<?xml version="1.0" encoding="iso-8859-1" standalone="no"?>
<!DOCTYPE GmsArticle SYSTEM "http://www.egms.de/dtd/2.0.34/GmsArticle.dtd">
<GmsArticle xmlns:xlink="http://www.w3.org/1999/xlink">
  <MetaData>
    <Identifier>mibe000288</Identifier>
    <IdentifierDoi>10.3205/mibe000288</IdentifierDoi>
    <IdentifierUrn>urn:nbn:de:0183-mibe0002887</IdentifierUrn>
    <ArticleType>Research Article</ArticleType>
    <TitleGroup>
      <Title language="en">A new perspective on eHealth acceptance: Combining health-related factors with the Technology Acceptance Model</Title>
      <TitleTranslated language="de">Eine neue Perspektive auf die Akzeptanz von eHealth: Integration gesundheitsbezogener Einflussfaktoren in das Technologieakzeptanzmodell</TitleTranslated>
    </TitleGroup>
    <CreatorList>
      <Creator>
        <PersonNames>
          <Lastname>Grashof</Lastname>
          <LastnameHeading>Grashof</LastnameHeading>
          <Firstname>Robin</Firstname>
          <Initials>R</Initials>
        </PersonNames>
        <Address>Faculty of Health Care, Hochschule Niederrhein University of Applied Sciences, Reinarzstra&#223;e 49, 47805 Krefeld, Germany<Affiliation>Hochschule Niederrhein &#8211; University of Applied Sciences, Krefeld, Germany</Affiliation></Address>
        <Email>robin.grashof&#64;hs-niederrhein.de</Email>
        <Creatorrole corresponding="yes" presenting="no">author</Creatorrole>
      </Creator>
      <Creator>
        <PersonNames>
          <Lastname>Breil</Lastname>
          <LastnameHeading>Breil</LastnameHeading>
          <Firstname>Bernhard</Firstname>
          <Initials>B</Initials>
        </PersonNames>
        <Address>
          <Affiliation>Hochschule Niederrhein &#8211; University of Applied Sciences, Krefeld, Germany</Affiliation>
        </Address>
        <Creatorrole corresponding="no" presenting="no">author</Creatorrole>
      </Creator>
      <Creator>
        <PersonNames>
          <Lastname>Lipprandt</Lastname>
          <LastnameHeading>Lipprandt</LastnameHeading>
          <Firstname>Myriam</Firstname>
          <Initials>M</Initials>
        </PersonNames>
        <Address>
          <Affiliation>Institute of Medical Informatics, RWTH Aachen University, Aachen, Germany</Affiliation>
        </Address>
        <Creatorrole corresponding="no" presenting="no">author</Creatorrole>
      </Creator>
    </CreatorList>
    <PublisherList>
      <Publisher>
        <Corporation>
          <Corporatename>German Medical Science GMS Publishing House</Corporatename>
        </Corporation>
        <Address>D&#252;sseldorf</Address>
      </Publisher>
    </PublisherList>
    <SubjectGroup>
      <SubjectheadingDDB>610</SubjectheadingDDB>
      <Keyword language="en">technology acceptance</Keyword>
      <Keyword language="en">digital health</Keyword>
      <Keyword language="en">perceived threat</Keyword>
      <Keyword language="en">protection motivation</Keyword>
      <Keyword language="en">health behavior</Keyword>
      <Keyword language="de">Technologieakzeptanz</Keyword>
      <Keyword language="de">Digital Health</Keyword>
      <Keyword language="de">wahrgenommene Bedrohung</Keyword>
      <Keyword language="de">Schutzmotivation</Keyword>
      <Keyword language="de">Gesundheitsverhalten</Keyword>
      <SectionHeading language="en">EFMI STC 2025</SectionHeading>
    </SubjectGroup>
    <DatePublishedList>
      <DatePublished>20251017</DatePublished>
    </DatePublishedList>
    <Language>engl</Language>
    <License license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
      <AltText language="en">This is an Open Access article distributed under the terms of the Creative Commons Attribution 4.0 License.</AltText>
