{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T07:45:43Z","timestamp":1773906343179,"version":"3.50.1"},"reference-count":100,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T00:00:00Z","timestamp":1600214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JEIM"],"published-print":{"date-parts":[[2021,7,15]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Despite the increased use of wearables in education, little attention has been paid to why some students are more likely to adopt smartwatches than others. The question of what impacts the adoption of smartwatches in educational activities is still neglected. In addition, the question of how security determinants can affect the adoption of smartwatches by students has not been addressed yet. Hence, this study aims to develop a theoretical model by integrating the technology acceptance model (TAM) and protection motivation theory (PMT) to study students' adoption of smartwatches for educational purposes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Questionnaires were distributed to university students in Malaysia. A total of 679 valid responses were collected. The collected data were analyzed using partial least squares-structural equation modeling (PLS-SEM).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The results of data analysis provide support for the proposed model. Furthermore, the findings indicated that perceived vulnerability, self-efficacy, response efficacy, response cost, ease of use and perceived usefulness have significant effects on students' behavioral intention to use smartwatches for educational purposes. In addition, perceived ease of use of smartwatches for educational purposes helps students to realize the benefits of this technology.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This is an original study that develops a new holistic theoretical model by combining the PMT and TAM to study the effects of ease of use, usefulness and security-related factors on the adoption of smartwatches for educational purposes. The study offers practical implications for universities and higher education institutions to improve students' learning experiences to ensure their sustainability using new and innovative ways by exploiting new technologies such as smartwatches.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jeim-02-2020-0052","type":"journal-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:22:27Z","timestamp":1600482147000},"page":"1229-1251","source":"Crossref","is-referenced-by-count":65,"title":["Examining the roles of students' beliefs and security concerns for using smartwatches in higher education"],"prefix":"10.1108","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5269-5380","authenticated-orcid":false,"given":"Mostafa","family":"Al-Emran","sequence":"first","affiliation":[]},{"given":"Andrina","family":"Grani\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0726-6031","authenticated-orcid":false,"given":"Mohammed A.","family":"Al-Sharafi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1794-9103","authenticated-orcid":false,"given":"Nisreen","family":"Ameen","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Sarrab","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,9,16]]},"reference":[{"key":"key2021071505043323600_ref001","article-title":"Factors influencing the adoption of cloud incident handling strategy: a preliminary study in Malaysia","year":"2015"},{"key":"key2021071505043323600_ref002","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.chb.2015.11.036","article-title":"Developing a general extended technology acceptance model for e-learning (GETAMEL) by analysing commonly used external factors","volume":"56","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"key2021071505043323600_ref100","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1080\/10447318.2017.1357902","article-title":"Factors influencing the adoption of smart wearable devices","volume":"34","year":"2018","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"key2021071505043323600_ref003","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1007\/s10639-019-10062-w","article-title":"Do knowledge acquisition and knowledge sharing really affect e-learning adoption? An empirical study","volume":"25","year":"2020","journal-title":"Education and Information Technologies"},{"key":"key2021071505043323600_ref004","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.compedu.2018.06.008","article-title":"Technology acceptance model in m-learning context: a systematic review","volume":"125","year":"2018","journal-title":"Computers and Education"},{"key":"key2021071505043323600_ref005","first-page":"1","article-title":"What impacts learning with wearables? An integrated theoretical model","year":"2020","journal-title":"Interactive Learning Environments"},{"key":"key2021071505043323600_ref006","doi-asserted-by":"crossref","first-page":"2899","DOI":"10.1007\/s10639-019-10094-2","article-title":"An empirical