{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T20:33:24Z","timestamp":1772656404570,"version":"3.50.1"},"reference-count":44,"publisher":"Emerald","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10,19]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>\u2013 The purpose of this paper is to investigate the factors associated with consumer\u2019s intention to adopt wearable technology in healthcare, and to examine the moderating effects of product type on consumer\u2019s adoption intention.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>\u2013 An integrated acceptance model was developed based on unified theory of acceptance and use of technology 2 (UTAUT2), protection motivation theory (PMT), and privacy calculus theory. The model was tested with 462 respondents using a survey.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>\u2013 Consumer\u2019s decision to adopt healthcare wearable technology is affected by factors from technology, health, and privacy perspectives. Specially, fitness device users care more about hedonic motivation, functional congruence, social influence, perceived privacy risk, and perceived vulnerability, but medical device users pay more attention to perceived expectancy, self-efficacy, effort expectancy, and perceived severity.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>\u2013 This study is among the first to investigate healthcare wearable device from behavioral perspective. It also helps to comprehensively understand emerging health information technology (HIT) acceptance from technology, health, and privacy perspectives.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/imds-03-2015-0087","type":"journal-article","created":{"date-parts":[[2015,10,22]],"date-time":"2015-10-22T13:05:38Z","timestamp":1445519138000},"page":"1704-1723","source":"Crossref","is-referenced-by-count":523,"title":["An empirical study of wearable technology acceptance in healthcare"],"prefix":"10.1108","volume":"115","author":[{"given":"Yiwen","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu, China"}]},{"given":"He","family":"Li","sequence":"additional","affiliation":[{"name":"Fogelman College of Business and Economics, The University of Memphis, Memphis, Tennessee, USA"}]},{"given":"Yan","family":"Luo","sequence":"additional","affiliation":[{"name":"Southwestern University of Finance and Economics, Chengdu, China"}]}],"member":"140","reference":[{"issue":"3","key":"2025072819431949300_b1","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","article-title":"Structural equation modeling in practice: a review and recommended two-step approach","volume":"103","author":"","year":"1988","journal-title":"Psychological Bulletin"},{"issue":"2","key":"2025072819431949300_b2","doi-asserted-by":"crossref","first-page":"339","DOI":"10.2307\/20650295","article-title":"Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion","volume":"33","author":"","year":"2009","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025072819431949300_b3","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","article-title":"The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization","volume":"30","author":"","year":"2006","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025072819431949300_b4","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","article-title":"The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online","volume":"49","author":"","year":"2010","journal-title":"Decision Support Systems"},{"issue":"3","key":"2025072819431949300_b5","doi-asserted-by":"crossref","first-page":"399","DOI":"10.2307\/25148690","article-title":"A model of adoption of technology in the household: a baseline model test and extension incorporating household life cycle","volume":"29","author":"","year":"2005","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025072819431949300_b6","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.artmed.2012.09.003","article-title":"Smart wearable systems: current status and future challenges","volume":"56","author":"","year":"2012","journal-title":"Artificial Intelligence in Medicine"},{"issue":"1","key":"2025072819431949300_b7","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1108\/IMDS-08-2014-0234","article-title":"Gender differences in satisfaction with Facebook users","volume":"115","author":"","year":"2015","journal-title":"Industrial Management & Data Systems"},{"issue":"1","key":"2025072819431949300_b8","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.ijnurstu.2014.05.010","article-title":"Attitudes and perceptions of adults of 60 years and older towards in-home monitoring of the activities of daily living with contactless sensors: an explorative study","volume":"52","author":"","year":"2015","journal-title":"International Journal of Nursing Studies"},{"issue":"1","key":"2025072819431949300_b10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"","year":"2006","journal-title":"Information Systems Research"},{"issue":"3","key":"2025072819431949300_b11","first-page":"295","article-title":"Information","volume":"22","author":"","year":"2013","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025072819431949300_b9","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","article-title":"Privacy