      <AltText language="de">Dieser Artikel ist ein Open-Access-Artikel und steht unter den Lizenzbedingungen der Creative Commons Attribution 4.0 License (Namensnennung).</AltText>
    </License>
    <SourceGroup>
      <Journal>
        <ISSN>1860-9171</ISSN>
        <Volume>21</Volume>
        <JournalTitle>GMS Medizinische Informatik, Biometrie und Epidemiologie</JournalTitle>
        <JournalTitleAbbr>GMS Med Inform Biom Epidemiol</JournalTitleAbbr>
      </Journal>
    </SourceGroup>
    <ArticleNo>16</ArticleNo>
  </MetaData>
  <OrigData>
    <Abstract language="de" linked="yes"><Pgraph>Die Akzeptanz von eHealth-L&#246;sungen durch Patienten ist nach wie vor begrenzt. Um besser zu verstehen, welche psychologischen Faktoren die Nutzung von Technologien beeinflussen, wird ein integratives Konzeptmodell vorgeschlagen, das das Technologieakzeptanzmodell (TAM) mit Elementen aus der Theorie der Schutzmotivation (PMT) und prozeduralen Aspekten des Gesundheitsverhaltens kombiniert. Das Modell beinhaltet eine Entscheidungsschleife, innerhalb der die Schutzmotivation die Nutzungsabsicht von eHealth-L&#246;sungen beeinflusst. Es wird eine Kosten-Nutzen-Absch&#228;tzung durchgef&#252;hrt, die sich auf die wahrgenommene N&#252;tzlichkeit von eHealth-L&#246;sungen konzentriert. Die Entscheidungsschleife erm&#246;glicht, die ver&#228;nderte Gesundheitszust&#228;nde und Nutzererfahrungen mit der Technologie zu ber&#252;cksichtigen. Der hier dargelegte Ansatz zielt darauf ab, eine empirische Untersuchung zu erm&#246;glichen, Modelle um gesundheitsspezifische Konstrukte zu erweitern und die Entwicklung adaptiver Bewertungsinstrumente zu unterst&#252;tzen. F&#252;r eine empirische Validierung des Modells sind weitere Forschungsarbeiten erforderlich.</Pgraph></Abstract>
    <Abstract language="en" linked="yes"><Pgraph>The adoption of eHealth solutions remains limited. To better understand internal factors influencing technology use, we propose an integrative conceptual model combining the Technology Acceptance Model (TAM) with elements from Protection Motivation Theory (PMT) and procedural aspects of health behavior. Our model includes a decision loop and integrates protection motivation to influence the Intention to Use. It introduces a Cost-Benefit Appraisal focused on the Perceived Usefulness of eHealth solutions. The decision loop enables to take account for changing health conditions and user experiences with the technology. Our approach aims to enable empirical evaluation, extend models to include health-specific constructs and support the development of adaptable evaluation tools. Future research is necessary for empirical validation.</Pgraph></Abstract>
    <TextBlock name="Introduction" linked="yes">
      <MainHeadline>Introduction</MainHeadline><Pgraph>According to Rose&#8217;s Prevention Paradox, an intervention can have a great impact on a population but a small impact on individuals <TextLink reference="1"></TextLink>. The limited appeal of digital healthcare offerings warrants further investigation. In the <Mark2>Technology Acceptance Model</Mark2> (TAM), <Mark2>Attitude Toward Using</Mark2> is affected by <Mark2>Perceived Usefulness</Mark2> and the <Mark2>Perceived Ease of Use</Mark2> of the system, whereas the Ease of Use also impacts the Perceived Usefulness. The Attitude Toward Using influences the <Mark2>Behavioral Intention to Use</Mark2>, impacting the <Mark2>Actual System Use</Mark2> <TextLink reference="2"></TextLink>. The <Mark2>Protection Motivation Theory</Mark2> (PMT) proposes <Mark2>Protection Motivation </Mark2>(PM) as the significant cause for security-related behavior (individuals&#8217; actions to protects their health). PM arises from a process called <Mark2>Threat Appraisal</Mark2>, in which an individual evaluates its <Mark2>Perceived