{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:41:00Z","timestamp":1774438860234,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:00:00Z","timestamp":1661904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:00:00Z","timestamp":1661904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10639-022-11294-z","type":"journal-article","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T11:02:42Z","timestamp":1661943762000},"page":"2727-2746","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Towards a wearable education: Understanding the determinants affecting students\u2019 adoption of wearable technologies using machine learning algorithms"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5269-5380","authenticated-orcid":false,"given":"Mostafa","family":"Al-Emran","sequence":"first","affiliation":[]},{"given":"Maryam N.","family":"Al-Nuaimi","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Arpaci","sequence":"additional","affiliation":[]},{"given":"Mohammed A.","family":"Al-Sharafi","sequence":"additional","affiliation":[]},{"given":"Bokolo","family":"Anthony Jnr.","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,31]]},"reference":[{"key":"11294_CR1","unstructured":"Ab Rahman, N. H., & Choo, K. K. R. (2015). Factors influencing the adoption of cloud incident handling strategy: A preliminary study in Malaysia. 2015 Americas Conference on Information Systems, AMCIS 2015."},{"key":"11294_CR2","doi-asserted-by":"publisher","unstructured":"Abraham, C., Boudreau, M. C., Junglas, I., & Watson, R. (2013). Enriching our theoretical repertoire: The role of evolutionary psychology in technology acceptance. European Journal of Information Systems. https:\/\/doi.org\/10.1057\/ejis.2011.25","DOI":"10.1057\/ejis.2011.25"},{"issue":"2","key":"11294_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179\u2013211.","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"11294_CR4","doi-asserted-by":"publisher","unstructured":"Al-Emran, M. (2021). Evaluating the use of smartwatches for learning purposes through the integration of the technology acceptance model and task-technology fit. International Journal of Human\u2013Computer Interaction. https:\/\/doi.org\/10.1080\/10447318.2021.1921481","DOI":"10.1080\/10447318.2021.1921481"},{"key":"11294_CR5","doi-asserted-by":"publisher","unstructured":"Al-Emran, M., Al-Maroof, R., Al-Sharafi, M. A., & Arpaci, I. (2020). What impacts learning with wearables? An integrated theoretical model. Interactive Learning Environments, 1\u201321. https:\/\/doi.org\/10.1080\/10494820.2020.1753216.","DOI":"10.1080\/10494820.2020.1753216"},{"issue":"4","key":"11294_CR6","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1108\/JEIM-02-2020-0052","volume":"34","author":"M Al-Emran","year":"2021","unstructured":"Al-Emran, M., Grani\u0107, A., Al-Sharafi, M. A., Ameen, N., & Sarrab, M. (2021). Examining the roles of students\u2019 beliefs and security concerns for using smartwatches in higher education. Journal of Enterprise Information Management, 34(4), 1229\u20131251. https:\/\/doi.org\/10.1108\/JEIM-02-2020-0052","journal-title":"Journal of Enterprise Information Management"},{"key":"11294_CR7","unstructured":"Alexander, B., Ashford-Rowe, K., Barajas-Murph, N., Dobbin, G., Knott, J., McCormack, M., & Weber, N. (2019). EDUCAUSE Horizon Report 2019 Higher Education Edition. EDUCAUSE Horizon Report 2019 Higher Education Edition, 3\u201341."},{"key":"11294_CR8","first-page":"209","volume-title":"Recent advances in intelligent systems and smart applications","author":"RA Al-Maroof","year":"2020","unstructured":"Al-Maroof, R. A., Arpaci, I., Al-Emran, M., Salloum, S. A., & Shaalan, K. (2020). Examining the acceptance of WhatsApp stickers through machine learning algorithms. In  Recent advances in intelligent systems and smart applications (pp. 209\u2013221). Springer."