Résumés
Abstract
Few empirical studies have explored the factors that influence the intention to use Coronavirus contact-tracing apps. Building on previous literature on technology acceptance, trust, privacy control and reliability, we propose an integrated model. The hypotheses are tested on a representative sample of 1000 citizens in France who installed a contact-tracing app. Trust was found to play a central role: it directly and strongly influenced use intentions and mediated the relationship between perceived ease of use and behavioral intentions. Reliability was found to be a major antecedent of perceived ease of use, and privacy control influenced perceived usefulness.
Keywords:
- Technology acceptance model,
- Coronavirus contact-tracing apps,
- trust,
- privacy,
- reliability,
- ease of use,
- usefulness,
- ehealth
Résumé
Peu d’études empiriques ont exploré les facteurs qui influencent l’intention d’utiliser les applications de traçage de contacts liés au coronavirus. Nous proposons un modèle intégré, basé sur la littérature sur l’acceptation de la technologie, la confiance, le contrôle de la confidentialité et la fiabilité. Les hypothèses sont testées sur un échantillon représentatif de 1000 citoyens en France ayant installé une telle application. La confiance influence directement et fortement les intentions d’utilisation et constitue le médiateur de la relation entre la facilité d’utilisation et les intentions. La fiabilité influence la facilité d’utilisation perçue, et le contrôle de la confidentialité influence l’utilité perçue.
Mots-clés :
- Modèle de l’acceptation de la technologie,
- Applications de traçage des contacts,
- confiance,
- confidentialité,
- fiabilité,
- facilité à utiliser,
- utilité,
- esanté
Resumen
Pocos estudios empíricos han explorado los factores que influyen en la intención de usar aplicaciones de rastreo de contactos de Coronavirus. Proponemos un modelo integrado centrado en la confianza, basado en la literatura sobre la aceptación de la tecnología, la confianza, el control de la privacidad y la fiabilidad. Las hipótesis se prueban en una muestra representativa de 1000 ciudadanos en Francia que instalaron tal aplicación. La confianza afecta directa y fuertemente las intenciones de uso y media en la relación entre la facilidad de uso percibida y las intenciones. La fiabilidad influye en la facilidad de uso percibida, mientras que el control de la privacidad influye en la utilidad percibida.
Palabras clave:
- Modelo de aceptación de tecnología,
- aplicaciones de rastreo de contactos de Coronavirus,
- confianza,
- privacidad,
- confiabilidad,
- facilidad de uso,
- utilidad,
- e-salud
Corps de l’article
In an effort to control the spread of the COVID-19 epidemic, at least 47 countries launched applications to trace the contacts of those infected with Coronavirus (Morley, Cowls, Taddeo, & Floridi, 2020). Such applications, or apps, are installed on mobile phones and inform users when they come into contact with an infected person. Their objective is to restrict contagion (Ferretti et al., 2020; Trang, Trenz, Weiger, Tarafdar, & Cheung, 2020). Coronavirus contact-tracing (CCT) apps are usually downloaded and installed by users on a voluntary basis, thus making mass acceptance (Trang et al., 2020) a main concern for policy makers. CCT apps are the first mobile applications used to address health issues in the general population, without targeting users according to age or preexisting pathology (Kim & Koo, 2016).
Not surprisingly, the acceptability of these apps has been the object of increasing scholarly attention (Altmann et al., 2020; Bengio et al., 2020; Dowthwaite et al., 2021; Sharma et al., 2020; Touzani et al., 2021; von Wyl et al., 2021; Walrave, Waeterloos, & Ponnet, 2021). A number of factors have been shown to influence the intention to adopt a CCT app including self-efficacy (Sharma et al., 2020; Walrave et al., 2021), subjective norms (Sharma et al., 2020), trust in government (Altmann et al., 2020; Oldeweme, Märtins, Westmattelmann, & Schewe, 2021; von Wyl et al., 2021), social influence (Oldeweme et al., 2021; Walrave et al., 2021), perceived benefits (von Wyl et al., 2021; Walrave et al., 2021), performance and effort expectancy, innovativeness and facilitating conditions (Walrave et al., 2021) and application quality (Kahnbach et al., 2021). However, few studies (e.g., von Wyl et al. (2021)) have investigated the drivers of CCT app adoption and intention to adopt in contexts where the app is already installed, tested and in use.
How individuals adopt and use new technologies has been a continuous and crucial question in the IS field (Benbasat & Barki, 2007). In health care, while numerous authors have studied the adoption by health professionals of technologies such as electronic health records or hospital information systems (e.g. Aggelidis & Chatzoglou, 2009; Chau & Hu, 2002; Chen & Tseng, 2012; Vitari & Ologeanu-Taddei, 2018), few studies have explored the factors that influence technology acceptance by patients for health issues (e.g. Kamal, Shafiq, & Kakria, 2020; Lin & Yang, 2009). Further research is required to improve the acceptance and intention to use “citizen centered digital health” systems (Värri et al., 2020) such as personal health record (PHR) systems (H. Li, Gupta, Zhang, & Sarathy, 2014), especially in real use situations.
The Technology Acceptance Model (TAM) (Davis, 1989; Dinev, McConnell, & Smith, 2015; Venkatesh & Davis, 2000) has been successfully employed by many scholars over the past three decades to study the question of individual adoption and use of new technologies such as enterprise systems, websites, recommender agents and mobiles applications. TAM models two main constructs that influence behavioral intention to use a technology (BI): perceived ease of use (PEOU) and perceived usefulness (PU). There are growing calls in the literature for further research into the antecedents of these constructs (Benbasat & Barki, 2007; Y. Lee, Kozar, & Larsen, 2003). In a healthcare setting, where health data are considered to be more sensitive than other kinds of personal data, two such factors are privacy and trust (F. Li, Zou, Liu, & Chen, 2011; Sajid & Abbas, 2016; Xing Zhang et al., 2018). A growing body of literature has emphasized the influence of trust on BI (Carter & Bélanger, 2005; Lu, Yang, Chau, & Cao, 2011; Nicolaou & McKnight, 2006; Venkatesh, Thong, Chan, & Hu, 2016). While the role of trust in the patient-doctor relationship is well-established, recent literature in healthcare has also underscored the importance of trust in telemedicine and e-health acceptance and adoption (Duggal, Brindle, & Bagenal, 2018; Tuckson, Edmunds, & Hodgkins, 2017). For example, Duggal et al. (2018) found that distrust among clinicians, patients, and healthcare providers leads to situations of technology ignorance or abandonment. Scholars have recently highlighted the central role trust plays in a citizen’s decision to adopt CCT apps (Horvath, Banducci, & James, 2020).
As new digital technologies record an increasing amount of personal data, privacy has also been identified as an antecedent of intentions to use a technology (Princi & Krämer, 2020; H. L. Yang & Lin, 2015). Achieving mass acceptance is notably challenged by such data privacy concerns (Altmann et al., 2020; Fox, Clohessy, van der Werff, Rosati, & Lynn, 2021; Janssen & van der Voort, 2020; Sharma et al., 2020; Trang et al., 2020; von Wyl et al., 2021; Walrave et al., 2021). For example, in a recent qualitative study conducted in Germany, Zimmerman et al (2021) show that CCT apps may be undermined by privacy risks that are not compensated by potential benefits. Rowe et al. (2020) found that a lack of transparency and coercion to use a CCT app reinforces stakeholder alienation and skepticism about the reality of the pandemic. In addition, using a situational privacy calculus perspective, Hassandoust et al. (2021) showed that initiatives related to privacy protection influence trust beliefs which in turn influence the intention to adopt a CCT app.
Technical reliability and performance have also been found to influence technology acceptance and use continuance by a small number of studies (Carayon, Hundt, & Wetterneck, 2010) and recently for CCT apps (Howell & Potgieter, 2021; Islam, Islam, Munim, & Islam, 2020; Lohar et al., 2021; Zastrow, 2020). CCT app acceptance and use is notably influenced by issues relating to battery consumption (Lohar et al., 2021), software bugs (Pereira, 2020), and smartphone compatibility (Osman et al., 2020).
Our paper integrates trust, privacy and technical reliability into the TAM to study CCT app adoption. By doing so, we respond to exhortations in the literature (e.g. Benbasat & Barki, 2007; Goodhue, 2007; Venkatesh, Davis, & Morris, 2007) for more research using TAM in specific contexts and to answer unique problems that are relevant to practice. In addition, we follow the recommendation made by Benbasat & Barki (2007) to investigate antecedents of existing TAM belief constructs. By exploring the antecedents of PEOU, PU and BI for a CCT app our work may help both designers and managers successfully implement m-health applications.
We propose the following research question: To what extent do trust, privacy and technical reliability influence the intention to use a mass health mobile app? The paper theoretically develops and empirically validates a research model that both extends and revises the TAM in healthcare settings. The TAM is extended by the inclusion of three main antecedents of its main constructs: trust, privacy control, and reliability. While these variables have been previously highlighted in the literature and notably in a healthcare context, they have not yet been modelled together. Our empirically validated model questions the core relationship in the original TAM between PEOU and PU and between PU and BI, opening avenues for new conceptualizations of the determinants of PEOU, PU and BI for general public voluntary digital health technologies. Our paper makes two main contributions to the extant literature: First, it emphasizes the role of privacy and trust as antecedents of PU, and of technical reliability as a determinant of PEOU. Our results also suggest that trust is central to the model through its direct and mediating effects on BI. Thirdly, our paper provides a contextual model for analyzing the specific acceptance of PHR technologies including CCT apps.
The paper is structured as follows. First, we present the conceptual development with a focus on TAM, trust, privacy and technical reliability. We then present the research model and hypotheses. Finally, we present the results, the discussion, and then conclude with the limitations of the study and directions for future research.