Threat Severity</Mark2> (how serious its consequences would be) and <Mark2>Perceived Threat Vulnerability</Mark2> (how likely they are to be affected), and weighs these factors against the intrinsic and extrinsic maladaptive rewards of (in)action (e.g., convenience, time saved). In parallel, <Mark2>Coping Appraisal</Mark2> encompasses the assessment of Perceived Response Efficacy (how effective the protective action is) and self-efficacy (individual&#8217;s confidence in performing it), against Perceived Response Costs (e.g., financial or effort-related burdens). Together, Threat and Coping Appraisal shape PM and thereby influence the intention to engage in security-related behaviors <TextLink reference="3"></TextLink>. We want to consider factors influencing individual&#8217;s use of eHealth solutions. Particularly in the context of degenerative diseases, where patients&#8217; needs, health status, and coping strategies evolve over time, longitudinal studies are crucial for understanding technology acceptance as a dynamic process. Yet, this specific intersection &#8211; acceptance trajectories in progressively worsening health conditions &#8211; remains largely underexplored in current research. To improve research, understanding and consideration of internal health-related factors in using eHealth solutions, we aim to derive a basic model with properties from existing models in technology acceptance and health psychology. Due to changing circumstances in dealing with diseases we also want to take account to temporal aspects. Synthesize a testable theoretical model based on established constructs, focusing on internal processes and facilitating the development of evaluation tools for health-related determinants of technology acceptance.</Pgraph></TextBlock>
    <TextBlock name="Methods" linked="yes">
      <MainHeadline>Methods</MainHeadline><Pgraph>To clarify the conceptual nature of our model, we propose a hypothetical framework for operationalization. Our objective is to start with the established TAM to describe technology acceptance. To increase explained variance within the health context, we extend the model with specific health behavior-related factors and focus on theories giving specific internal constructs and processes from health behavior models. After Guo et al. demonstrated PMT to be adequate for research in eHealth-context <TextLink reference="4"></TextLink>, we adopt PMT components but more precisely and including use behavior. Since the importance of temporal aspects in health behavior change <TextLink reference="5"></TextLink> and internet interventions have been demonstrated <TextLink reference="6"></TextLink>, we will include a dynamic component in form of a decision loop to consider change in decisions and behavior. Constructs as perceived vulnerability, health motivation, and decisio<TextGroup><PlainText>n f</PlainText></TextGroup>eedback are mapped to measurable variables, based on established health behavior models. These could serve as the basis for future empirical testing.</Pgraph></TextBlock>
    <TextBlock name="Results" linked="yes">
      <MainHeadline>Results</MainHeadline><Pgraph>The proposed conceptual model is displayed in Figure 1 <ImgLink imgNo="1" imgType="figure" />. As a base, we use the TAM with its fundamental coherences. PM is hypothesized to influence the Intention to Use Behavior, which also means a current decision against actual use. PM is affected by Perceived Threat Vulnerability and Perceived Threat Severity. We propose that users conduct a Cost-Benefit-Appraisal which influences the Protection Motivation. Here, we omit the efficacy constructs included in PMT and propose that efficacy of the eHealth solution is decisive for this appraisal. Hence, Perceived