examination of continuous intention to use m-learning: an integrated model","volume":"25","year":"2020","journal-title":"Education and Information Technologies"},{"key":"key2021071505043323600_ref007","first-page":"3","article-title":"EDUCAUSE horizon report 2019 higher education edition","volume-title":"EDUCAUSE Horizon Report 2019 Higher Education Edition","year":"2019"},{"issue":"4","key":"key2021071505043323600_ref008","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1057\/s41284-019-00170-0","article-title":"A security risk perception model for the adoption of mobile devices in the healthcare industry","volume":"32","year":"2019","journal-title":"Security Journal"},{"issue":"4","key":"key2021071505043323600_ref009","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s40692-016-0074-1","article-title":"Extending the TAM to examine the effects of quality features on mobile learning acceptance","volume":"3","year":"2016","journal-title":"Journal of Computers in Education"},{"key":"key2021071505043323600_ref010","unstructured":"Ameen, N. (2017), \u201cArab users' acceptance and use of mobile phones: a case of young users in Iraq, Jordan and UAE\u201d, Doctoral dissertation, Anglia Ruskin University."},{"key":"key2021071505043323600_ref011","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2018.1454877","article-title":"Towards closing the gender gap in Iraq: understanding gender differences in smartphone adoption and use","volume-title":"Information Technology for Development","year":"2019"},{"key":"key2021071505043323600_ref012","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106184","article-title":"Employees\u2019 behavioural intention to smartphone security: a gender-based, cross-national study","volume":"104","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2021071505043323600_ref013","first-page":"285","article-title":"The partial least squares (pls) approach to casual modeling: personal computer adoption ans use as an illustration","volume":"2","year":"1995","journal-title":"Technology Studies"},{"key":"key2021071505043323600_ref014","volume-title":"NMC horizon report: 2018 higher education","year":"2018"},{"key":"key2021071505043323600_ref015","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101209","article-title":"Exploring the determinants of users' continuance intention in smartwatches","volume":"60","year":"2020","journal-title":"Technology in Society"},{"issue":"2","key":"key2021071505043323600_ref016","doi-asserted-by":"publisher","DOI":"10.1080\/13548501003615282","article-title":"Psychosocial predictors of intentions to comply with bariatric surgery guidelines","volume":"15","year":"2010","journal-title":"Psychology, Health and Medicine"},{"issue":"3","key":"key2021071505043323600_ref017","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00173.x","article-title":"A paradigmatic and methodological examination of information systems research from 1991 to 2001","volume":"14","year":"2004","journal-title":"Information Systems Journal"},{"key":"key2021071505043323600_ref018","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/HICSS.2009.74","article-title":"Application of protection motivation theory to adoption of protective technologies","year":"2009"},{"key":"key2021071505043323600_ref101","first-page":"171","article-title":"Leveraging smartwatches to estimate students\u2019 perceived difficulty and interest in online video lectures","year":"2019"},{"issue":"1","key":"key2021071505043323600_ref019","doi-asserted-by":"publisher","first-page":"146","DOI":"10.4218\/etrij.2017-0082","article-title":"Determinants of the intention to protect personal information among Facebook users","volume":"40","year":"2018","journal-title":"ETRI Journal"},{"key":"key2021071505043323600_ref020","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.101245","article-title":"You inspire me and make my life better: investigating a multiple sequential mediation model of smartwatch continuance intention","volume":"65","year":"2019","journal-title":"Telematics and Informatics"},{"key":"key2021071505043323600_ref021","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.chb.2016.07.047","article-title":"Wearable technologies: the role of usefulness and visibility in smartwatch adoption","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2021071505043323600_ref022","volume-title":"Business Research","year":"2003"},{"issue":"2","key":"key2021071505043323600_ref023","doi-asserted-by":"publisher","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: development of a measure and initial test","volume":"19","year":"1995","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021071505043323600_ref024","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002","article-title":"Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: a protection motivation theory approach","volume":"48","year":"2015","journal-title":"Computers and