Skip to main content
Log in

Adoption of mobile ICT for health promotion: an empirical investigation

  • General Research
  • Published:
Electronic Markets Aims and scope Submit manuscript

Abstract

This research is an unbiased empirical evaluation of user reasons to accept or resist a mobile information and communication technology (ICT) application for health promotion. This innovative use of mobile ICT consists of developing services that educate people to stay healthy, with clear benefits for both individuals and society. Receiving customized health advice through mobile devices may be an attractive service. However, despite their ability to support users, mobile services may sometimes irritate by being too intrusive. A 1-month experiment exposed participants to a health promotion application, delivered through their cell phones. This was the framework for the evaluation of an adoption model that included both positive and negative user adoption factors. Findings revealed intrinsic motivation to be a sufficient reason for adoption and a multi-faceted perceived overall risk factor as the main obstacle. Accordingly, when usefulness is less apparent, enjoyment may be a key factor for the adoption of mobile ICT for health promotion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Anna, V., Jose-Maria, B., Maria-Teresa, D., Caterina, G., Consolacion, D., Dulcis, S., et al. (2004). The role of mobile phones in improving vaccination rates in travelers. Preventive Medicine, 38, 503–509.

    Article  Google Scholar 

  • Bauer, S., Percevic, R., Okon, E., Meermann, R., & Kordy, H. (2003). Use of text messaging in the aftercare of patients with bulimia nervosa. European Eating Disorders Review, 11, 279–290.

    Article  Google Scholar 

  • Bontis, N. (1998). Intellectual capital: an exploratory study that develops measures and models. Management Decision, 36(2), 63–76.

    Article  Google Scholar 

  • Bontis, N., Keow, W. C. C., & Richardson, S. (2000). Intellectual capital and business performance in Malaysian industries. Journal of Intellectual Capital, 1(1), 85–100.

    Article  Google Scholar 

  • Childers, T. L., Carr, C. L., Peck, J., & Carson, S. (2001). Hedonic and utilitarian motivations for online retail shopping behavior. Journal of Retailing, 77, 511–535.

    Article  Google Scholar 

  • Chin, W. W. (1997). Overview of the PLS Method, University of Houston. http://disc-nt.cba.uh.edu/chin/PLSINTRO.HTM, accessed: February 10, 2009.

  • Chin, W. W. (1998). The Partial Least Squares approach for structural equation modelling. In A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwa: Lawrence Erlbaum Associates.

    Google Scholar 

  • Cocosila, M., Turel, O., Archer, N., & Yuan, Y. (2007). Perceived health risk of 3G cell phones: do users care? Communications of the ACM, 50(6), 89–92.

    Article  Google Scholar 

  • Cocosila, M., Archer, N., & Yuan, Y. (2009). Early investigation of new information technology acceptance: a perceived risk—motivation model. Communications of the Association for Information Systems, 25(30). http://aisel.aisnet.org/cais/vol25/iss21/30, accessed: February 19, 2010.

  • Cohen, J. (1988). Statistical power analysis for the behavioral science (2nd ed.). Hillsdale: Lawrence Erlbaum Associates.

    Google Scholar 

  • Compeau, D., Higgins, C., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Quarterly, 23(2), 145–158.

    Article  Google Scholar 

  • Conchar, M. P., Zinkhan, G. M., Peters, C., & Olavarrieta, S. (2004). An integrated framework for the conceptualization of consumers’ perceived-risk processing. Journal of the Academy of Marketing Science, 32(4), 418–436.

    Article  Google Scholar 

  • Davis, F., Bagozzi, R., & Warshaw, P. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111–1132.

    Article  Google Scholar 

  • Deci, E. L., & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human behavior. New York: Plenum Press.

    Google Scholar 

  • Doolin, B., Dillon, S., Thompson, F., & Corner, J. L. (2005). Perceived risk, the Internet shopping experience and online purchasing behavior: a New Zealand perspective. Journal of Global Information Management, 13(2), 66–88.