calculus model in e-commerce \u2013 a study of Italy and the United States","volume":"15","author":"","year":"2006","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"2025072819431949300_b12","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","article-title":"A meta-analysis of research on protection motivation theory","volume":"30","author":"","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"1","key":"2025072819431949300_b13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"6","key":"2025072819431949300_b14","doi-asserted-by":"crossref","first-page":"1459","DOI":"10.1109\/TITB.2010.2053849","article-title":"Applying wearable solutions in dependent environments","volume":"14","author":"","year":"2010","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"2025072819431949300_b15","unstructured":"Hair, J.F.\n          , Anderson, R.E., Tatham, R.L. and Black, W.C. (1998),                   Multivariate Data Analysis                , Prentice-Hall, Englewood Cliffs, NJ."},{"issue":"4","key":"2025072819431949300_b16","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1197\/jamia.M2026","article-title":"Defining obtrusiveness in home telehealth technologies: a conceptual framework","volume":"13","author":"","year":"2006","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"11","key":"2025072819431949300_b17","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1016\/j.jbusres.2009.10.006","article-title":"Brand misconduct: consequences on consumer-brand relationships","volume":"63","author":"","year":"2010","journal-title":"Journal of Business Research"},{"key":"2025072819431949300_b18","doi-asserted-by":"crossref","unstructured":"Hung, S.Y.\n          , Tsai, J.C.A. and Chuang, C.C. (2014), \u201cInvestigating primary health care nurses\u2019 intention to use information technology: an empirical study in Taiwan\u201d,                   Decision Support Systems                , Vol. 57, pp. 331-342.","DOI":"10.1016\/j.dss.2013.09.016"},{"key":"2025072819431949300_b19","doi-asserted-by":"crossref","unstructured":"Johnson, M.P.\n          , Zheng, K. and Padman, R. (2014), \u201cModeling the longitudinality of user acceptance of technology with an evidence-adaptive clinical decision support system\u201d,                   Decision Support Systems                , Vol. 57, pp. 444-453.","DOI":"10.1016\/j.dss.2012.10.049"},{"issue":"3","key":"2025072819431949300_b20","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: an empirical study","volume":"34","author":"","year":"2010","journal-title":"MIS Quarterly"},{"key":"2025072819431949300_b21","doi-asserted-by":"crossref","unstructured":"Li, H.\n          , Gupta, A., Zhang, J. and Sarathy, R. (2014), \u201cExamining the decision to use standalone personal health record systems as a trust-enabled fair social contract\u201d,                   Decision Support Systems                , Vol. 57, pp. 376-386.","DOI":"10.1016\/j.dss.2012.10.043"},{"issue":"1","key":"2025072819431949300_b22","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijmedinf.2014.09.004","article-title":"Modeling factors explaining the acceptance, actual use and satisfaction of nurses using an electronic patient record in acute care settings: an extension of the UTAUT","volume":"84","author":"","year":"2015","journal-title":"International Journal of Medical Informatics"},{"key":"2025072819431949300_b23","unstructured":"Maisto, M.\n           (2013), \u201cWearable devices: 8 myths debunked\u201d,                   eWeek                , December 16, p. 14."},{"key":"2025072819431949300_b24","doi-asserted-by":"crossref","unstructured":"Miltgen, C.L.\n          , Popovi\u010d, A. and Oliveira, T. (2013), \u201cDeterminants of end-user acceptance of biometrics: integrating the \u2018big 3\u2019 of technology acceptance with privacy context\u201d,                   Decision Support Systems                , Vol. 56, pp. 103-114.","DOI":"10.1016\/j.dss.2013.05.010"},{"issue":"3","key":"2025072819431949300_b25","first-page":"738","article-title":"Electronic health records assimilation and physician identity evolution: an identity theory perspective","volume":"23","author":"","year":"2012","journal-title":"Information Systems Research"},{"issue":"4","key":"2025072819431949300_b26","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MTS.2013.2286419","article-title":"Comparing British and Japanese perceptions of a wearable ubiquitous monitoring device","volume":"32","author":"","year":"2013","journal-title":"IEEE Technology and Society Magazine"},{"issue":"3","key":"2025072819431949300_b27","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1093\/her\/1.3.153","article-title":"Protection motivation theory and preventive health: beyond the health belief model","volume":"1","author":"","year":"1986","journal-title":"Health Education Research"},{"issue":"1","key":"2025072819431949300_b28","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"","year":"1975","journal-title":"The Journal of Psychology"},{"issue":"5","key":"2025072819431949300_b29","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.elerap.2014.06.007","article-title":"Disclosing too much? Situational factors affecting information disclosure in social commerce