},{"key":"11294_CR9","doi-asserted-by":"publisher","unstructured":"Ameen, N., Tarhini, A., Shah, M. H., & Madichie, N. O. (2020). Employees\u2019 behavioural intention to smartphone security: A gender-based, cross-national study. Computers in Human Behavior, 104. https:\/\/doi.org\/10.1016\/j.chb.2019.106184.","DOI":"10.1016\/j.chb.2019.106184"},{"key":"11294_CR10","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.chb.2018.09.005","volume":"90","author":"I Arpaci","year":"2019","unstructured":"Arpaci, I. (2019). A hybrid modeling approach for predicting the educational use of mobile cloud computing services in higher education. Computers in Human Behavior, 90, 181\u2013187. https:\/\/doi.org\/10.1016\/j.chb.2018.09.005","journal-title":"Computers in Human Behavior"},{"key":"11294_CR11","doi-asserted-by":"publisher","first-page":"11943","DOI":"10.1007\/s11042-020-10340-7","volume":"80","author":"I Arpaci","year":"2021","unstructured":"Arpaci, I., Huang, S., Al-Emran, M., Al-Kabi, M. N., & Peng, M. (2021). Predicting the COVID-19 infection with fourteen clinical features using machine learning classification algorithms. Multimedia Tools and Applications, 80, 11943\u201311957. https:\/\/doi.org\/10.1007\/s11042-020-10340-7","journal-title":"Multimedia Tools and Applications"},{"key":"11294_CR12","doi-asserted-by":"publisher","unstructured":"Balapour, A., Reychav, I., Sabherwal, R., & Azuri, J. (2019). Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps. International Journal of Information Management. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.03.005","DOI":"10.1016\/j.ijinfomgt.2019.03.005"},{"key":"11294_CR13","doi-asserted-by":"publisher","unstructured":"Bautista, J. R., Rosenthal, S., Lin, T. T. C., & Theng, Y. L. (2018). Predictors and outcomes of nurses\u2019 use of smartphones for work purposes. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2018.03.008","DOI":"10.1016\/j.chb.2018.03.008"},{"key":"11294_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.chb.2018.05.023","volume":"87","author":"JM Blythe","year":"2018","unstructured":"Blythe, J. M., & Coventry, L. (2018). Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior, 87, 87\u201397. https:\/\/doi.org\/10.1016\/j.chb.2018.05.023","journal-title":"Computers in Human Behavior"},{"key":"11294_CR15","doi-asserted-by":"publisher","unstructured":"B\u00f6len, M. C. (2020). Exploring the determinants of users\u2019 continuance intention in smartwatches. Technology in Society. https:\/\/doi.org\/10.1016\/j.techsoc.2019.101209","DOI":"10.1016\/j.techsoc.2019.101209"},{"key":"11294_CR16","doi-asserted-by":"crossref","unstructured":"Buabeng-Andoh, C. (2018). Predicting students\u2019 intention to adopt mobile learning. Journal of Research in Innovative Teaching & Learning.","DOI":"10.1108\/JRIT-03-2017-0004"},{"key":"11294_CR17","doi-asserted-by":"publisher","unstructured":"Burns, A. J., Posey, C., Roberts, T. L., & Benjamin Lowry, P. (2017). Examining the relationship of organizational insiders\u2019 psychological capital with information security threat and coping appraisals. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2016.11.018","DOI":"10.1016\/j.chb.2016.11.018"},{"issue":"2","key":"11294_CR18","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0046016","volume":"56","author":"DT Campbell","year":"1959","unstructured":"Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81\u2013105.","journal-title":"Psychological Bulletin"},{"key":"11294_CR19","doi-asserted-by":"publisher","unstructured":"Chuah, S. H. W., Rauschnabel, P. A., Krey, N., Nguyen, B., Ramayah, T., & Lade, S. (2016). Wearable technologies: The role of usefulness and visibility in smartwatch adoption. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2016.07.047","DOI":"10.1016\/j.chb.2016.07.047"},{"issue":"2","key":"11294_CR20","doi-asserted-by":"publisher","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189\u2013211. https:\/\/doi.org\/10.2307\/249688","journal-title":"MIS Quarterly"},{"issue":"8","key":"11294_CR21","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1177\/0735633118805211","volume":"57","author":"M Dalvi-Esfahani","year":"2020","unstructured":"Dalvi-Esfahani, M., Wai Leong, L., Ibrahim, O., & Nilashi, M. (2020). Explaining students\u2019 continuance intention to use Mobile web 2.0 learning and their perceived learning: An integrated approach. Journal of Educational Computing Research Research, 57(8), 1956\u20132005.","journal-title":"Journal of Educational Computing Research Research"},{"key":"11294_CR22","doi-asserted-by":"publisher","unstructured":"Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A protection motivation theory approach. Computers and Security. https:\/\/doi.org\/10.1016\/j.cose.2014.11.002","DOI":"10.1016\/j.cose.2014.11.002"},{"issue":"3","key":"11294_CR23","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F Davis","year":"1989","unstructured":"Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319\u2013340. https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Quarterly"},{"key":"11294_CR24","doi-asserted-by":"publisher","unstructured":"Doane, A. N., Boothe, L. G., Pearson, M. R., & Kelley, M. L. (2016). Risky electronic communication behaviors and cyberbullying victimization: An application of protection motivation theory. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2016.02.010","DOI":"10.1016\/j.chb.2016.02.010"},{"key":"11294_CR25","unstructured":"Elton, K. (2019). How smart watches could revolutionalize the education industry. The Innovation Enterprise. https:\/\/channels.theinnovationenterprise.com\/articles\/how-smart-watches-could-revolutionalize-the-education-industry"},{"issue":"7","key":"11294_CR26","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.3390\/SU11072179","volume":"11","author":"RD Fan","year":"2019","unstructured":"Fan, R. D., Juinn, P., & Tan, B. (2019). Application of Information Technology in Preschool Aesthetic Teaching from the perspective of sustainable management. Sustainability, 11(7), 2179. https:\/\/doi.org\/10.3390\/SU11072179","journal-title":"Sustainability"},{"issue":"3","key":"11294_CR27","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10389-011-0456-9","volume":"20","author":"M Foth","year":"2012","unstructured":"Foth, M., Schusterschitz, C., & Flatscher-Th\u00f6ni, M. (2012). Technology acceptance as an influencing factor of hospital employees\u2019 compliance with data-protection standards in Germany. Journal of Public Health, 20(3), 253\u2013268. https:\/\/doi.org\/10.1007\/s10389-011-0456-9","journal-title":"Journal of Public Health"},{"key":"11294_CR28","doi-asserted-by":"publisher","unstructured":"Frank, E., Hall, M., Holmes, G., Kirkby, R., Pfahringer, B., Witten, I. H., & Trigg, L. (2009). Weka-a machine learning workbench for data mining. In Data Mining and Knowledge Discovery Handbook. https:\/\/doi.org\/10.1007\/978-0-387-09823-4_66.","DOI":"10.1007\/978-0-387-09823-4_66"},{"key":"11294_CR29","doi-asserted-by":"publisher","unstructured":"Ghaderi, Z., Hatamifar, P., & Ghahramani, L. (2019). How smartphones enhance local tourism experiences? Asia Pacific Journal of Tourism Research. https:\/\/doi.org\/10.1080\/10941665.2019.1630456","DOI":"10.1080\/10941665.2019.1630456"},{"key":"11294_CR30","volume-title":"Multivariate data analysis: A global perspective","author":"JF Hair","year":"2010","unstructured":"Hair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate data analysis: A global perspective. Pearson."