Conceptual development
Acceptance factors
TAM asserts that two main constructs (PEOU and PU) influence behavioral intention to use a new technology (Davis, 1989). PEOU is “the degree to which a person believes that using a particular system would be free from effort” (Davis, 1989, p. 320); PU is “the degree to which a person believes that using a particular system would enhance his or her job performance” (Davis, 1989, p. 320). PU and PEOU both influence BI directly or through the mediation of attitude towards a technology (Venkatesh & Davis, 1996).
TAM has proven reliable in predicting continued IT use based on users’ beliefs, even after they are exposed to the system for a short period of time (H. Yang & Yoo, 2004). A meta-analysis of 88 TAM studies by King and He (2006) found the TAM to be a robust model and that the main measures (PEOU, PU and BI) were highly reliable and may be used in a variety of contexts.
While we accept that TAM has been “overworked” (Goodhue, 2007, p. 220) and that other longitudinal and multi-stage models are also needed to assess influences throughout the implementation process (Benbasat & Barki, 2007), we believe that the explanatory power and parsimony of TAM allow researchers to focus on the reasons why individuals use new technologies (Goodhue, 2007). Furthermore, the model’s implicit assumption that “more use is better” (Goodhue, 2007, p. 220) which may be inaccurate for most systems, is appropriate for technologies requiring mass acceptance such as CCT apps.
We follow Benbasat & Barki (2007) recommendation to model other salient beliefs such as trust as well as antecedents of the existing TAM belief constructs. We extend the TAM to better reflect the influences on m-health use.
Therefore, we propose the following hypotheses which are consistent with core TAM relationships:
-
H1. PU has a positive effect on BI.
-
H2. PEOU has a positive effect on BI.
-
H3. PEOU has a positive effect on PU.
Trust
There is a significant body of literature on the influence of trust on adoption intention (Carter & Bélanger, 2005; Lu et al., 2011; McKnight, Choudhury, & Kacmar, 2002; Nicolaou & McKnight, 2006; Venkatesh et al., 2016). This concept has been investigated in IT enabled contexts such as e-commerce (Kim & Koo, 2016; W. Wang & Benbasat, 2005), digital markets (Du & Mao, 2018) and knowledge management systems (Thatcher, McKnight, Baker, Arsal, & Roberts, 2010). The underlying assumption is that, because IT related environments are often associated with higher levels of uncertainty and complexity (Chandra, Srivastava, & Theng, 2010; Luhmann, 1979; McKnight et al., 2002; Pavlou, 2003; W. Wang & Benbasat, 2005), trust can overcome user concerns related to those aspects.
Several studies have extended the TAM with trust constructs (Gefen, Karahanna, & Straub, 2003b, 2003a; Venkatesh et al., 2016; W. Wang & Benbasat, 2005). Accordingly, in addition to the well-known antecedents (PU and PEOU) of behavioral intention, trust also contributes to explaining user acceptance of IT (e.g. Chandra et al., 2010; Gefen et al., 2003b, 2003a; W. Wang & Benbasat, 2005).
Table 1 displays a sample of studies which measure the role of trust on PU, PEOU and the intention to use an information technology in TAM models.
Trust can be defined as a state of favourable expectation regarding other people’s actions and intentions (Möllering, 2001). Definitions of trust usually highlight the “willingness to depend” on one another (e.g. Gefen et al., 2003b; McKnight et al., 2002; Vance, Elie -Dit-Cosaque, & Straub, 2008). One of the most cited definitions is provided by Mayer, Davis, and Schoorman (1995), who suggest that trust is “the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party.” (p 712). Therefore, trust involves both risk control based on a rational assessment of the other party’s interests and competence, and risk taking. McKnight et al. (2002) propose a conceptualization of trusting beliefs that encompass three dimensions: competence (i.e., the ability of the trustee to do what the trustor needs), benevolence (i.e., the trustee’s motivation to act in the trustor’s interests), and integrity (i.e., the trustee’s honesty and promise keeping). This conceptualization has been widely used to examine the role of trust in technology adoption in IT-enabled contexts such as e-commerce (e.g., W. Wang & Benbasat, 2005) and e-government services (Venkatesh et al., 2016). Wang & Benbasat (2005) propose an integrated trust-TAM conceptualization according to which trust influences both intention to adopt and usefulness, in addition to the well-known TAM effects. The authors validated their model for online shopping recommendation agents using a laboratory experiment. This conceptualization is important because it is the first to focus on trust in IT instead of the broader conceptualization of trust in a vendor (e.g., a vendor in the context of e-shopping).
Thus, trust has been conceptualized and empirically validated as an antecedent of PU (Chandra et al., 2010; Gefen et al., 2003b; Pavlou, 2003; Tung, Chang, & Chou, 2008; W. Wang & Benbasat, 2005). In the health care sector, Li et al. (2014) show that trust in a provider of a PHR software application had a positive impact on both perceived benefits and usage intentions. The main assumption behind the relationship between trust and PU is that if users do not trust the IT artifact then they will not perceive the potential benefits derived from the use of the artifact (W. Wang & Benbasat, 2005). In the context of CCT, this means that if citizens think that the CCT app is not able to fulfill their needs (e.g., the CCT app fails to capture the right data about an infected person), to work in their best interests (i.e., rather than for government surveillance goals) and to keep its promise (e.g., give accurate notifications about infections), then they may consider that the CCT app is not useful for them.
We therefore posit that:
-
H4. Trust has a positive effect on PU.
A small number of studies model trust as a consequence of PEOU (Gefen et al., 2003b; Tung et al., 2008; W. Wang & Benbasat, 2005). Gefen et al. (2003b) and Wang & Benbasat (2005) argue that PEOU increases trust because when users perceived that an IT is easy to use, they feel that the IT provider cares about users which in turn generates trust. Therefore, we propose the following hypothesis:
-
H5. PEOU has a positive effect on trust.
Trust has also been shown to influence behavioral intention in various IT-enabled contexts, and using different conceptualizations (Fang et al., 2014; Kim & Koo, 2016; B. Q. Liu & Goodhue, 2012; Vance et al., 2008). These studies included both TAM extended models (Awad & Ragowsky, 2008; Gefen et al., 2003b, 2003a; Suh & Han, 2003; Tung et al., 2008; N. Wang, Shen, & Sun, 2013; W. Wang & Benbasat, 2005) and studies of intention to use PHR systems (H. Li et al., 2014). According to this body of research, trust can overcome user’ risk and uncertainty concerns and lead them to express an intention to adopt an IT (Gefen et al., 2003b; W. Wang & Benbasat, 2005). If users do not trust the IT artifact, they may not use it and instead switch to other systems (W. Wang & Benbasat, 2005). Moreover, trust creates more positive attitudes (Chandra et al., 2010). In the context of CCT app adoption, Altmann et al. (2020) conducted a survey in five countries and showed that the probability of installing a CCT app increases with trust in the government. Using a panel survey conducted in Switzerland, von Wyl et al. (2021) showed that trust in government is correlated with trust in a CCT app. In addition, Dowthwaite et al. (2021) conceptualized and empirically validated the role of trust in a CCT app on adoption intentions.
Trust is particularly important when users interact with an IT for the first time and thus have limited understanding of agent behavior as they have no previous experience with the IT nor have assessed its quality (McKnight et al., 2002; W. Wang & Benbasat, 2005). This is the case for a CCT app for which the intention to adopt is investigated in this paper in the early months after its implementation. Therefore, we posit the following hypothesis:
-
H6. Trust has a positive effect on BI.
Information privacy
Previous literature has highlighted the importance of information privacy and privacy concerns in technology adoption (Dinev et al., 2015; Malhotra, Kim, & Agarwal, 2004; Trang et al., 2020; Wu, Huang, Yen, & Popova, 2012). While the influence of privacy on mobile health acceptance has not been addressed, scholars such as Li et al. (2014) have argued that privacy-related risks are the primary reason why many people hide their medical information.
Authors have defined privacy in various ways, including general privacy concerns (i.e., the importance of privacy), willingness to display personal information, and privacy control. Clarke (1999) distinguishes four dimensions of privacy: privacy of a person, personal behavior privacy, personal communication privacy, and personal data privacy. Bélanger and Crossler (2011) argue that as most communications are digitized and stored as information, personal communication privacy and data privacy can be merged into the construct of information privacy. Information privacy is the ability of an individual to control when, how, and to what extent their personal information is exchanged with and used by others (Bansal, Zahedi, & Gefen, 2015; Belanger, Hiller, & Smith, 2002; H. Li et al., 2014). This concept is strongly related to control over information about oneself (Taddei & Contena, 2013). As a loss of information privacy renders users vulnerable to various types of privacy risks, they tend to evaluate information sensitivity and loss of information control before sharing their data (Malhotra et al., 2004).
An app’s privacy design can differ according to the amount and type of sensitive information required from a user and the extent of control over access to it, including where the data is located and who has access to it (Cavoukian, 2009; Trang et al., 2020). Recent research on mobile devices and apps has found that different types of IT designs influence privacy concerns and user acceptance (Venkatesh, Aloysius, Hoehle, & Burton, 2017), that users prefer control to direct information access (Sadeh et al., 2009), and that app permission requirements decrease installation intentions (Gu, Xu, Xu, Zhang, & Ling, 2017).
As privacy concerns are a main inhibitor for app acceptance (Dinev et al., 2015), it stands to reason that an app’s privacy design affects adoption (Trang et al., 2020). As contact tracing apps require access to sensitive data, a citizen’s decision to install the app may depend on the app’s privacy design in terms of sensitivity (e.g., geolocalisation tracking vs. Bluetooth tracing) and control (e.g., centralised vs. decentralised data processing; restricted vs. extended data usage), and on the trust in the app provider to develop appropriate privacy safeguards (Trang et al., 2020).