Usefulness exerts an influence on the appraisal which means that this factor is significant. After one decision loop, a user will develop experiential insights with or without the technology while changes in the health status may become apparent. Then, the user will run through the decision loop again, potentially informed by novel experiences or changed health-related circumstances as the starting point for the next loop, potentially with unlimited reiterations. Our model enables the formulation of longitudinal hypotheses about user engagement, such as how changing perceptions of vulnerability influence app usage over time.</Pgraph></TextBlock>
    <TextBlock name="Discussion" linked="yes">
      <MainHeadline>Discussion</MainHeadline><Pgraph>The information systems success model proposed an interdependence between usage intentions&#47;system us<TextGroup><PlainText>e a</PlainText></TextGroup>nd the user satisfaction <TextLink reference="7"></TextLink>. Our model might itemize this relation for digital health contexts as it describes internal processes affecting use behavior as well as the system use behavior affecting future user satisfaction and future use intentions.</Pgraph><Pgraph>As the next step, the model needs empirical verification whereas its structure is incomplete due to its omissio<TextGroup><PlainText>n o</PlainText></TextGroup>f external factors. While empirical testing remains future work, a viable methodological approach would involve a longitudinal study to capture feedback effects within the decision loop. It is possible to collect data via a survey using established questionnaires (e.g., <TextLink reference="4"></TextLink>) and analyz<TextGroup><PlainText>e i</PlainText></TextGroup>t using hierarchical regression and structural equation models.</Pgraph></TextBlock>
    <TextBlock name="Notes" linked="yes">
      <MainHeadline>Notes</MainHeadline><SubHeadline>Competing interests</SubHeadline><Pgraph>The authors declare that they have no competing interests.</Pgraph></TextBlock>
    <References linked="yes">
      <Reference refNo="1">
        <RefAuthor>Rose G</RefAuthor>
        <RefTitle>Strategy of prevention: lessons from cardiovascular disease</RefTitle>
        <RefYear>1981</RefYear>
        <RefJournal>Br Med J (Clin Res Ed)</RefJournal>
        <RefPage>1847-51</RefPage>
        <RefTotal>Rose G. Strategy of prevention: lessons from cardiovascular disease. Br Med J (Clin Res Ed). 1981 Jun 6;282(6279):1847-51. DOI: 10.1136&#47;bmj.282.6279.1847</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.1136&#47;bmj.282.6279.1847</RefLink>
      </Reference>
      <Reference refNo="2">
        <RefAuthor>Davis FD</RefAuthor>
        <RefTitle>Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology</RefTitle>
        <RefYear>1989</RefYear>
        <RefJournal>MIS Quarterly</RefJournal>
        <RefPage>319</RefPage>
        <RefTotal>Davis FD. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly. 1989 Sep;13(3):319. DOI: 10.2307&#47;249008</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.2307&#47;249008</RefLink>
      </Reference>
      <Reference refNo="3">
        <RefAuthor>Balla J</RefAuthor>
        <RefAuthor>Hagger MS</RefAuthor>
        <RefTitle>Protection motivation theory and health behaviour: conceptual review, discussion of limitations, and recommendations for best practice and future research</RefTitle>
        <RefYear>2025</RefYear>
        <RefJournal>Health Psychol Rev</RefJournal>
        <RefPage>145-71</RefPage>
        <RefTotal>Balla J, Hagger MS. Protection motivation theory and health behaviour: conceptual review, discussion of limitations, and recommendations for best practice and future research. Health Psychol Rev. 2025 Mar;19(1):145-71. 