Security"},{"issue":"3","key":"key2021071505043323600_ref025","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","year":"1989","journal-title":"MIS Quarterly"},{"key":"key2021071505043323600_ref026","doi-asserted-by":"publisher","article-title":"Towards the use of commercial wrist wearables in education","year":"2017","DOI":"10.1109\/EXPAT.2017.7984354"},{"issue":"3","key":"key2021071505043323600_ref027","first-page":"129","article-title":"Personal learning environments acceptance model: the role of need for cognition, e-learning satisfaction and students' perceptions","volume":"18","year":"2015","journal-title":"Educational Technology and Society"},{"issue":"1","key":"key2021071505043323600_ref028","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2019.02.001","article-title":"Applying the technology acceptance model in a three-countries study of smartwatch adoption","volume":"30","year":"2019","journal-title":"The Journal of High Technology Management Research"},{"issue":"6","key":"key2021071505043323600_ref029","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-06-2013-0031","article-title":"The effects of transformational leadership and ERP system self-efficacy on ERP system usage","volume":"27","year":"2014","journal-title":"Journal of Enterprise Information Management"},{"key":"key2021071505043323600_ref030","unstructured":"Elton, K. (2019), \u201cHow smart watches could revolutionalize the education industry, the innovation enterprise\u201d, available at: https:\/\/channels.theinnovationenterprise.com\/articles\/how-smart-watches-could-revolutionalize-the-education-industry."},{"issue":"7","key":"key2021071505043323600_ref031","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1080\/10494820.2017.1421560","article-title":"An extension of the technology acceptance model for online learning environments","volume":"26","year":"2018","journal-title":"Interactive Learning Environments"},{"key":"key2021071505043323600_ref032","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2014.09.024","article-title":"Evaluating traffic informers: testing the behavioral and social-cognitive effects of an adolescent bicycle safety education program","volume":"73","year":"2014","journal-title":"Accident Analysis and Prevention"},{"issue":"3","key":"key2021071505043323600_ref033","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10389-011-0456-9","article-title":"Technology acceptance as an influencing factor of hospital employees' compliance with data\u2010protection standards in Germany","volume":"20","year":"2012","journal-title":"Journal of Public Health"},{"issue":"4","key":"key2021071505043323600_ref034","doi-asserted-by":"publisher","DOI":"10.33407\/itlt.v66i4.2376","article-title":"Developing English skills by means of mobile applications","volume":"66","year":"2018","journal-title":"Information Technologies and Learning Tools"},{"issue":"9","key":"key2021071505043323600_ref035","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-03-2015-0087","article-title":"An empirical study of wearable technology acceptance in healthcare","volume":"115","year":"2015","journal-title":"Industrial Management and Data Systems"},{"issue":"4","key":"key2021071505043323600_ref036","article-title":"Effect of health education based on the protection motivation theory on malaria preventive behaviors in rural households of Kerman, Iran","volume":"5","year":"2014","journal-title":"International Journal of Preventive Medicine"},{"issue":"5","key":"key2021071505043323600_ref037","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2008-2363","article-title":"Effects through 24 months of an HIV\/AIDS prevention intervention program based on protection motivation theory among preadolescents in the Bahamas","volume":"123","year":"2009","journal-title":"Pediatrics"},{"issue":"5","key":"key2021071505043323600_ref038","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12864","article-title":"Technology acceptance model in educational context: a systematic literature review","volume":"50","year":"2019","journal-title":"British Journal of Educational Technology"},{"key":"key2021071505043323600_ref039","volume-title":"Multivariate Data Analysis: A Global Perspective","year":"2010"},{"issue":"2","key":"key2021071505043323600_ref040","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: indeed a silver bullet","volume":"19","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"key":"key2021071505043323600_ref102","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2016"},{"issue":"3","key":"key2021071505043323600_ref041","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1108\/IMDS-04-2016-0130","article-title":"An updated and expanded assessment of PLS-SEM in information systems research","volume":"117","year":"2017","journal-title":"Industrial Management and Data Systems"},{"issue":"1","key":"key2021071505043323600_ref042","first-page":"194","article-title":"Effectiveness of self-medication prevention in the elderly based on the protection motivation