    Google Scholar 

  • Downer, S. R., Meara, J. G., & Da Costa, A. C. (2005). Use of SMS text messaging to improve outpatient attendance. The Medical Journal of Australia, 183(7), 366–368.

    Google Scholar 

  • Featherman, M., & Pavlou, P. (2003). Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human Computer Studies, 59(1), 451–474.

    Article  Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.

    Article  Google Scholar 

  • Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-Graph: tutorial and annotated example. Communications of the Association for Information Systems, 16, 91–109.

    Google Scholar 

  • Horne, R., Graupnera, L., Frosta, S., Weinmanb, J., Wright, S. M., & Hankins, M. (2004). Medicine in a multi-cultural society: the effect of cultural background on beliefs about medications. Social Science & Medicine, 59(6), 1307–1313.

    Article  Google Scholar 

  • Horne, R., Weinman, J., & Hankins, M. (1999). The Beliefs about Medicines Questionnaire: the development and evaluation of a new method for assessing the cognitive representation of medication. Psychology & Health, 14(1), 1–24.

    Article  Google Scholar 

  • Igbaria, M. (1993). User acceptance of microcomputer technology: an empirical test. OMEGA: International Journal of Management Science, 21(1), 73–90.

    Article  Google Scholar 

  • Igbaria, M., Iivari, J., & Maragahh, H. (1995). Why do individuals use computer technology? A Finnish case study. Information Management, 29(5), 227–238.

    Article  Google Scholar 

  • Jacoby, J., & Kaplan, L. B. (1972). The components of perceived risk. Proceedings of the 3rd Annual Conference of the Association for Consumer Research.

  • Jarvenpaa, S. L., & Todd, P. A. (1996). Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 1(2), 59–88.

    Google Scholar 

  • Jarvenpaa, S. L., Shaw, T. R., & Staples, D. S. (2004). Toward contextualized theories of trust: the role of trust in global virtual teams. Information Systems Research, 15(3), 250–267.

    Article  Google Scholar 

  • Keen, P. (1991). Shaping the future: Business design through information technology. Boston: Harvard Business School Press.

    Google Scholar 

  • Laroche, M., McDougall, G. H. G., Bergeron, J., & Yang, Z. (2004). Exploring how intangibility affects perceived risk. Journal of Service Research, 6(4), 373–389.

    Article  Google Scholar 

  • Lim, N. (2003). Consumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2, 216–228.

    Article  Google Scholar 

  • Lohmoller, J.-B. (1989). Latent variable path modelling with Partial Least Squares. Heidelberg: Physica-Verlag.

    Google Scholar 

  • Mantzana, V., Themistocleous, M., Irani, Z., & Vincenzo, M. (2007). Identifying healthcare actors involved in the adoption of information systems. European Journal of Information Systems, 16(1), 91–102.

    Article  Google Scholar 

  • Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Web context. Information Management, 38(4), 217–230.

    Article  Google Scholar 

  • Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.

    Google Scholar 

  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce—Integrating trust and risk with the Technology Acceptance Model. International Journal of Electronic Commerce, 7(2), 101–134.

    Google Scholar 

  • Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.

    Article  Google Scholar 

  • Schaper, L., & Pervan, G. (2004). A model of information and communication technology acceptance and utilisation by occupational therapists. Proceedings of The IFIP TC8/WG8.3 International Conference, Prato, Italy.

  • Shareef, M. A., Kumar, U., & Kumar, V. (2008). Role of different electronic-commerce (EC) quality factors on purchase decision: a developing country perspective. Journal of Electronic Commerce Research, 9(2), 92–112.

    Google Scholar 

  • Shimp, T. A., & Bearden, W. O. (1982). Warranty and other extrinsic cue effects on consumers’ risk perceptions. Journal of Consumer Research, 9(1), 38–47.

    Article  Google Scholar 

  • Stone, R. N., & Grønhaug, K. (1993). Perceived risk: further considerations for the marketing discipline. European Journal of Marketing, 27(3), 39–50.