Perceived privacy control is defined as the perceived level of control over the disclosure and subsequent use of one’s personal information (H. Li et al., 2014). The concept of privacy control is inspired by the concept of self-efficacy and trust in one’s own abilities. According to Bandura (1997) self-efficacy is “an individual’s conviction (or confidence) about his or her abilities to mobilize the motivation, cognitive resources, and courses of action needed to successfully execute a specific task within a given context” (Stajkovic & Luthans, 1998, p. 66). Individuals may consider that having control over their health information disclosure and usage allows them to assess the benefits and potential privacy risks involved in using a mobile health app (H. Li et al., 2014). A high level of perceived control over information practices could reassure users that the mobile health app provider is likely to behave responsibly, leading them to form more favorable judgments about the benefits of the app (H. Li et al., 2014). Li et al (2014) has shown in the context of PHR that privacy control positively influences PU.
We therefore hypothesize that:
-
H7. Privacy control influences PU.
Technical reliability
Reliability has been defined as the dependability of system operations (Nelson, Todd, & Wixom, 2005; Shaw, 2002; Srinivasan, 1985; Wixom & Todd, 2005) or, more specifically “the technical availability of the system.” (Nelson et al., 2005, p. 205). More recently, McKnight, Carter, Thatcher, and Clay (2011) defined reliability as the belief that the specific technology will consistently operate properly. Carayon, Hundt, and Wetterneck (2010) conceptualized reliability as a dimension of technical performance together with speed, and accuracy, and found that reliability most influenced system acceptance and continued use. Reliability has also been shown to be an antecedent of system quality (Wixom & Todd, 2005).
In one of the few studies that have examined the influence of reliability on technology acceptance, Liao & Landry (2000) show that system reliability has a direct effect on PEOU, assuming that a performant IT (e.g., which does not breakdown) is perceived as being more easy to use than a less performant IT.
Therefore, we propose the following hypothesis:
-
H8. Reliability has a positive effect on PEOU.
In line with previous studies, we added control variables to PU and PEOU for gender (Gefen & Straub, 1997; X. Zhang & Prybutok, 2003) and age (Burton-Jones & Hubona, 2006; Gomez, Egan, & Bowers, 1986). Our conceptual research model is presented in Figure 1.
Methodology
Development of a questionnaire
A questionnaire was developed (Appendix 1) to test the research hypotheses and model. All constructs of the conceptual model were operationalized based on the extant literature (Lai & Li, 2005; H. Li et al., 2014; Nelson et al., 2005; Venkatesh et al., 2016). The questions were translated following a forward and backward translation procedure as recommended for this kind of study (Bullinger, 1995) and a five-point Likert scale was used (i.e., 1 very strongly disagree to 5 very strongly agree) to measure each item. Following Li et al. (2014), we adopted the concept of “perceived benefits” to measure PU as it is more appropriate in a healthcare setting. Perceived benefits are the useful and desirable effects that are expected to accrue from using a technology. A pilot test was conducted with ten individuals to ensure that items were easy to understand.
Context of the french contact tracing app
Stop Covid was a French Coronavirus contact-tracing app that was designed by a consortium of French companies led by the National Institute for Research in Computer Science and Automation (INRIA) and implemented by the French Government in June 2020. Its use was voluntary and the government developed a promotion strategy to increase its adoption (Rowe et al., 2020). The aim was to alert users who may have been in contact with someone infected by the Coronavirus. The app was available for Android and iOS compatible telephones, was free to download and used a wireless Bluetooth protocol. The app used Bluetooth to identify nearby users rather than geolocalisation which is considered more intrusive. When a telephone identified a nearby user who also had the StopCovid app installed and activated, user codes were exchanged via Bluetooth. The codes were designed to change regularly so that users remained anonymous. If a person developed symptoms which were confirmed by a laboratory test, the laboratory provided the patient with a QR code to flash with their phone. This information was centralized on a server which sent alerts to anyone who had been within one meter of the infected person for more than 15 minutes within the previous 14 days. The consortium launched a Bug Bounty program with French startup YesWeHack before launching the app, to enhance the security of the StopCovid application. This initiative mobilized a community of cybersecurity experts to search for potential vulnerabilities within the application and its infrastructure. The app was modified to improve data protection following a request from the national committee in charge of data protection rights (Commission Nationale de l’Informatique et des Libertés, CNIL). The consortium also published the source code of the app on GitHub.
When the app was launched, a computer science researcher reported that the app collected more data than claimed, including the data of all persons in proximity to a user for less than 15 minutes. Facing criticism from several rights groups about individual privacy and the relevance of collected data, the consortium made several modifications to the app. Beyond privacy concerns, technical performance was also reported as problematic as the first version of the app proved to be incompatible with Apple’s operating system and the Bluetooth settings used by iPhones.
According to the data published by the government, three weeks after launch the app had only been downloaded by 2.7% de la population and 14 notifications of suspected contacts had been sent to users. This raised public criticism about the app’s lack of efficacy, as its design requires it to be used by most of the population in order to accurately track suspected contacts.
Sample and data collection
A web-based questionnaire was used for data collection in July 2020 by a leading market research provider, Panelabs. The survey was administrated to a sample of 1000 individuals from the French population of over 20 years of age that was quota-controlled according to gender, age, geographic area and occupation to ensure that it was representative. Our study focuses only on individuals that installed the application, in order to measure the influence of the reliability and perceived ease of use constructs following our conceptual model. Table 2 presents the principal characteristics of the sample, broken down according to whether they installed and then actually used the application or not. This smaller sample of “installers” is also representative of the general French population for age, geographic area and occupation. It differs along the variable gender; a greater percentage of men installed the app than in the general population[1]. The influence of gender was controlled for in the model.
Data analysis and results
Measurement model
The study used SmartPLS 3.0 (Ringle, Wende, & Becker, 2015) in line with similar studies in healthcare (Zobair, Sanzogni, & Sandhu, 2019) to estimate the measurement properties of our model. Specifically, the study applied nonparametric bootstrapping (Chin, 2010; Efron & Tibshirani, 1994) with 5000 replications to obtain the standard errors of the estimates (Hair, Hult, Ringle, & Sarstedt, 2016) and a path weighting scheme to estimate the structural model relationships.
Reliability and validity analyses were first conducted to evaluate the quality of the measures used. The Cronbach alpha statistics that were computed to evaluate the internal consistency reliability for each construct are presented in Table 3. All values are above 0.70 indicating adequate internal consistency.
The convergent validity of each construct was evaluated by inspecting the outer loadings of each individual item and the average variance extracted (AVE). The individual item loadings are all above 0.7 on their respective constructs and the average variance extracted of each construct is above the 0.5 threshold (Fornell & Larcker, 1981) indicating the convergent validity of the instrument items.
The discriminant validity of each construct was assessed using two separate measures. Firstly, an inspection of the cross loadings of the indicators revealed that loadings on the associated construct were greater than loadings on other constructs (Table 4). Secondly, the square root of each construct’s AVE value was greater than its highest correlation with any other construct (Table 5). These findings support the discriminant validity of the constructs.
A full collinearity test was conducted following the procedure outlined by Kock & Lynn (2012) to test for common method bias. This is particularly important in our study as TAM constructs (Straub & Burton-Jones, 2007) and self-reported usage in particular (Y. Lee et al., 2003) may be subject to bias. All variance inflation factor (VIF) statistics were below 3.3 confirming that the model was free of common method bias.
Once we confirmed that construct measures were reliable and valid, we then assessed the predictive capabilities and the relationships between constructs in our structural model.
Structural model
Prior to interpreting path coefficients, we checked for collinearity between predictor constructs. All VIF statistics are below 5 indicating acceptable levels of collinearity (Hair, Ringle, & Sarstedt, 2011). We next examined the magnitude and strength of the paths of the structural model and then its overall explanatory power. Standardized paths should be around 0.20 and ideally above 0.30 and be directionally consistent with expectations to be considered meaningful (Chin, 1998). The loadings on all significant structural paths were close to or above 0.20 indicating that the model had sufficient predictive power. The results of the structural model are presented in Table 6.
The path between PU and BI was weak but significant at the 5% level (β = 0.114, p = 0.047), thus supporting hypothesis H1. The PU of the CCT app weakly influences intention of use.
The path between PEOU and BI (β = 0.184, p = 0.003) was significant at the 5% level, thus supporting hypothesis H2. The perceived ease of using the contact tracing application influenced use intentions albeit with a weak path coefficient. PEOU did not significantly influence PU (β = 0.-0.031, p = 0.649) at the 5% level (H3).
The path between trust and PU (β = 0.481, p < 0.001) was significant, supporting hypotheses H4. Trust was strongly influenced by PEOU (β = 0.539, p < 0.001), thus supporting H5. In turn, trust significantly influenced BI (β = 0.547, p < 0.001) (H6).
Privacy control positively influenced PU (β = 0.287, p < 0.001), albeit with a moderate path coefficient, lending support to hypothesis H7. The relationship between reliability and PEOU was also found to be strong and significant (β = 0.629, p < 0.001), upholding hypothesis H8.
The coefficient of determination (R2) was computed to assess the model’s overall explanatory power. The analysis revealed that the structural model explained 54% and 46% of the variation in BI and PU respectively, suggesting that the structural model provided adequate explanatory power of these constructs (Hair et al., 2016). The model explained less variation in the trust (R2 = 29%) and PEOU (R2 = 39%) variables. The inclusion of the two control variables (age and gender) did not significantly influence the explanatory power of the model.
In addition to evaluating the model’s predictive accuracy with the R2 statistic, we also calculated Stone-Geisser’s Q2 value to assess the model’s predictive relevance. Predictive relevance measures how well the path model can predict the originally observed values. The Q2 values of our model are all between 0.18 and 0.52 indicating medium to strong predictive relevance of our model (Hair et al., 2016).