environment","volume":"13","author":"","year":"2014","journal-title":"Electronic Commerce Research and Applications"},{"issue":"12","key":"2025072819431949300_b30","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1016\/j.ijmedinf.2009.08.001","article-title":"Elderly persons\u2019 perception and acceptance of using wireless sensor networks to assist healthcare","volume":"78","author":"","year":"2009","journal-title":"International Journal of Medical Informatics"},{"issue":"2","key":"2025072819431949300_b31","first-page":"183","article-title":"Understanding the acceptance of mobile health services: a comparison and integration of alternative models","volume":"14","author":"","year":"2013","journal-title":"Journal of Electronic Commerce Research"},{"key":"2025072819431949300_b32","unstructured":"Tehrani\n          , Kiana and Michael, A. (2014), \u201cWearable technology and wearable devices: everything you need to know\u201d,                   Wearable Devices Magazine                , March 26, available at: www.wearabledevices.com\/what-is-a-wearable-device\/"},{"issue":"1","key":"2025072819431949300_b34","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology","volume":"36","author":"","year":"2012","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025072819431949300_b33","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","author":"","year":"2003","journal-title":"MIS Quarterly"},{"issue":"10","key":"2025072819431949300_b35","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1080\/0144929X.2013.781221","article-title":"Exploring determinants of adoption intentions towards enterprise 2.0 applications: an empirical study","volume":"33","author":"","year":"2014","journal-title":"Behaviour & Information Technology"},{"issue":"3","key":"2025072819431949300_b36","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MCE.2014.2317895","article-title":"How wearables intersect with the cloud and the internet of things","volume":"3","author":"","year":"2014","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"4","key":"2025072819431949300_b37","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1037\/0278-6133.12.4.324","article-title":"Testing four competing theories of health-protective behavior","volume":"12","author":"","year":"1993","journal-title":"Health Psychology"},{"issue":"1","key":"2025072819431949300_b38","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1287\/isre.1050.0042","article-title":"A theoretical integration of user satisfaction and technology acceptance","volume":"16","author":"","year":"2005","journal-title":"Information Systems Research"},{"issue":"11","key":"2025072819431949300_b39","first-page":"23","article-title":"Wearable in the workplace","volume":"91","author":"","year":"2013","journal-title":"Harward Business Review"},{"issue":"7","key":"2025072819431949300_b40","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1108\/IMDS-05-2014-0146","article-title":"Mobile TV: a new form of entertainment?","volume":"114","author":"","year":"2014","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"2025072819431949300_b41","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.dss.2011.03.003","article-title":"The adoption of mobile healthcare by hospital\u2019s professionals: an integrative perspective","volume":"51","author":"","year":"2011","journal-title":"Decision Support Systems"},{"issue":"12","key":"2025072819431949300_b42","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: linking individual perceptions with institutional privacy assurances","volume":"12","author":"","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"2025072819431949300_b43","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","article-title":"The role of push-pull technology in privacy calculus: the case of location-based services","volume":"26","author":"","year":"2009","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"2025072819431949300_b44","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.1109\/TBME.2014.2309951","article-title":"Unobtrusive sensing and wearable devices for health informatics","volume":"61","author":"","year":"2014","journal-title":"IEEE Transactions on Biomedical Engineering"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMDS-03-2015-0087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-03-2015-0087\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/imds\/article-pdf\/115\/9\/1704\/1188214\/imds-03-2015-0087.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/imds\/article-pdf\/115\/9\/1704\/1188214\/imds-03-2015-0087.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:43:30Z","timestamp":1753746210000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/imds\/article\/115\/9\/1704\/175169\/An-empirical-study-of-wearable-technology"}},"subtitle":[],"editor":[{"given":"Dr","family":"Xiaojun Wang, Professor Leroy White and Professor Xu Chen","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,10,19]]},"references-count":44,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,10,19]]}},"URL":"https:\/\/doi.org\/10.1108\/imds-03-2015-0087","relation":{},"ISSN":["0263-5577","1758-5783"],"issn-type":[{"value":"0263-5577","type":"print"},{"value":"1758-5783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,19]]}}}