theory","volume":"8","year":"2017","journal-title":"International Journal of Advanced Biotechnology and Research"},{"issue":"1","key":"key2021071505043323600_ref043","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","year":"2015","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"7","key":"key2021071505043323600_ref103","first-page":"1","article-title":"Monitoring student activities with smartwatches: on the academic performance enhancement","volume":"19","year":"2019","journal-title":"Sensors"},{"key":"key2021071505043323600_ref044","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.001","article-title":"The effect of consumer innovativeness on perceived value and continuance intention to use smartwatch","volume":"67","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021071505043323600_ref045","doi-asserted-by":"publisher","DOI":"10.1108\/LHT-09-2016-0105","article-title":"What drives smartwatch adoption intention? Comparing Apple and non-Apple watches","volume":"35","year":"2017","journal-title":"Library Hi Tech"},{"issue":"1","key":"key2021071505043323600_ref046","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/ijerph14010008","article-title":"A study of personal health record user's behavioral model based on the PMT and UTAUT integrative perspective","volume":"14","year":"2017","journal-title":"International Journal of Environmental Research and Public Health"},{"issue":"2","key":"key2021071505043323600_ref047","doi-asserted-by":"publisher","first-page":"269","DOI":"10.2307\/3151627","article-title":"The pretest in survey research: issues and preliminary findings","volume":"19","year":"1982","journal-title":"Journal of Marketing Research"},{"key":"key2021071505043323600_ref048","unstructured":"IDC (2019), \u201cIDC forecasts steady double-digit growth for wearables as new capabilities and use cases expand the market opportunities\u201d, available at: https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS44930019."},{"issue":"16","key":"key2021071505043323600_ref049","first-page":"3825","article-title":"Assessing the behavioural intention of students towards learning management system, through technology acceptance model - case of Iraqi universities","volume":"95","year":"2017","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"7","key":"key2021071505043323600_ref050","doi-asserted-by":"publisher","DOI":"10.1177\/0017896917714288","article-title":"The effects of STI education on Korean adolescents using smartphone applications","volume":"76","year":"2017","journal-title":"Health Education Journal"},{"issue":"3","key":"key2021071505043323600_ref051","doi-asserted-by":"publisher","DOI":"10.2307\/25750691","article-title":"Fear appeals and information s ecurity behaviors: an empirical study","volume":"34","year":"2010","journal-title":"MIS Quarterly: Management Information Systems"},{"issue":"2","key":"key2021071505043323600_ref052","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s12528-014-9081-2","article-title":"Integrating user interface and personal innovativeness into the TAM for mobile learning in cyber university","volume":"26","year":"2014","journal-title":"Journal of Computing in Higher Education"},{"key":"key2021071505043323600_ref053","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101212","article-title":"Investigating acceptance of telemedicine services through an extended technology acceptance model (TAM)","volume":"60","year":"2020","journal-title":"Technology in Society"},{"issue":"4","key":"key2021071505043323600_ref054","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1080\/19325037.2009.10599097","article-title":"Development of an educational video to improve patient knowledge and communication with their healthcare providers about colorectal cancer screening","volume":"40","year":"2009","journal-title":"American Journal of Health Education"},{"issue":"4","key":"key2021071505043323600_ref055","doi-asserted-by":"publisher","DOI":"10.1108\/ITSE-05-2015-0011","article-title":"Learning with interactive whiteboards: determining the factors on promoting interactive whiteboards to students by Technology Acceptance Model","volume":"12","year":"2015","journal-title":"Interactive Technology and Smart Education"},{"issue":"4","key":"key2021071505043323600_ref056","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0126","article-title":"An acceptance model for smart watches: implications for the adoption of future wearable technology","volume":"25","year":"2015","journal-title":"Internet Research"},{"issue":"2","key":"key2021071505043323600_ref057","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.07.009","article-title":"Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective","volume":"50","year":"2011","journal-title":"Decision Support Systems"},{"issue":"2","key":"key2021071505043323600_ref058","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11","article-title":"Threat or coping appraisal: determinants of SMB executives\u2032 decision to adopt anti-malware