How reliable are self-assessments using mobile technology in healthcare? The effects of technology identity and self-efficacy, Comput. Human. Behav. 91 (2019) 52–61,.
[66]
X. Chu, X.R. Luo, Y. Chen, A systematic review on cross-cultural information systems research: evidence from the last decade, Inf. Manag. 56 (3) (2019) 403–417,.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Information and Management
Information and Management  Volume 61, Issue 7
Nov 2024
236 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 November 2024

Author Tags

  1. COVID-19
  2. Smart and connected health
  3. IT usage
  4. Cognitive appraisals
  5. Event appraisals
  6. Coping appraisals

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media