},{"key":"11294_CR31","doi-asserted-by":"publisher","unstructured":"Hina, S., Panneer Selvam, D. D. D., & Lowry, P. B. (2019). Institutional governance and protection motivation: Theoretical insights into shaping employees\u2019 security compliance behavior in higher education institutions in the developing world. Computers and Security. https:\/\/doi.org\/10.1016\/j.cose.2019.101594","DOI":"10.1016\/j.cose.2019.101594"},{"key":"11294_CR32","doi-asserted-by":"publisher","unstructured":"Hsiao, K. L., & Chen, C. C. (2018). What drives smartwatch purchase intention? Perspectives from hardware, software, design, and value. Telematics and Informatics. https:\/\/doi.org\/10.1016\/j.tele.2017.10.002","DOI":"10.1016\/j.tele.2017.10.002"},{"issue":"2","key":"11294_CR33","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.tele.2015.08.014","volume":"33","author":"C-H Hsiao","year":"2016","unstructured":"Hsiao, C.-H., Chang, J.-J., & Tang, K.-Y. (2016). Exploring the influential factors in continuance usage of mobile social apps: Satisfaction, habit, and customer value perspectives. Telematics and Informatics, 33(2), 342\u2013355.","journal-title":"Telematics and Informatics"},{"key":"11294_CR34","unstructured":"IDC. (2019). IDC forecasts steady double-digit growth for wearables as new capabilities and use cases expand the market opportunities. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS44930019. Accessed 16 March 2021."},{"key":"11294_CR35","doi-asserted-by":"publisher","unstructured":"Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security. https:\/\/doi.org\/10.1016\/j.cose.2011.10.007","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"11294_CR36","doi-asserted-by":"publisher","unstructured":"Jansen, J., & van Schaik, P. (2018). Testing a model of precautionary online behaviour: The case of online banking. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2018.05.010","DOI":"10.1016\/j.chb.2018.05.010"},{"key":"11294_CR37","doi-asserted-by":"publisher","unstructured":"Jnr, B. A., Majid, M. A., & Romli, A. (2020). A generic study on green IT\/IS practice development in collaborative enterprise: Insights from a developing country. Journal of Engineering and Technology Management, 55. https:\/\/doi.org\/10.1016\/j.jengtecman.2020.101555","DOI":"10.1016\/j.jengtecman.2020.101555"},{"key":"11294_CR38","doi-asserted-by":"publisher","unstructured":"Jung, Y., Kim, S., & Choi, B. (2016). Consumer valuation of the wearables: The case of smartwatches. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2016.06.040","DOI":"10.1016\/j.chb.2016.06.040"},{"key":"11294_CR39","unstructured":"Kaplan, S. (1992). Environmental preference in a knowledge-seeking, knowledge-using organism.\u00a0In J. H. Barkow, L. Cosmides, & J. Tooby (Eds.), The adapted mind: Evolutionary psychology and the generation of culture (pp. 581\u2013598). Oxford University Press."},{"key":"11294_CR40","doi-asserted-by":"publisher","unstructured":"Kim, K. J. (2016). Round or Square? How Screen Shape Affects Utilitarian and Hedonic Motivations for Smartwatch Adoption. In Cyberpsychology, Behavior, and Social Networking. https:\/\/doi.org\/10.1089\/cyber.2016.0136.","DOI":"10.1089\/cyber.2016.0136"},{"key":"11294_CR41","doi-asserted-by":"publisher","unstructured":"Kim, K. J., & Shin, D. H. (2015). An acceptance model for smart watches: Implications for the adoption of future wearable technology. Internet Research. https:\/\/doi.org\/10.1108\/IntR-05-2014-0126","DOI":"10.1108\/IntR-05-2014-0126"},{"key":"11294_CR42","doi-asserted-by":"publisher","unstructured":"Krey, N., Chuah, S. H.-W., Ramayah, T., & Rauschnabel, P. A. (2019). How functional and emotional ads drive smartwatch adoption. Internet Research. https:\/\/doi.org\/10.1108\/intr-12-2017-0534","DOI":"10.1108\/intr-12-2017-0534"},{"key":"11294_CR43","doi-asserted-by":"publisher","unstructured":"Kusyanti, A., Ayu Catherina, H. P., & Lia Sari, Y. A. (2019). Protecting Facebook password: Indonesian users\u2019 motivation. Procedia Computer Science. https:\/\/doi.org\/10.1016\/j.procs.2019.11.231","DOI":"10.1016\/j.procs.2019.11.231"},{"key":"11294_CR44","doi-asserted-by":"publisher","unstructured":"Lee, Y. (2011). Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decision Support Systems. https:\/\/doi.org\/10.1016\/j.dss.2010.07.009","DOI":"10.1016\/j.dss.2010.07.009"},{"key":"11294_CR45","doi-asserted-by":"publisher","unstructured":"Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives\u2032 decision to adopt anti-malware software. European Journal of Information Systems. https:\/\/doi.org\/10.1057\/ejis.2009.11","DOI":"10.1057\/ejis.2009.11"},{"issue":"1","key":"11294_CR46","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s10639-017-9617-y","volume":"23","author":"Y Li","year":"2018","unstructured":"Li, Y., & Wang, L. (2018). Using iPad-based mobile learning to teach creative engineering within a problem-based learning pedagogy. Education and Information Technologies, 23(1), 555\u2013568. https:\/\/doi.org\/10.1007\/s10639-017-9617-y","journal-title":"Education and Information Technologies"},{"key":"11294_CR47","doi-asserted-by":"publisher","unstructured":"Lunney, A., Cunningham, N. R., & Eastin, M. S. (2016). Wearable fitness technology: A structural investigation into acceptance and perceived fitness outcomes. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2016.08.007","DOI":"10.1016\/j.chb.2016.08.007"},{"key":"11294_CR48","doi-asserted-by":"publisher","unstructured":"Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems. https:\/\/doi.org\/10.1080\/07421222.2017.1394083","DOI":"10.1080\/07421222.2017.1394083"},{"key":"11294_CR49","doi-asserted-by":"publisher","unstructured":"Meso, P., Ding, Y., & Xu, S. (2013). Applying protection motivation theory to information security training for college students. Journal of Information Privacy and Security. https:\/\/doi.org\/10.1080\/15536548.2013.10845672","DOI":"10.1080\/15536548.2013.10845672"},{"issue":"2","key":"11294_CR50","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1111\/j.1744-6570.2000.tb00206.x","volume":"53","author":"MG Morris","year":"2000","unstructured":"Morris, M. G., & Venkatesh, V. (2000). Age differences in technology adoption decisions: Implications for a changing work force. Personnel Psychology, 53(2), 375\u2013403. https:\/\/doi.org\/10.1111\/j.1744-6570.2000.tb00206.x","journal-title":"Personnel Psychology"},{"key":"11294_CR51","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jretconser.2018.03.017","volume":"43","author":"B Nascimento","year":"2018","unstructured":"Nascimento, B., Oliveira, T., & Tam, C. (2018). Wearable technology: What explains continuance intention in smartwatches? Journal of Retailing and Consumer Services, 43, 157\u2013169.","journal-title":"Journal of Retailing and Consumer Services"},{"key":"11294_CR52","unstructured":"Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are transforming competition. In Harvard Business Review."},{"key":"11294_CR53","doi-asserted-by":"publisher","unstructured":"Prodanova, J., San-Mart\u00edn, S., & Jimenez, N. (2018). Are you technologically prepared for mobile shopping? Service Industries Journal. https:\/\/doi.org\/10.1080\/02642069.2018.1492561","DOI":"10.1080\/02642069.2018.1492561"},{"issue":"4","key":"11294_CR54","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1007\/s10639-019-09869-4","volume":"24","author":"A Revythi","year":"2019","unstructured":"Revythi, A., & Tselios, N. (2019). Extension of technology acceptance model by using system usability scale to assess behavioral intention to use e-learning. Education and Information Technologies, 24(4), 2341\u20132355.","journal-title":"Education and Information Technologies"},{"issue":"1","key":"11294_CR55","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93\u2013114. https:\/\/doi.org\/10.1080\/00223980.1975.9915803","journal-title":"The Journal of Psychology"},{"issue":"1","key":"11294_CR56","doi-asserted-by":"publisher","first-page":"179","DOI":"10.2466\/pr0.1985.56.1.179","volume":"56","author":"RW Rogers","year":"1985","unstructured":"Rogers, R. W. (1985). Attitude change and information integration in fear appeals. Psychological Reports, 56(1), 179\u2013182. https:\/\/doi.org\/10.2466\/pr0.1985.56.1.179","journal-title":"Psychological Reports"},{"key":"11294_CR57","unstructured":"Rogers, R. W., & Prentice-Dunn, S. (1997). Protection motivation theory. In Handbook of health behavior research 1: Personal and social determinants (pp. 113\u2013132)."