software","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"key2021071505043323600_ref059","volume-title":"Qualitative Research Methods for the Social Sciences","year":"2016"},{"issue":"2","key":"key2021071505043323600_ref060","doi-asserted-by":"publisher","DOI":"10.1080\/10810730.2013.798372","article-title":"Can exergames impart health messages? Game play, framing, and drivers of physical activity among childSaunderren","volume":"19","year":"2014","journal-title":"Journal of Health Communication"},{"issue":"1","key":"key2021071505043323600_ref061","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10209-014-0348-1","article-title":"Technology acceptance model: a literature review from 1986 to 2013","volume":"14","year":"2015","journal-title":"Universal Access in the Information Society"},{"issue":"1","key":"key2021071505043323600_ref062","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","article-title":"Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory","volume":"30","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"key":"key2021071505043323600_ref104","first-page":"55","article-title":"Wearable technologies in education: a design space","year":"2019"},{"issue":"10","key":"key2021071505043323600_ref105","article-title":"Educational intervention based on protection motivation theory to improve Vitamin E and C consumption among Iranian factory workers","volume":"12","year":"2018","journal-title":"Journal of Clinical and Diagnostic Research"},{"issue":"1","key":"key2021071505043323600_ref064","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v19i1.2886","article-title":"Evaluation of online video usage and learning satisfaction: an extension of the technology acceptance model","volume":"19","year":"2018","journal-title":"International Review of Research in Open and Distance Learning"},{"issue":"11","key":"key2021071505043323600_ref065","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1080\/10447318.2017.1404779","article-title":"Watch it! factors driving continued feature use of the smartwatch","volume":"34","year":"2018","journal-title":"International Journal of Human-Computer Interaction"},{"key":"key2021071505043323600_ref066","article-title":"\u2018Evaluation of three adolescent sexual health programs in Ha Noi and Khanh Hoa Province, Vietnam","volume":"2012","year":"2012","journal-title":"AIDS Research and Treatment"},{"issue":"5","key":"key2021071505043323600_ref067","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"key2021071505043323600_ref068","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581259","article-title":"Impact of learning content on world heritage site preservation awareness in town of Luang Prabang, Lao Pdr: application of protection motivation theory","year":"2015","journal-title":"ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences"},{"key":"key2021071505043323600_ref069","article-title":"Investigating the acceptance of mobile library applications with an extended technology acceptance model (TAM)","volume":"145","year":"2020","journal-title":"Computers and Education"},{"key":"key2021071505043323600_ref070","unstructured":"Ringle, C.M., Wende, S. and Becker, J. (2015), \u201cSmartPLS 3. B\u00f6nningstedt: SmartPLS\u201d, available at: http:\/\/www.smartpls.com."},{"issue":"1","key":"key2021071505043323600_ref071","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change1","volume":"91","year":"1975","journal-title":"Journal of Psychology"},{"key":"key2021071505043323600_ref072","first-page":"113","article-title":"Protection motivation theory","volume-title":"Handbook of Health Behavior Research 1: Personal and Social Determinants","year":"1997"},{"key":"key2021071505043323600_ref073","doi-asserted-by":"crossref","first-page":"128445","DOI":"10.1109\/ACCESS.2019.2939467","article-title":"Exploring students' acceptance of E-learning through the development of a comprehensive technology acceptance model","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2021071505043323600_ref074","volume-title":"Research Methods for Business Students","year":"2012"},{"key":"key2021071505043323600_ref075","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2018.09.009","article-title":"The technology acceptance model (TAM): a meta-analytic structural equation modeling approach to explaining teachers' adoption of digital technology in education","volume":"128","year":"2019","journal-title":"Computers and Education"},{"key":"key2021071505043323600_ref076","article-title":"Towards haptic learning on a smartwatch","year":"2018"},{"key":"key2021071505043323600_ref077","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58481-2_17","article-title":"Improving healthcare with wearables: overcoming the barriers to adoption","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics","year":"2017"},{"issue":"4","key":"key2021071505043323600_ref078","first-page":"217","article-title":"A study of the use of wearable devices for healthy and enjoyable English as a foreign language