Discussion
We proposed and validated a model that includes three antecedents of the main TAM constructs that are relevant in a healthcare context. Firstly, the trust variable was found to play a central role by virtue of both its direct and mediated effects. Trust was confirmed as an influence of PU and BI, in line with the extant literature (Alsajjan & Dennis, 2010; Gefen et al., 2003b; Pavlou, 2003; W. Wang & Benbasat, 2005). Trust was also found to be a consequence of PEOU, with the latter accounting for over one quarter of the variance in the trust variable (R2 = 0.285). This result is also consistent with the existing literature (Gefen et al., 2003b; W. Wang & Benbasat, 2005). To further explore the role of the trust variable in our model, post hoc exploratory analysis (Hollenbeck & Wright, 2017) was undertaken and revealed that trust mediates the relationship between PEOU and PU (β= 0.257, p < 0.001) and between PEOU and BI (β = 0.293, p < 0.001).
Secondly, privacy control was confirmed as an antecedent of PU, underscoring the role of data privacy as a predictor of BI. This result is consistent with previous studies (H. Li et al., 2014) that emphasize the importance of this relationship within a healthcare context. Moreover, it contributes to the recent literature on the determinants of CCT app acceptability, which has found privacy concerns to be main adoption barriers (Altmann et al., 2020; Dowthwaite et al., 2021; Fox et al., 2021; Janssen & van der Voort, 2020; Sharma et al., 2020; Trang et al., 2020; von Wyl et al., 2021; Walrave et al., 2021).
Thirdly, reliability was found to be an antecedent of PEOU. Post hoc analysis revealed that reliability indirectly influenced the trust variable through PEOU (β = 0.337, p < 0.001).
Surprisingly, our study does not support the main TAM relationship between PEOU and PU (β = -0.031, p = 0.649). In addition, the influence of PU on BI is weak (β = 0.114, p = 0.047). We suggest that this unexpected result may be explained by the central role trust plays in a healthcare context (H. Li et al., 2014). Trust was found to both directly influence BI and mediate the relationship between PEOU and BI. While this result is consistent with the extant literature (Alsajjan & Dennis, 2010; Gefen et al., 2003b; Pavlou, 2003; W. Wang & Benbasat, 2005), no previous studies have questioned the TAM in this way. This unexpected result requires further investigation.
Our findings also open four new and interesting research perspectives. The first is related to the link between privacy control and trust. Altmann et al. (2020) have suggested that privacy concerns play a role in the negative relationship between trust in government and the probability of installing the app. Hassandoust et al. (2021) have already found that initiatives related to privacy protection influence trust beliefs which in turn influence the intention to adopt a CCT app. The situational privacy calculus conceptualization that they propose could be investigated further in different empirical settings.
The second perspective involves the investigation of the determinants of trust, such as the roles of rational cognitive beliefs based on previous experience, competence and testing (McKnight et al., 2011), and of emotional attitudes (Komiak & Benbasat, 2006). In addition, further research could investigate the role of non-experiential antecedents in the formation of trust as well as privacy control and perceived usefulness. We suggest that the discourse in both broadcast and social media may influence people’s beliefs and intentions to use CCT apps especially in such a highly publicized context as the Coronavirus pandemic. Recent research has notably highlighted the role of media in influencing public health awareness and preventive behaviors (e.g., Al-Dmour, Masa, Salman, Abuhashesh, & Al-Dmour, n.d.; L. Liu, Xie, Li, & Ji, 2020) during the pandemic. Another non-experential antecedent that could be further investigated is the social norm. Indeed, Sharma et al. (2020) and Fox et al. (2021) have previously shown that social influence has an effect on intentions to adopt a CCT app. Future research could consider these non-experiential influences.
A third perspective may consider different levels of trust. Indeed, the IT artifact cannot be considered as isolated from other stakeholders in the eHealth ecosystem (Kohli & Tan, 2016), such as the IT provider, IT governance and management (i.e. the national government in the case of most CCT apps (Kahnbach et al., 2021)), and doctors.
While previous studies have insisted on the importance of trust in the relationship between patient and healthcare provider (especially doctors) (Petrocchi et al., 2019), some surveys (e.g., Digital Health Consumer Survey in US, Accenture, 2020[2]) have shown that individuals rely on healthcare providers rather than software companies to adopt health applications. Independently, scholars have also demonstrated that citizens’ trust in government has eroded (Parent, Vandebeek, & Gemino, 2005; Spire, 2020). In the context of CCT, von Wyl et al. (2021) show that trust in government is correlated with trust in the CCT app. Similarly, Dowthwaite et al. (2021) found that citizens who did not download the CCT app had significantly lower trust in the app as well as in other users and stakeholders involved in app design and implementation.
In addition, van Velsen et al. (2021) show that trust between patients and doctors can be transferred to eHealth services (more specifically to an eHealth portal for telerehabilitation). This transfer has not been conceptualized in the management field although Lee, Kang, & McKnight (2007) found that trust in an offline bank transfers (i.e., influences) perceptions about that company’s online bank. The conceptualization of this trust transfer in an eHealth ecosystem is an interesting avenue to extend TAM or to propose a new adoption model. Considering the CCT context, it is interesting to note that the implementation of most CCT apps, including the French CCT app has been decided and managed by governments (Kahnbach et al., 2021), who are not historically a major actor in the health ecosystem. It would be interesting to investigate the transfer of trust in government to trust in a CCT app beyond correlations which have already been documented in the literature (Dowthwaite et al., 2021). A promising research area is the role of ecosystem trust in the intention to adopt a CCT app, according to a new approach that highlights different levels of trust (e.g. trust in the care organization, trust in the care team and trust in the treatment (van Velsen et al., 2021), trust in the IT artifact (W. Wang & Benbasat, 2005) and institution-based trust (McKnight et al., 2002).
According to a fourth perspective, the dimensions of trust, competence, benevolence and integrity (McKnight et al., 2002) could be investigated further using more detailed scales than the one used in this paper (Venkatesh et al., 2016). This may allow for a finer understanding of how the different dimensions of trust individually influence intentions to adopt a CCT app. For example, an IT artefact may be considered competent but lacking in benevolence. In addition, while reliability influences BI, this concept and similar constructs such as technical performance should be extended to also consider technical issues related to an individual’s device (e.g., storage). To date, no model nor instrument exists to measure these issues. Further research could propose a new conceptualization of this construct.
Our study makes several significant contributions to the literature. Firstly, it is one of the few studies that measures the antecedents of intention to use a CCT app, and by extension of a citizen centered health app in a real-world context in which the app was installed, thus allowing users to test the app and to form perceptions such as PEOU and technical reliability. Indeed, existing studies have investigated antecedents in experiments (e.g., Trang et al., 2020) or in contexts in which apps were not installed by respondents (e.g., Altmann et al., 2020). As the use of such apps is expected to increase in the future, understanding the predictors of acceptance and actual use is useful for policy makers and app designers. Secondly, our study offers practical guidelines for policy making about potential antecedents of citizen health apps. Finally, while the current literature on the determinants of adoption and intention to adopt contact tracing apps to combat COVID-19 have focused mostly on potential benefits and privacy issues, our study highlights the importance of trust in those applications.
Our study also informs policy intervention. Indeed, the French government has emphasized the technical transparency of the app in relation to data privacy and security (e.g., by publication of the code source on GitHub), but our results show that these technical and rational arguments may not influence citizens as expected since most individuals chose to trust or not and form their beliefs prior to evaluating technical aspects.
Prior to concluding the paper, it is important to acknowledge its limitations. Firstly, the study employs a cross-sectional design which involves the collection of data at one moment in time. Future research could use a longitudinal approach to observe changes in the model over time, or a mixed-methods approach that uses both qualitative and quantitative research techniques (Venkatesh, Brown, & Bala, 2013). These approaches may be particularly relevant in times of a pandemic as consumer sentiment has been shown to change over time (Mehta, Saxena, & Purohit, 2020). Secondly, unobserved heterogeneity was not assessed in this study (Becker, Rai, Ringle, & Völckner, 2013) and future research could consider this issue during the data collection process.
Conclusion
In this article, we have theoretically developed and empirically validated a research model anchored in the TAM that integrates trust, privacy control and reliability as antecedents of the perceived ease of use, the perceived usefulness and intention to use a Coronavirus contact tracing app. The study is based on a survey conducted on a representative sample of French citizens and data were analyzed using structural equation modelling with PLS software. Trust was found to be the strongest predictor in the model, as it directly and indirectly influences perceived usefulness and intention to use a Coronavirus contact tracing app. Surprisingly, core TAM relationships between perceived ease of use and perceived usefulness, and between the perceived usefulness and use intentions were insignificant or weak suggesting that the TAM should be revised to integrate the trust variable in healthcare settings. While our findings validated the role of privacy control, trust and reliability as antecedents of perceived usefulness (for trust and privacy control) and ease of use (for reliability), more research is needed to further validate this model and to further investigate the role of trust and its dimensions.
Our paper extends the body of knowledge on digital health acceptance and use at the individual level of population wide health apps such as Coronavirus contact tracing apps, identifies promising research opportunities into the antecedents and consequences of citizen centered digital health and contributes to informing policy making in this domain.
Parties annexes
Appendix
Constructs and items used in the model
Biographical notes
Dr Roxana Ologeanu-Taddei is associate professor at TBS Education (Toulouse, France) in information systems management. Her research interests focus on the digital transformation of organizations, especially healthcare organizations. She has published in several academic journals in health or information systems management, including Journal of AIS and the French journal Systèmes d’information et management (SIM). In 2017, together with Guy Paré, she was the invited editor of the SIM special issue, Health IT. She supervised for Phd thesis related to the ehealth topic.
Dr Cameron Guthrie is an Associate Professor in decision and system sciences at TBS Education, (Toulouse, France). He earned his Ph.D. in management science at the Université de Paris Panthéon-Sorbonne. His current research focuses on technology adoption, digital strategy, social innovation, wicked problems and complex problem solving. He has published papers in a variety of journals including Technological Forecasting and Social Change, Journal of Retailing and Consumer Services, Knowledge Management Research & Practice, Business Process Management Journal, Industrial Relations, Accounting & Finance, Journal of Management History and Journal of Entrepreneurship Education.
