2020
DOI: 10.24251/hicss.2020.440
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Configurational Protection Motivation Theory

Abstract: Protection motivation theory (PMT) has been widely used as a theory to explain users' adoption of health information technologies. Prior studies based on PMT tend to treat it as a variance model and explain the parallel and independent effects of its constructs. This theorization neglects the original insights about the sequence of decision making and the interdependencies between PMT constructs. To address both of these two issues, this study proposes and tests a configurational protection motivation theory (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…The identification with IT might be beneficial but entails certain drawbacks, separated into four categories of identity: IT identity, absent IT identity, anti-IT identity, and ambivalent IT identity (Carter et al, 2019). IS research already covers single factors of resistance to IT, e.g., the fear of losing human uniqueness (Stein et al, 2019), the deskilling of professionals (Boudreau et al, 2014), information interruption of emotional exhaustion (Cheng et al, 2020a, b), the protection of a certain threatening event (Sun et al, 2020), and the possibility of unemployment or the chance of losing safety (Złotowski et al, 2017). Considering the social interactions between individuals and technology and its possible threat to identity has mainly been neglected in IS research (Craig et al, 2019).…”
Section: It Identity and Related Threatsmentioning
confidence: 99%
“…The identification with IT might be beneficial but entails certain drawbacks, separated into four categories of identity: IT identity, absent IT identity, anti-IT identity, and ambivalent IT identity (Carter et al, 2019). IS research already covers single factors of resistance to IT, e.g., the fear of losing human uniqueness (Stein et al, 2019), the deskilling of professionals (Boudreau et al, 2014), information interruption of emotional exhaustion (Cheng et al, 2020a, b), the protection of a certain threatening event (Sun et al, 2020), and the possibility of unemployment or the chance of losing safety (Złotowski et al, 2017). Considering the social interactions between individuals and technology and its possible threat to identity has mainly been neglected in IS research (Craig et al, 2019).…”
Section: It Identity and Related Threatsmentioning
confidence: 99%
“…Technology use is essential for training health professionals [18]. Study by Sun, WangandShen [19]proposedaconfigurationalprotectionmotivationtheoryallowing to identify the potential effects of users on health information technology adoption. Faijaetal.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To analyze which configurations of the eight identified factors lead to an individual's online impulse buying, we take a configurational approach. The state of the art method for configurational approaches is fuzzy-set qualitative comparative analysis (fsQCA), which is increasingly used in information systems research (Lee et al 2019;Maier et al 2021;Sun et al 2020). The basic concept of fsQCA is to reveal what configurations of factors lead to an individual's online impulse buying.…”
Section: Discussionmentioning
confidence: 99%