learning in authentic contexts","volume":"21","year":"2018","journal-title":"Educational Technology and Society"},{"issue":"2","key":"key2021071505043323600_ref079","first-page":"238","article-title":"Operationalizing theoretical constructs in bloodborne pathogens training curriculum","volume":"23","year":"1996","journal-title":"Health Education and Behavior"},{"issue":"6","key":"key2021071505043323600_ref080","doi-asserted-by":"publisher","DOI":"10.1080\/13548506.2011.579983","article-title":"A protection motivation theory application to date rape education","volume":"16","year":"2011","journal-title":"Psychology, Health and Medicine"},{"key":"key2021071505043323600_ref081","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_12","article-title":"\u2018Employees\u2019 adherence to information security policies: an empirical study","volume-title":"IFIP International Federation for Information Processing","year":"2007"},{"issue":"6","key":"key2021071505043323600_ref082","doi-asserted-by":"publisher","DOI":"10.1177\/0735633116688320","article-title":"Investigating students' acceptance of a statistics learning platform using technology acceptance model","volume":"55","year":"2017","journal-title":"Journal of Educational Computing Research"},{"key":"key2021071505043323600_ref083","unstructured":"Statista (2020), \u201cWearables\u201d, available at: https:\/\/www.statista.com\/outlook\/319\/122\/wearables\/malaysia."},{"issue":"6","key":"key2021071505043323600_ref084","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.005","article-title":"A meta-analysis of e-learning technology acceptance: the role of user types and e-learning technology types","volume":"27","year":"2011","journal-title":"Computers in Human Behavior"},{"key":"key2021071505043323600_ref085","unstructured":"Symanovich, S. (2019), \u201cSmart watches and internet security: are my wearables secure?\u201d, available at: https:\/\/us.norton.com\/internetsecurity-iot-how-to-protect-your-connected-wearables.html."},{"key":"key2021071505043323600_ref106","first-page":"191","article-title":"Smartwatches for context-aware ubiquitous learning","volume-title":"In Project and Design Literacy as Cornerstones of Smart Education","year":"2020"},{"issue":"1","key":"key2021071505043323600_ref086","first-page":"30","article-title":"Towards the acceptance of RSS to support learning: an empirical study to validate the technology acceptance model in Lebanon","volume":"13","year":"2015","journal-title":"Electronic Journal of e-Learning"},{"key":"key2021071505043323600_ref087","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","year":"2016","journal-title":"Computers and Security"},{"issue":"2","key":"key2021071505043323600_ref088","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1037\/0021-9010.90.4.710","article-title":"Structural equation modeling in information systems research using partial least squares","volume":"11","year":"2010","journal-title":"Journal of Information Technology Theory and Application"},{"issue":"2","key":"key2021071505043323600_ref089","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","article-title":"Technology acceptance model 3 and a research agenda on interventions","volume":"39","year":"2008","journal-title":"Decision Sciences"},{"key":"key2021071505043323600_ref090","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.008","article-title":"Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret","volume":"77","year":"2018","journal-title":"Computers and Security"},{"issue":"1","key":"key2021071505043323600_ref091","doi-asserted-by":"publisher","DOI":"10.4102\/jef.v11i1.169","article-title":"Addressing the incremental risks associated with adopting bring your own device","volume":"11","year":"2018","journal-title":"Journal of Economic and Financial Sciences"},{"key":"key2021071505043323600_ref092","article-title":"Technology Acceptance Model in the Domains of LIS and Education: A Review of Selected Literature","year":"2017","journal-title":"Library Philosophy and Practice"},{"key":"key2021071505043323600_ref093","article-title":"A protection motivation theory approach to home wireless security","year":"2005"},{"key":"key2021071505043323600_ref107","first-page":"1","article-title":"Assessing the usability of smartwatches for academic cheating during exams","year":"2017"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-02-2020-0052\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-02-2020-0052\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:30:48Z","timestamp":1753396248000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/34\/4\/1229-1251\/447300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,16]]},"references-count":100,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,9,16]]},"published-print":{"date-parts":[[2021,7,15]]}},"alternative-id":["10.1108\/JEIM-02-2020-0052"],"URL":"https:\/\/doi.org\/10.1108\/jeim-02-2020-0052","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2020,9,16]]}}}