Dr. Samuel Fosso Wamba is a Full Professor at TBS Education (Toulouse, France). He earned his Ph.D. in industrial engineering at the Polytechnic School of Montreal, Canada. His current research focuses on the business value of information technology, inter-organizational systems adoption, use and impacts, artificial intelligence for business, and big data. He is a CompTIA RFID+ Certified Professional, head of the Center of Excellence in Artificial Intelligence & Business Analytics at TBS Education. He was ranked among ClarivateTMs 1% most cited scholars and the 2% most influential scholars in the world for 2020 and 2021.
Notes
-
[1]
A Chi-squared test was conducted to compare the “installer” sample distribution with that of the general French population. The results are as follows: Gender χ 2= 13.55, df = 1, p > 0.05; Age χ 2= 2.98, df = 5, p < 0.05; Occupation χ 2= 3.06, df = 5, p < 0.05; Geographical area χ 2= 1.03, df = 4, p < 0.05.
-
[2]
https://www.accenture.com/_acnmedia/PDF-130/Accenture-2020-Digital-Health-Consumer-Survey-US.pdf
-
[3]
The concept of "perceived benefits" was used to measure PU as it was considered to be more appropriate in a healthcare setting.
Bibliography
- Aggelidis, Vassilios P; Chatzoglou, Prodromos D. (2009). “Using a modified technology acceptance model in hospitals,” International Journal of Medical Informatics, Vol. 78, No 2, p. 115-126. https://doi.org/10.1016/j.ijmedinf.2008.06.006
- Al-Dmour, Hani; Masa, ed; Salman, Amer; Abuhashesh, Mohammad; Al-Dmour, Rand. (2020). “Influence of social media platforms on public health protection against the COVID-19 pandemic via the mediating effects of public health awareness and behavioral changes: Integrated model,” Journal of Medical Internet Research, Vol. 8, No 8, e19857. https://doi.org/10.2196/19996
- Alsajjan, Bander; Dennis, Charles. (2010). “Internet banking acceptance model: Cross-market examination,” Journal of Business Research, Vol. 63, No 9-10, p. 957-963. https://doi.org/10.1016/j.jbusres.2008.12.014
- Altmann, Samuel; Milsom, Luke; Zillessen, Hannah; Blasone, Raffaele; Gerdon, Frederic; Bach, Ruben; Kreuter, Frauke; Nosenzo, Daniele; Toussaert, Séverine; Abeler, Johannes. (2020). “Acceptability of app-based contact tracing for Covid-19: cross-country survey study,” Journal of Medical Internet Research, Vol. 8, No 8, e19857. https://doi.org/10.2196%2F19857
- Awad, Neveen F; Ragowsky, Arik. (2008). “Establishing trust in electronic commerce through online word of mouth: An examination across genders,” Journal of Management Information Systems, Vol. 24, No 4, p. 101-121. https://doi.org/10.2753/MIS0742-1222240404
- Bandura, Albert. (1997). Self-efficacy: the exercise of control, New York, W. H. Freeman and Company.
- Bansal, Gaurav; Zahedi, Fatemeh ‘Mariam’; Gefen, David. (2015). “The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern,” European Journal of Information Systems, Vol. 24, No 6, p. 624-644. https://doi.org/10.1057/ejis.2014.41
- Becker, Jan Michael; Rai, Arun; Ringle, Christian M; Völckner, Franziska. (2013). “Discovering unobserved heterogeneity in structural equation models to avert validity threats,” MIS Quarterly: Management Information Systems, Vol. 37, No 3, p. 665-694. http://dx.doi.org/10.25300/MISQ/2013/37.3.01
- Bélanger, France; Crossler, Robert E. (2011). “Privacy in the digital age: a review of information privacy research in information systems,” Vol. 35, No 4, MIS Quarterly, p. 1017-1041. http://dx.doi.org/10.2307/41409971
- Bélanger, France; Hiller, Janine S; Smith, Wanda J. (2002). “Trustworthiness in electronic commerce: the role of privacy, security, and site attributes,” The Journal of Strategic Information Systems, Vol. 11, No 3-4, p. 245-270. https://doi.org/10.1016/S0963-8687(02)00018-
- Benbasat, Izak; Barki, Henri. (2007). “Quo vadis, TAM?,” Journal of the Association for Information Systems, Vol. 8, No 4, p. 211-218. http://dx.doi.org/10.17705/1jais.00126
- Bengio, Yoshua; Janda, Richard; Yu, Yun William; Ippolito, Daphne; Jarvie, Max; Pilat, Dan; Struck, Brooke; Krastev, Sekoul; Sharma, Abhinav. (2020). “The need for privacy with public digital contact tracing during the COVID-19 pandemic,” The Lancet Digital Health, Vol. 2, No 7, p. e342-e344. https://doi.org/10.1016%2FS2589-7500(20)30133-3
- Bullinger, Monika. (1995). “German translation and psychometric testing of the SF-36 health survey: preliminary results from the IQOLA project,” Social Science & Medicine, Vol. 41, No 10, p. 1359-1366. https://doi.org/10.1016/0277-9536(95)00115-N
- Burton-Jones, Andrew; Hubona, Geoffrey S. (2006). “The mediation of external variables in the technology acceptance model,” Information and Management, Vol. 43, No 6, p. 706-717. https://doi.org/10.1016/j.im.2006.03.007
- Carayon, Pascale; Hundt, Ann Schoofs; Wetterneck, Tosha B. (2010). “Nurses’ acceptance of Smart IV pump technology,” International Journal of Medical Informatics, Vol. 79, No 6, p. 401-411. https://doi.org/10.1016/j.ijmedinf.2010.02.001
- Carter, Lemuria; Bélanger, France. (2005). “The utilization of e-government services: Citizen trust, innovation and acceptance factors,” Information Systems Journal, Vol. 15, No 1, p. 5-25. https://doi.org/10.1111/j.1365-2575.2005.00183.x
- Cavoukian, Ann. (2009). “Privacy by design,” Take the challenge. Information and privacy commissioner of Ontario, Canada.
- Chandra, Shalini; Srivastava, Shirish C.; Theng, Yin-Leng. (2010). “Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis,” Communications of the Association for Information Systems, Vol. 27, No 1, p. 561-588. http://dx.doi.org/10.17705/1CAIS.02729
- Chau, Patrick Y K; Hu, Paul Jen-Hwa. (2002). “Investigating healthcare professionals’ decisions to accept telemedicine technology: an empirical test of competing theories,” Information & Management, Vol. 39, No 4, p. 297-311. https://doi.org/10.1016/S0378-7206(01)00098-2
- Chen, Hong-Ren; Tseng, Hsiao-Fen. (2012). “Factors that influence acceptance of web-based e-learning systems for the in-service education of junior high school teachers in Taiwan,” Evaluation and Program Planning, Vol. 35, No 3, p. 398-406. https://doi.org/10.1016/j.evalprogplan.2011.11.007
- Chin, Wynne W. (1998). “Issues and opinion on structural equation modeling,” MIS Quarterly, Vol. 22, No 1, p. vii—xvi.
- Chin, Wynne W. (2010). “How to write up and report PLS analyses,” in Handbook of Partial Least Squares, Springer, p. 655-690. https://doi.org/10.1007/978-3-540-32827-8_29
- Clarke, Roger. (1999). “Internet privacy concerns confirm the case for intervention,” Communications of the ACM, Vol. 42, No 2, p. 60-67. https://doi.org/10.1145/293411.293475
- Davis, Fred D. (1989). “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, Vol. 13, No 3, p. 319-340. https://doi.org/10.2307/249008
- Dinev, Tamara; McConnell, Allen R; Smith, H Jeff. (2015). “Research commentary—informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box,” Information Systems Research, Vol. 26, No 4, p. 639-655. https://doi.org/10.1287/isre.2015.0600
- Dowthwaite, Liz; Fischer, Joel; Vallejos, Elvira Perez; Portillo, Virginia; Nichele, Elena; Goulden, Murray; McAuley, Derek. (2021). “Public adoption of and trust in the nhs COVID-19 contact tracing app in the united kingdom: Quantitative online survey study,” Journal of Medical Internet Research, Vol. 23, No 9, e29085. https://doi.org/10.2196/29085
- Du, Wenyu (Derek).; Mao, Ji Ye. (2018). “Developing and maintaining clients’ trust through institutional mechanisms in online service markets for digital entrepreneurs: A process model,” The Journal of Strategic Information Systems, Vol. 27, No 4, p. 296-310. https://doi.org/10.1016/j.jsis.2018.07.001
- Duggal, Rishi; Brindle, Ingrid; Bagenal, Jessamy. (2018). “Digital healthcare: regulating the revolution,” BMJ, 360. https://doi.org/10.1136/bmj.k6
- Efron, Bradley; Tibshirani, Robert J. (1994). An introduction to the bootstrap, CRC press. https://doi.org/10.1201/9780429246593
- Fang, Yulin; Qureshi, Israr; Sun, Heshan; McCole, Patrick; Ramsey, Elaine; Lim, Kai H. (2014). “Trust, satisfaction, and online repurchase intention,” MIS Quarterly, Vol. 38, No 2, p. 407-428. https://doi.org/10.25300/MISQ/2014/38.2.04
- Ferretti, Luca; Wymant, Chris; Kendall, Michelle; Zhao, Lele; Nurtay, Anel; Abeler-Dörner, Lucie; Parker, Michael; Bonsall, David; Fraser, Christophe. (2020). “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing,” Science, Vol. 368, 6491. https://doi.org/10.1126/science.abb6936
- Fornell, Claes; Larcker, David F. (1981). “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No 1, p. 39-50. https://doi.org/10.2307/3151312
- Fox, Grace; Clohessy, Trevor; van der Werff, Lisa; Rosati, Pierangelo; Lynn, Theo. (2021). “Exploring the competing influences of privacy concerns and positive beliefs on citizen acceptance of contact tracing mobile applications,” Computers in Human Behavior, Vol. 121, 106806. https://doi.org/10.1016/j.chb.2021.106806
- Gefen, David; Karahanna, Elena; Straub, Detmar W. (2003a). “Inexperience and experience with online stores: The importance of TAM and trust,” IEEE Transactions on Engineering Management, Vol. 50, No 3, p. 307-321. http://dx.doi.org/10.1109/TEM.2003.817277
- Gefen, David; Karahanna, Elena; Straub, Detmar W. (2003b). “Trust and TAM in online shopping: An integrated model,” MIS Quarterly, Vol. 27, No 1, p. 51-90. https://doi.org/10.2307/30036519
- Gefen, David (2004). “What makes an ERP implementation relationship worthwhile: Linking trust mechanisms and ERP usefulness,” Journal of Management Information Systems, Vol. 21, No 1, p. 263-288. https://doi.org/10.1080/07421222.2004.11045792
- Gefen, David; Straub, Detmar W. (1997). “Gender differences in the perception and use of e-mail: An extension to the technology acceptance model,” MIS Quarterly, Vol. 21, No 4, p. 389-400. https://doi.org/10.2307/249720
- Gomez, Louis M; Egan, Dennis E.; Bowers, Cheryl. (1986). “Learning to use a text editor: Some learner characteristics that predict success,” Human-Computer Interaction, Vol. 2, No 1, p. 1-23. https://doi.org/10.1207/s15327051hci0201_1
- Goodhue, Dale L. (2007). “Comment on Benbasat and Barki’s “ Quo Vadis TAM” article,” Journal of the Association for Information Systems, Vol. 8, No 4, p. 219-222. https://doi.org/10.17705/1jais.00125
- Gu, Jie; Xu, Yunjie Calvin; Xu, Heng; Zhang, Cheng; Ling, Hong. (2017). “Privacy concerns for mobile app download: An elaboration likelihood model perspective,” Decision Support Systems, Vol. 94, p. 19-28. https://doi.org/10.1016/j.dss.2016.10.002
- Hair, Joseph F; Hult, G Tomas M; Ringle, Christian M; Sarstedt, Marko. (2016). A primer on partial least squares structural equation modeling (PLS-SEM)., Sage Publications.