DOI: 10.1080&#47;17437199.2024.2413011</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.1080&#47;17437199.2024.2413011</RefLink>
      </Reference>
      <Reference refNo="4">
        <RefAuthor>Guo X</RefAuthor>
        <RefAuthor>Han X</RefAuthor>
        <RefAuthor>Zhang X</RefAuthor>
        <RefAuthor>Dang Y</RefAuthor>
        <RefAuthor>Chen C</RefAuthor>
        <RefTitle>Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences</RefTitle>
        <RefYear>2015</RefYear>
        <RefJournal>Telemed J E Health</RefJournal>
        <RefPage>661-9</RefPage>
        <RefTotal>Guo X, Han X, Zhang X, Dang Y, Chen C. Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences. Telemed J E Health. 2015 Aug;21(8):661-9. DOI: 10.1089&#47;tmj.2014.0166</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.1089&#47;tmj.2014.0166</RefLink>
      </Reference>
      <Reference refNo="5">
        <RefAuthor>Prochaska JO</RefAuthor>
        <RefAuthor>Velicer WF</RefAuthor>
        <RefTitle>The transtheoretical model of health behavior change</RefTitle>
        <RefYear>1997</RefYear>
        <RefJournal>Am J Health Promot</RefJournal>
        <RefPage>38-48</RefPage>
        <RefTotal>Prochaska JO, Velicer WF. The transtheoretical model of health behavior change. Am J Health Promot. 1997 Sep-Oct;12(1):38-48. DOI: 10.4278&#47;0890-1171-12.1.38</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.4278&#47;0890-1171-12.1.38</RefLink>
      </Reference>
      <Reference refNo="6">
        <RefAuthor>Ritterband LM</RefAuthor>
        <RefAuthor>Thorndike FP</RefAuthor>
        <RefAuthor>Cox DJ</RefAuthor>
        <RefAuthor>Kovatchev BP</RefAuthor>
        <RefAuthor>Gonder-Frederick LA</RefAuthor>
        <RefTitle>A behavior change model for internet interventions</RefTitle>
        <RefYear>2009</RefYear>
        <RefJournal>Ann Behav Med</RefJournal>
        <RefPage>18-27</RefPage>
        <RefTotal>Ritterband LM, Thorndike FP, Cox DJ, Kovatchev BP, Gonder-Frederick LA. A behavior change model for internet interventions. Ann Behav Med. 2009 Aug;38(1):18-27. DOI: 10.1007&#47;s12160-009-9133-4</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.1007&#47;s12160-009-9133-4</RefLink>
      </Reference>
      <Reference refNo="7">
        <RefAuthor>DeLone WH</RefAuthor>
        <RefAuthor>McLean ER</RefAuthor>
        <RefTitle>Information Systems Success: The Quest for the Dependent Variable</RefTitle>
        <RefYear>1992</RefYear>
        <RefJournal>Information Systems Research</RefJournal>
        <RefPage>60-95</RefPage>
        <RefTotal>DeLone WH, McLean ER. Information Systems Success: The Quest for the Dependent Variable. Information Systems Research. 1992 Mar;3(1):60-95. DOI: 10.1287&#47;isre.3.1.60</RefTotal>
        <RefLink>https:&#47;&#47;doi.org&#47;10.1287&#47;isre.3.1.60</RefLink>
      </Reference>
    </References>
    <Media>
      <Tables>
        <NoOfTables>0</NoOfTables>
      </Tables>
      <Figures>
        <Figure width="940" height="380" format="png">
          <MediaNo>1</MediaNo>
          <MediaID>1</MediaID>
          <Caption><Pgraph><Mark1>Figure 1: Schematic figure of the proposed conceptional model. Outer bold lines frame one decision loop. Arrows display the effect direction. Components of original TAM are displayed with dotted lines. </Mark1><LineBreak></LineBreak>Effects enhancing TAM are labeled as follows: A &#61; PM effecting Intention to Use Behavior; B1 and B2 &#61; Perceived Threat effecting PM, C1, C2 and C3 &#61;effects concerning Cost-Benefit Appraisal effecting PM; D &#61; past decision loop(s) affecting next decision loop</Pgraph></Caption>
        </Figure>
        <NoOfPictures>1</NoOfPictures>
      </Figures>
      <InlineFigures>
        <NoOfPictures>0</NoOfPictures>
      </InlineFigures>
      <Attachments>
        <NoOfAttachments>0</NoOfAttachments>
      </Attachments>
    </Media>
  </OrigData>
</GmsArticle>