    Article  Google Scholar 

  • Stone, R. N., & Mason, B. J. (1995). Attitude and risk: exploring the relationship. Psychology & Marketing, 12(2), 135–153.

    Article  Google Scholar 

  • Thomas, R. D., Lu, I. R. R., & Cedzynski, M. (2005). Partial Least Squares: A critical review and a potential alternative. Proceedings of Administrative Sciences Association of Canada (ASAC), Toronto, Ontario, Canada.

  • Turel, O., Serenko, A., & Bontis, N. (2007). User acceptance of wireless short messaging services: deconstructing perceived value. Information Management, 44(1), 63–73.

    Article  Google Scholar 

  • van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695–704.

    Google Scholar 

  • van der Heijden, H., Ogertschnig, M., & van der Gaast, L. (2005). Effects of context relevance and perceived risk on user acceptance of mobile information services. Proceedings of the Thirteenth European Conference on Information Systems, Regensburg, Germany.

  • Venkatesh, V. (1999). Creation of favorable user perceptions: exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239–260.

    Article  Google Scholar 

  • Venkatesh, V., & Davis, F. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186–204.

    Article  Google Scholar 

  • Venkatesh, V., Speier, C., & Morris, M. G. (2002). User acceptance enablers in individual decision making about technology: toward an integrated model. Decision Sciences, 33(2), 297–316.

    Article  Google Scholar 

  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425–478.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mihail Cocosila.

Additional information

Responsible editor: Hans-Dieter Zimmermann

Appendix A: Theoretical Model Questionnaire

Appendix A: Theoretical Model Questionnaire

All items were measured with 7-point Likert type scales having as anchors Strongly Agree and Strongly Disagree. TMT in the below questions means “Text Messaging Telehealth” and denotes the prototype application using SMS on cell phones for health promotion that was tested in the study.

Perceived Financial Risk (adapted from Stone and Grønhaug (1993) and Stone and Mason (1995))

Signing up for TMT would be a poor way to spend my money.

I would be concerned about how much I would pay if I subscribed to TMT.

If I subscribed to TMT, I would be concerned that I would not get my money’s worth.

Perceived Privacy Risk (adapted from Featherman and Pavlou (2003))

My use of TMT would cause me to lose control over the privacy of my information.

Signing up for and using TMT would lead to a loss of privacy for me because my personal information could be used without my knowledge.

Internet hackers (criminals) might take control of my information if I used TMT.

Perceived Psychological Risk (adapted from Stone and Grønhaug (1993) and Stone and Mason (1995))

The thought of signing up for TMT makes me feel uncomfortable.

The thought of signing up for TMT gives me an unwanted feeling of anxiety.

The thought of signing up for TMT causes me to experience unnecessary tension.

Extrinsic Motivation (adapted from Venkatesh et al. (2002))

Using TMT helped me to take the daily vitamin C pill at proper time.

Using TMT helped me to not forget about the daily vitamin C.

Using TMT helped me to take the vitamin C every day.

I found TMT to be useful in reminding me to take my vitamin C daily.

Intrinsic Motivation (adapted from Venkatesh et al. (2002))

I found TMT to be enjoyable.

The actual process of using TMT was pleasant.

I had fun using TMT.

Behavioural Intention (adapted from Venkatesh et al. (2002))

Assuming I had access to TMT, I intend to use it.

Given that I had access to TMT, I predict that I would use it.

Attitude Toward Adherence (adapted from Horne et al. (2004))

Without vitamin C doctors would be less able to cure people for colds and flu.

Taking vitamin C helps many people to be healthy.

Taking vitamin C helps many people to prevent or recover faster from colds and flu.

The benefits of taking vitamin C outweigh the risks.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cocosila, M., Archer, N. Adoption of mobile ICT for health promotion: an empirical investigation. Electron Markets 20, 241–250 (2010). https://doi.org/10.1007/s12525-010-0042-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12525-010-0042-y

Keywords

JEL Classification

Navigation