- Hair, Joseph F; Ringle, Christian M; Sarstedt, Marko. (2011). “PLS-SEM: Indeed a silver bullet,” Journal of Marketing theory and Practice, Taylor & Francis, Vol. 19, No 2, p. 139-152. https://doi.org/10.2753/MTP1069-6679190202
- Hassandoust, Farkhondeh; Akhlaghpour, Saeed; Johnston, Allen C. (2021). “Individuals’ privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective,” Journal of the American Medical Informatics Association, Vol. 28, No 3, p. 463-471. https://doi.org/10.1093/jamia/ocaa240
- Hollenbeck, John R; Wright, Patrick M. (2017). “Harking, sharking, and tharking: making the case for post hoc analysis of scientific data,” Journal of Management, Vol. 43, No 1, p. 5-18. https://doi.org/10.1177/0149206316679487
- Horvath, Laszlo; Banducci, Susan; James, Oliver. (2020). “Citizens’ attitudes to contact tracing apps,” Journal of Experimental Political Science, p. 1-13. https://doi.org/10.1017/XPS.2020.30
- Howell, Bronwyn E.; Potgieter, Petrus H. (2021). “A tale of two contact-tracing apps — Comparing Australia’s COVIDSafe and New Zealand’s NZ COVID Tracer,” Digital Policy, Regulation and Governance, Vol. 23, No 5, p. 509-528. https://doi.org/10.1108/DPRG-06-2020-0075
- Islam, Muhammad Nazrul; Islam, Iyolita; Munim, Kazi Md; Islam, A. K.M.Najmul. (2020). “A review on the mobile applications developed for COVID-19: An exploratory analysis,” IEEE Access, Vol. 8, p. 145601-145610. https://doi.org/10.1109/ACCESS.2020.3015102
- Janssen, Marijn; van der Voort, Haiko. (2020). “Agile and adaptive governance in crisis response: Lessons from the COVID-19 pandemic,” International Journal of Information Management, Vol. 55, p. 102-180. https://doi.org/10.1016/j.ijinfomgt.2020.102180
- Kahnbach, Leonie; Lehr, Dirk; Brandenburger, Jessica; Mallwitz, Tim; Jent, Sophie; Hannibal, Sandy; Funk, Burkhardt; Janneck, Monique. (2021). “Quality and adoption of COVID-19 tracing apps and recommendations for development: Systematic interdisciplinary review of european apps,” Journal of Medical Internet Research, Vol. 23, No 6, e27989. https://doi.org/10.2196/27989
- Kamal, Syeda Ayesha; Shafiq, Muhammad; Kakria, Priyanka. (2020). “Investigating acceptance of telemedicine services through an extended technology acceptance model (TAM).,” Technology in Society, Vol. 60, p. 101-212. https://doi.org/10.1016/j.techsoc.2019.101212
- Kim, Gimun; Koo, Hoonyoung. (2016). “The causal relationship between risk and trust in the online marketplace: A bidirectional perspective,” Computers in Human Behavior, Vol. 55, p. 1020-1029. https://doi.org/10.1016/j.chb.2015.11.005
- King, William R; He, Jun. (2006). “A meta-analysis of the technology acceptance model,” Information & management, Vol. 43, No 6, p. 740-755. https://doi.org/10.1016/j.im.2006.05.003
- Kock, Ned; Lynn, Gary S. (2012). “Lateral collinearity and misleading results in variance-based SEM: An illustration and recommendations,” Journal of the Association for Information Systems, Vol. 13, No 7, p. 546-580. https://doi.org/10.17705/1jais.00302
- Kohli, Rajiv; Tan, Sharon Swee Lin. (2016). “Electronic health records: How can IS researchers contribute to transforming healthcare?,” MIS Quarterly, Vol. 40, No 3, p. 553-573. https://doi.org/10.25300/MISQ/2016/40.3.02
- Komiak, Sherrie Y X; Benbasat, Izak. (2006). “The effects of personalization and familiarity on trust and adoption of recommendation agents,” MIS Quarterly, Vol. 30, No 4, p. 941-960. https://doi.org/10.2307/25148760
- Lai, Vincent S; Li, Honglei. (2005). “Technology acceptance model for internet banking: An invariance analysis,” Information and Management, Vol. 42, No 2, p. 373-386. https://doi.org/10.1016/j.im.2004.01.007
- Lee, Kun Chang; Kang, Inwon; McKnight, D. Harrison. (2007). “Transfer from offline trust to key online perceptions: An empirical study,” IEEE Transactions on Engineering Management, Vol. 54, No 4, p. 729-741. https://doi.org/10.1109/TEM.2007.906851
- Lee, Younghwa; Kozar, Kenneth A; Larsen, Kai R.T. (2003). “The Technology Acceptance Model: Past, present, and future,” Communications of the Association for Information Systems, Vol. 12, p. 752‑780. https://doi.org/10.17705/1CAIS.01250
- Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y. (2011). “New threats to health data privacy,” BMC bioinformatics, Vol. 12, No 12, p. 1-7. https://doi.org/10.1186%2F1471-2105-12-S12-S7
- Li, Han; Gupta, Ashish; Zhang, Jie; Sarathy, Rathindra. (2014). “Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract,” Decision Support Systems, Vol. 57, p. 376-386. https://doi.org/10.1016/j.dss.2012.10.043
- Liao, Ziqi; Landry, Raymond. (2000). “Empirical study on organizational acceptance of new information systems in a commercial bank environment,” Proceedings of the Hawaii International Conference on System Sciences, p. 19-26. https://doi.org/10.1109/HICSS.2000.926665
- Lin, Shu-Ping; Yang, Hung-Yu. (2009). “Exploring key factors in the choice of e-health using an asthma care mobile service model,” Telemedicine and e-Health, Vol. 15, No 9, p. 884-890. https://doi.org/10.1089/tmj.2009.0047
- Liu, Ben Q; Goodhue, Dale L. (2012). “Two worlds of trust for potential e-commerce users: Humans as cognitive misers,” Information Systems Research, Vol. 23, No 4, p. 1246-1262. https://doi.org/10.1287/isre.1120.0424
- Liu, Liqun; Xie, Jingzhong; Li, Ke; Ji, Suhe. (2020). “Exploring how media influence preventive behavior and excessive preventive intention during the COVID-19 pandemic in China,” International Journal of Environmental Research and Public Health, Vol. 17, No 21, p. 1-27. https://doi.org/10.3390/ijerph17217990
- Lohar, Pintu; Xie, Guodong; Bendechache, Malika; Brennan, Rob; Celeste, Edoardo; Trestian, Ramona; Tal, Irina. (2021). “Irish attitudes toward COVID tracker app & privacy: Sentiment analysis on twitter and survey data,” ACM International Conference Proceeding Series, Association for Computing Machinery, August. https://doi.org/10.1145/3465481.3469193
- Lu, Yaobin; Yang, Shuiqing; Chau, Patrick Y. K.; Cao, Yuzhi. (2011). “Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective,” Information & Management, Vol. 48, No 8, p. 393-403. https://doi.org/10.1016/j.im.2011.09.006
- Luhmann, Niklas. (1979). “Trust and Power”, John A. Wiley and Sons, Chichester.