},{"key":"11294_CR58","doi-asserted-by":"publisher","unstructured":"Shin, W., & Kim, H. K. (2019). What motivates parents to mediate Children\u2019s use of smartphones? An application of the theory of planned behavior. Journal of Broadcasting and Electronic Media. https:\/\/doi.org\/10.1080\/08838151.2019.1576263","DOI":"10.1080\/08838151.2019.1576263"},{"key":"11294_CR59","unstructured":"Symanovich, S. (2019). Smart watches and internet security: Are my wearables secure? https:\/\/us.norton.com\/internetsecurity-iot-how-to-protect-your-connected-wearables.html. Accessed 16 March 2021."},{"issue":"1","key":"11294_CR60","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1108\/IMDS-01-2018-0009","volume":"119","author":"MS Talukder","year":"2019","unstructured":"Talukder, M. S., Chiong, R., Bao, Y., & Hayat Malik, B. (2019). Acceptance and use predictors of fitness wearable technology and intention to recommend: An empirical study. Industrial Management and Data Systems, 119(1), 170\u2013188. https:\/\/doi.org\/10.1108\/IMDS-01-2018-0009","journal-title":"Industrial Management and Data Systems"},{"issue":"4","key":"11294_CR61","doi-asserted-by":"publisher","first-page":"215824401350383","DOI":"10.1177\/2158244013503837","volume":"3","author":"PJB Tan","year":"2013","unstructured":"Tan, P. J. B. (2013). Applying the UTAUT to understand factors affecting the use of English e-learning websites in Taiwan. SAGE Open, 3(4), 2158244013503837. https:\/\/doi.org\/10.1177\/2158244013503837","journal-title":"SAGE Open"},{"issue":"2","key":"11294_CR62","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1177\/0539018414566670","volume":"54","author":"PJB Tan","year":"2015","unstructured":"Tan, P. J. B. (2015). English e-learning in the virtual classroom and the factors that influence ESL (English as a second language): Taiwanese citizens\u2019 acceptance and use of the modular object-oriented dynamic learning environment. Social Science Information, 54(2), 211\u2013228. https:\/\/doi.org\/10.1177\/0539018414566670","journal-title":"Social Science Information"},{"issue":"6","key":"11294_CR63","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.3390\/SU11061748","volume":"11","author":"PJB Tan","year":"2019","unstructured":"Tan, P. J. B. (2019). An empirical study of how the learning attitudes of college students toward English E-tutoring websites affect site sustainability. Sustainability, 11(6), 1748. https:\/\/doi.org\/10.3390\/SU11061748","journal-title":"Sustainability"},{"key":"11294_CR64","doi-asserted-by":"publisher","unstructured":"Tan, P. J. B., & Hsu, M. H. (2017). Understanding the needs and criteria of employees in the electronics industry for English e-learning website programmes. 2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2018-February, 504\u2013509. https:\/\/doi.org\/10.1109\/ICIEA.2017.8282897.","DOI":"10.1109\/ICIEA.2017.8282897"},{"issue":"6","key":"11294_CR65","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.29333\/EJMSTE\/86467","volume":"14","author":"PJB Tan","year":"2018","unstructured":"Tan, P. J. B., & Hsu, M. H. (2018). Designing a system for English evaluation and teaching devices: A PZB and TAM model analysis. Eurasia Journal of Mathematics, Science and Technology Education, 14(6), 2107\u20132119. https:\/\/doi.org\/10.29333\/EJMSTE\/86467","journal-title":"Eurasia Journal of Mathematics, Science and Technology Education"},{"key":"11294_CR66","doi-asserted-by":"publisher","unstructured":"Thompson, N., McGill, T. J., & Wang, X. (2017). \u201cSecurity begins at home\u201d: Determinants of home computer and mobile device security behavior. Computers and Security. https:\/\/doi.org\/10.1016\/j.cose.2017.07.003","DOI":"10.1016\/j.cose.2017.07.003"},{"issue":"8","key":"11294_CR67","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1108\/K-05-2018-0226","volume":"48","author":"A Vafaei-Zadeh","year":"2019","unstructured":"Vafaei-Zadeh, A., Thurasamy, R., & Hanifah, H. (2019). Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior. Kybernetes, 48(8), 1565\u20131585. https:\/\/doi.org\/10.1108\/K-05-2018-0226","journal-title":"Kybernetes"},{"key":"11294_CR68","doi-asserted-by":"publisher","unstructured":"Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information and Management. https:\/\/doi.org\/10.1016\/j.im.2012.04.002","DOI":"10.1016\/j.im.2012.04.002"},{"issue":"2","key":"11294_CR69","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273\u2013315. https:\/\/doi.org\/10.1111\/j.1540-5915.2008.00192.x","journal-title":"Decision Sciences"},{"key":"11294_CR70","doi-asserted-by":"publisher","unstructured":"Verkijika, S. F. (2018). Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret. Computers and Security. https:\/\/doi.org\/10.1016\/j.cose.2018.03.008","DOI":"10.1016\/j.cose.2018.03.008"},{"key":"11294_CR71","doi-asserted-by":"publisher","unstructured":"Wang, Y., Liang, J., Yang, J., Ma, X., Li, X., Wu, J., Yang, G., Ren, G., & Feng, Y. (2019). Analysis of the environmental behavior of farmers for non-point source pollution control and management: An integration of the theory of planned behavior and the protection motivation theory. Journal of Environmental Management. https:\/\/doi.org\/10.1016\/j.jenvman.2019.02.070","DOI":"10.1016\/j.jenvman.2019.02.070"},{"key":"11294_CR72","doi-asserted-by":"publisher","unstructured":"Warkentin, M., Johnston, A. C., Shropshire, J., & Barnett, W. D. (2016). Continuance of protective security behavior: A longitudinal study. Decision Support Systems. https:\/\/doi.org\/10.1016\/j.dss.2016.09.013","DOI":"10.1016\/j.dss.2016.09.013"},{"key":"11294_CR73","doi-asserted-by":"publisher","unstructured":"Wood, R., & Bandura, A. (1989). Social cognitive theory of organizational management. Academy of Management Review. https:\/\/doi.org\/10.5465\/amr.1989.4279067","DOI":"10.5465\/amr.1989.4279067"},{"key":"11294_CR74","doi-asserted-by":"publisher","unstructured":"Wu, L. H., Wu, L. C., & Chang, S. C. (2016). Exploring consumers\u2019 intention to accept smartwatch. Computers in Human Behavior. https:\/\/doi.org\/10.1016\/j.chb.2016.07.005","DOI":"10.1016\/j.chb.2016.07.005"},{"key":"11294_CR75","doi-asserted-by":"publisher","unstructured":"Yang, H., Lee, H., & Zo, H. (2017a). User acceptance of smart home services: An extension of the theory of planned behavior. Industrial Management and Data Systems. https:\/\/doi.org\/10.1108\/IMDS-01-2016-0017","DOI":"10.1108\/IMDS-01-2016-0017"},{"key":"11294_CR76","doi-asserted-by":"publisher","unstructured":"Yang, J., Zhang, Y., & Lanting, C. J. M. (2017b). Exploring the impact of QR codes in authentication protection: A study based on PMT and TPB. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-016-3743-5","DOI":"10.1007\/s11277-016-3743-5"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11294-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-022-11294-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11294-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T09:37:06Z","timestamp":1678354626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-022-11294-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,31]]},"references-count":76,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["11294"],"URL":"https:\/\/doi.org\/10.1007\/s10639-022-11294-z","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,31]]},"assertion":[{"value":"16 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}