- Malhotra, Naresh K; Kim, Sung S; Agarwal, James. (2004). “Internet users’ information privacy concerns (IUIPC).: The construct, the scale, and a causal model,” Information Systems Research, Vol. 15, No 4, p. 336-355. https://doi.org/10.1287/isre.1040.0032
- Mayer, Roger C; Davis, James H; Schoorman, F David. (1995). “An integrative model of organizational trust,” Academy of Management Review, Vol. 20, No 3, p. 709-734. https://doi.org/10.2307/258792
- McKnight, D Harrison; Carter, Michelle; Thatcher, Jason Bennett; Clay, Paul F. (2011). “Trust in a specific technology: An investigation of its components and measures,” ACM Transactions on Management Information Systems (TMIS)., Vol. 2, No 2, p. 1-25. https://doi.org/10.1145/1985347.1985353
- McKnight, D Harrison; Choudhury, Vivek; Kacmar, Charles. (2002). “Developing and validating trust measures for e-commerce: An integrative typology,” Information Systems Research, Vol. 13, No 3, p. 334-359. https://doi.org/10.1287/isre.13.3.334.81
- Mehta, Seema; Saxena, Tanjul; Purohit, Neetu. (2020). “The new consumer behaviour paradigm amid COVID-19: Permanent or transient?,” Journal of Health Management, Vol. 22, No 2, p. 291-301. https://doi.org/10.1177/0972063420940834
- Möllering, Guido. (2001). “The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension,” Sociology, Vol. 35, No 2, p. 403-420. https://doi.org/10.1177/S0038038501000190
- Morley, Jessica; Cowls, Josh; Taddeo, Mariarosaria; Floridi, Luciano. (2020). “Ethical guidelines for COVID-19 tracing apps,” Nature, Vol. 582, p. 29-31. https://doi.org/10.1038/d41586-020-01578-0
- Nelson, R Ryan; Todd, Peter A; Wixom, Barbara H. (2005). “Antecedents of information and system quality: an empirical examination within the context of data warehousing,” Journal of Management Information Systems, Vol. 21, No 4, p. 199-235. https://doi.org/10.1080/07421222.2005.11045823
- Nicolaou, Andreas I.; McKnight, D. Harrison. (2006). “Perceived information quality in data exchanges: Effects on risk, trust, and intention to use,” Information Systems Research, Vol. 17, No 4, p. 332-351. https://doi.org/10.1287/isre.1060.0103
- Oldeweme, Andreas; Märtins, Julian; Westmattelmann, Daniel; Schewe, Gerhard. (2021). “The Role of Transparency, Trust, and Social Influence on Uncertainty Reduction in Times of Pandemics: Empirical Study on the Adoption of COVID-19 Tracing Apps,” Journal of Medical Internet Research, Vol. 23, No 2, e25893. https://doi.org/10.2196/25893
- Osman, Magda; Fenton, Norman E; Mclachlan, Scott; Lucas, Peter; Dube, Kudakwashe; Hitman, Graham A; Kyrimi, Evangelia; Neil, Martin. (2020). “COVID-19 special issue,” Journal of Behavioral Economics for Policy, Vol. 4, p. 57-61.
- Parent, Michael; Vandebeek, Christine A; Gemino, Andrew C. (2005). “Building citizen trust through e-government,” Government Information Quarterly, Vol. 22, No 4, p. 720-736. https://doi.org/10.1016/j.giq.2005.10.001
- Pavlou, Paul A. (2003). “Consumer acceptance of electronic commerce: integrating trust and risk with the Technology Acceptance Model,” International Journal of Electronic Commerce, Vol. 7, No 3, p. 101-134. https://doi.org/10.1080/10864415.2003.11044275
- Pereira, Olivier. (2020). “Why Should We Install the Coronalert Contact Tracing App?,” Technical Report Crypto group, UCLouvain, http://hdl.handle.net/2078.1/232991.
- Petrocchi, S; Iannello, P; Lecciso, F; Levante, A; Antonietti, A; Schulz, P J. (2019). “Interpersonal trust in doctor-patient relation: Evidence from dyadic analysis and association with quality of dyadic communication,” Social Science & Medicine, Vol. 235, 112391. https://doi.org/10.1016/j.socscimed.2019.112391
- Princi, Evgenia; Krämer, Nicole C. (2020). “Out of control — privacy calculus and the effect of perceived control and moral considerations on the usage of IoT healthcare devices,” Frontiers in Psychology, Vol. 11, 582054. https://doi.org/10.3389/fpsyg.2020.582054
- Ringle, Christian M; Wende, Sven; Becker, Jan-Michael. (2015). “SmartPLS 3,” SmartPLS GmbH.
- Rowe, Frantz; Ngwenyama, Ojelanki; Richet, Jean Loup. (2020). “Contact-tracing apps and alienation in the age of COVID-19,” European Journal of Information Systems, Vol. 29, No 5, p. 545-562. https://doi.org/10.1080/0960085X.2020.1803155
- Sadeh, Norman; Hong, Jason; Cranor, Lorrie; Fette, Ian; Kelley, Patrick; Prabaker, Madhu; Rao, Jinghai. (2009). “Understanding and capturing people’s privacy policies in a mobile social networking application,” Personal and Ubiquitous Computing, Vol. 13, No 6, p. 401-412. http://dx.doi.org/10.1007/s00779-008-0214-3
- Sajid, Anam; Abbas, Haider. (2016). “Data privacy in cloud-assisted healthcare systems: state of the art and future challenges,” Journal of Medical Systems, Vol. 6, No 40, p. 1-16. https://doi.org/10.1007/s10916-016-0509-2
- Sharma, Shavneet; Singh, Gurmeet; Sharma, Rashmini; Jones, Paul; Kraus, Sascha; Dwivedi, Yogesh K. (2020). “Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps,” IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2020.3019033
- Shaw, Neal G. (2002). “Capturing the technological dimensions of IT infrastructure change: A model and empirical evidence,” Journal of the Association for Information Systems, Vol. 2, No 1, p. 8. http://doi.org/10.17705/1jais.00020
- Spire, Alexis. (2020). “2. La confiance dans l’État: une relation pratique et symbolique,” in Crises de confiance?, Paris, La Découverte, p. 37-55. https://doi.org/10.3917/dec.senik.2020.01.0037
- Srinivasan, Ananth. (1985). “Alternative measures of system effectiveness: associations and implications,” MIS Quarterly, Vol. 9, No 3, p. 243-253. https://doi.org/10.2307/248951
- Stajkovic, Alexander D.; Luthans, Fred. (1998). “Self-efficacy and work-related performance: A meta-analysis,” Psychological Bulletin, Vol. 124, No 2, p. 240-261. https://doi.org/10.1037/ 0033-2909.124.2.240
- Straub, Detmar W.; Burton-Jones, Andrew. (2007). “Veni, vidi, vici: Breaking the TAM logjam,” Journal of the Association for Information Systems, Vol. 8, No 4, p. 223-229. http://dx.doi.org/10.17705/1jais.00124
- Suh, Bomil; Han, Ingoo. (2003). “The impact of customer trust and perception of security control on the acceptance of electronic commerce,” International Journal of Electronic Commerce, Vol. 7, No 3, p. 135-161. https://doi.org/10.1080/10864415.2003.11044270
- Taddei, Stefano; Contena, Bastianina. (2013). “Privacy, trust and control: Which relationships with online self-disclosure?,” Computers in Human Behavior, Vol. 29, No 3, p. 821-826. https://doi.org/10.1016/j.chb.2012.11.022
- Thatcher, Jason Bennett; McKnight, D Harrison; Baker, Elizabeth White; Arsal, Riza Ergun; Roberts, Nicholas H. (2010). “The role of trust in postadoption IT exploration: An empirical examination of knowledge management systems,” IEEE Transactions on Engineering Management, Vol. 58, No 1, p. 56-70. https://doi.org/10.1109/TEM.2009.2028320
- Touzani, Rajae; Schultz, Emilien; Holmes, Seth M.; Vandentorren, Stéphanie; Arwidson, Pierre; Guillemin, Francis; Rey, Dominique; Rouquette, Alexandra; Bouhnik, Anne Déborah; Mancini, Julien. (2021). “Early acceptability of a mobile app for contact tracing during the COVID-19 pandemic in France: National web-based survey,” JMIR mHealth and uHealth, Vol. 9, No 7, e27768. https://doi.org/10.2196/27768
- Trang, Simon; Trenz, Manuel; Weiger, Welf H; Tarafdar, Monideepa; Cheung, Christy M K. (2020). “One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps,” European Journal of Information Systems, Vol. 29, No 4, p. 415-428. https://doi.org/10.1080/0960085X.2020.1784046
- Tuckson, Reed V; Edmunds, Margo; Hodgkins, Michael L. (2017). “Telehealth,” New England Journal of Medicine, Vol. 377, No 16, p. 1585-1592. http://doi.org/10.1056/NEJMsr1503323
- Tung, Feng Cheng; Chang, Su Chao; Chou, Chi Min. (2008). “An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry,” International Journal of Medical Informatics, Vol. 77, No 5, p. 324-335. https://doi.org/10.1016/j.ijmedinf.2007.06.006
- Vance, Anthony; Elie-Dit-Cosaque, Christophe; Straub, Detmar W. (2008). “Examining trust in information technology artifacts: The effects of system quality and culture,” Journal of Management Information Systems, Vol. 24, No 4, p. 73-100. https://doi.org/10.2753/MIS0742-1222240403
- Värri, Alpo; Delgado, Jaime; Gallos, Parisis; Hägglund, Maria; Häyrinen, Kristiina; Kinnunen, Ulla-Mari; Pape-Haugaard, Louise B; Peltonen, Laura-Maria; Saranto, Kaija; Scott, Philip. (2020). Integrated Citizen Centered Digital Health and Social Care: Citizens as Data Producers and Service co-Creators, Studies in Health Technology and Informatics, Amsterdam, IOS Press, 243 p.
- van Velsen, Lex; Flierman, Ina; Tabak, Monique. (2021). “The formation of patient trust and its transference to online health services: the case of a Dutch online patient portal for rehabilitation care,” BMC Medical Informatics and Decision Making, Vol. 21, No 1, p. 1-10. https://doi.org/10.1186/s12911-021-01552-4
- Venkatesh, Viswanath; Aloysius, John A; Hoehle, Hartmut; Burton, Scot. (2017). “Design and evaluation of auto-ID enabled shopping assistance artifacts in customers’ mobile phones: two retail store laboratory experiments,” MIS Quarterly, Vol. 41, No 1, p. 83-113.
- Venkatesh, Viswanath; Brown, Susan A; Bala, Hillol. (2013). “Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems,” MIS Quarterly, Vol. 37, No 1, p. 21-54. http://dx.doi.org/10.25300/MISQ/2013/37.1.02
- Venkatesh, Viswanath; Davis, Fred D. (1996). “A model of the antecedents of perceived ease of use: Development and test,” Decision Sciences, Vol. 27, No 3, p. 451-481. https://doi.org/10.1111/j.1540-5915.1996.tb00860.x
- Venkatesh, Viswanath; Davis, Fred D. (2000). “A theoretical extension of the technology acceptance model: Four longitudinal field studies,” Management Science, Vol. 46, No 2, p. 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- Venkatesh, Viswanath; Davis, Fred D.; Morris, Michael G. (2007). “Dead or alive? The development, trajectory and future of technology adoption research,” Journal of the Association for Information Systems, Vol. 8, No 4, p. 267-286. http://doi.org/10.17705/1jais.00120
- Venkatesh, Viswanath; Thong, James Y L; Chan, Frank K Y; Hu, Paul J H. (2016). “Managing citizens’ uncertainty in e-government services: The mediating and moderating roles of transparency and trust,” Information Systems Research, Vol. 27, No 1, p. 87-111. https://doi.org/10.1287/isre.2015.0612
- Vitari, Claudio; Ologeanu-Taddei, Roxana. (2018). “The intention to use an electronic health record and its antecedents among three different categories of clinical staff,” BMC Health Services Research, Vol. 18, p. 194. https://doi.org/10.1186/s12913-018-3022-0
- Walrave, Michel; Waeterloos, Cato; Ponnet, Koen. (2021). “Ready or not for contact tracing? Investigating the adoption intention of COVID-19 contact-tracing technology using an extended Unified Theory of Acceptance and Use of Technology Model,” Cyberpsychology, Behavior, and Social Networking, Vol. 24, No 6, p. 377-383. https://doi.org/10.1089/cyber.2020.0483
- Wang, Nan; Shen, Xiao-Liang; Sun, Yongqiang. (2013). “Transition of electronic word-of-mouth services from web to mobile context: A trust transfer perspective,” Decision Support Systems, Vol. 54, No 3, p. 1394-1403. https://doi.org/10.1016/j.dss.2012.12.015
- Wang, Weiquan; Benbasat, Izak. (2005). “Trust in and adoption of online recommendation agents,” Journal of the association for information systems, Association for Information Systems, Vol. 6, No 3, p. 72-101. http://doi.org/10.17705/1jais.00065
- Wixom, Barbara H; Todd, Peter A. (2005). “A theoretical integration of user satisfaction and technology acceptance,” Information Systems Research, Vol. 16, No 1, p. 85-102. http://dx.doi.org/10.1287/isre.1050.0042
- Wu, Ing-Long; Chen, Jian-Liang. (2005). “An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study,” International Journal of Human Computer Studies, Vol. 62, No 6, p. 784-808. https://doi.org/10.1016/j.ijhcs.2005.03.003
- Wu, Kuang-Wen; Huang, Shaio Yan; Yen, David C; Popova, Irina. (2012). “The effect of online privacy policy on consumer privacy concern and trust,” Computers in Human Behavior, Vol. 28, No 3, p. 889-897. https://doi.org/10.1016/j.chb.2011.12.008
- von Wyl, Viktor; Höglinger, Marc; Sieber, Chloé; Kaufmann, Marco; Moser, André; Serra-Burriel, Miquel; Ballouz, Tala; Menges, Dominik; Frei, Anja; Puhan, Milo Alan. (2021). “Drivers of acceptance of COVID-19 proximity tracing apps in Switzerland: Panel survey analysis,” JMIR Public Health and Surveillance, Vol. 7, No 1, e25701. https://doi.org/10.2196/25701
- Yang, Hee-dong; Yoo, Youngjin. (2004). “It’s all about attitude: revisiting the technology acceptance model,” Decision Support Systems, Vol. 38, No 1, p. 19-31. https://doi.org/10.1016/S0167-9236(03)00062-9
- Yang, Heng Li; Lin, Shiang Lin. (2015). “User continuance intention to use cloud storage service,” Computers in Human Behavior, Vol. 52, p. 219-232. https://doi.org/10.1016/j.chb.2015.05.057
- Zastrow, Mark. (2020). “Coronavirus contact-tracing apps: can they slow the spread of COVID-19?,” Nature, May 19.
- Zhang, Xiaoni; Prybutok, Victor R. (2003). “TAM: The Moderating Effect of Gender on Online Shopping,” Journal of International Information Management, Vol. 12, No 2, p. 99-118.
- Zhang, Xing; Liu, Shan; Chen, Xing; Wang, Lin; Gao, Baojun; Zhu, Qing. (2018). “Health information privacy concerns, antecedents, and information disclosure intention in online health communities,” Information & Management, Vol. 55, No 4, p. 482-493. https://doi.org/10.1016/j.im.2017.11.003
- Zimmermann, Bettina Maria; Fiske, Amelia; Prainsack, Barbara; Hangel, Nora; McLennan, Stuart; Buyx, Alena. (2021). “Early perceptions of COVID-19 contact tracing apps in German-speaking countries: Comparative mixed methods study,” Journal of Medical Internet Research, Vol. 23, No 2, e25525. https://doi.org/10.2196/25525
- Zobair, Khondker Mohammad; Sanzogni, Louis; Sandhu, Kuldeep. (2019). “Expectations of telemedicine health service adoption in rural Bangladesh,” Social Science and Medicine, Vol. 238, 112485. https://doi.org/10.1016/j.socscimed.2019.112485
Parties annexes
Notes biographiques
Dr Roxana Ologeanu-Taddei est professeur associé à TBS Education (Toulouse, France) en management des systèmes d’information. Elle s’intéresse particulièrement à la transformation numérique des organisations, dont notamment les organisations de santé. Elle a publié dans plusieurs revues académiques en santé ou en management des systèmes d’information, dont Journal of AIS et Systèmes d’information et management (SIM). Elle a coordonné en 2017, avec Guy Paré, le numéro spécial de SIM, Health IT. Par ailleurs, elle a encadré quatre thèses de doctorat portant sur la esanté.
Dr Cameron Guthrie est professeur associé en sciences de la décision à TBS Education (Toulouse, France). Il a obtenu son doctorat en sciences de gestion à l’Université de Paris Panthéon-Sorbonne. Ses recherches portent sur l’adoption de la technologie, la stratégie numérique, l’innovation sociale, les problèmes épineux et la résolution de problèmes complexes. Il a publié ses travaux dans diverses revues, telle que Technological Forecasting and Social Change, Journal of Retailing and Consumer Services, Knowledge Management Research & Practice, Business Process Management Journal, Industrial Relations, Journal of Management History and Journal of Entrepreneurship Education.
Dr Samuel Fosso Wamba est professeur titulaire à TBS Education (Toulouse, France). Il a obtenu son Ph.D. en génie industriel à l’École polytechnique de Montréal, au Canada. Ses recherches actuelles portent sur la valeur commerciale des technologies de l’information, l’adoption, l’utilisation et les impacts des systèmes inter-organisationnels, l’intelligence artificielle pour les entreprises et les données massives. Il est un professionnel certifié CompTIA RFID +, responsable du Centre d’excellence en intelligence artificielle et en analyse commerciale de TBS Education. Pour 2020 et 2021, ClarivateTMs l’a classé parmi le 1er pourcentage (1 %) des universitaires les plus cités et les 2 % des plus influents au monde.
Parties annexes
Notas biograficas
Dr Roxana Ologeanu-Taddei es profesora asociada de Toulouse Business School (Toulouse, Francia) en gestión de sistemas de información. Elle s’intéresse particulièrement à la transformación numérica de las organizaciones, no noten las organizaciones de salud. Ha publicado en varias revistas académicas en salud o gestión de sistemas de información, incluyendo Journal of AIS y Information Systems and Management (SIM). En 2017 coordinó, con Guy Paré, el número especial de SIM, Health IT. También ha dirigido cuatro tesis doctorales sobre e-salud.
El Dr. Cameron Guthrie es profesor asociado de ciencias de sistemas y decisiones en la TBS Education, (Toulouse, Francia). Obtuvo su doctorado en ciencias de la gestión en la Université de Paris Panthéon-Sorbonne. Ejerce sus investigaciones en el campo la adopción de tecnología, la estrategia digital, la innovación social y la resolución de problemas complejos. Ha publicado artículos en una variedad de revistas, incluidas Technological Forecasting and Social Change, Journal of Retailing and Consumer Services, Knowledge Management Research & Practice, Business Process Management Journal, Industrial Relations, Journal of Management History y Journal of Entrepreneurship Education.
Profesor Samuel Fosso Wamba es Catedrático titular en TBS Education (Toulouse, Francia). Obtuvo su pH.D (Doctorado) en ingeniería industrial en la Ecole polytecnique de Montréal, en Canadá. Sus ámbitos de investigación actuales incluyen el valor comercial de las tecnologías de la información; la adopción, el uso y los impactos de los sistemas interorganizativos, la inteligencia artificial para las empresas y los datos masivos. Samuel es un profesional certificado compTIA RFID +, responsable del Center of Excellence in Artificial Intelligence & Business Analytics en la TBS. Fue clasificado por Clarivate TMs en el primer percentaje (*1%) de los investigadores más citados y en los 2% de los más influyentes del mundo en 2020 y 2021.