<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v21i8e15087</article-id>
      <article-id pub-id-type="pmid">31469078</article-id>
      <article-id pub-id-type="doi">10.2196/15087</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>The Association Between Willingness of Frontline Care Providers’ to Adaptively Use Telehealth Technology and Virtual Service Performance in Provider-to-Provider Communication: Quantitative Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Archer</surname>
            <given-names>Norman</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yen</surname>
            <given-names>Po-Yin</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Jalil</surname>
            <given-names>Sakib</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Signorelli</surname>
            <given-names>Gabriel</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Hah</surname>
            <given-names>Hyeyoung</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Information Systems and Business Analytics</institution>
            <institution>Florida International University</institution>
            <addr-line>11200 SW 8th Street</addr-line>
            <addr-line>Miami, FL, 33199</addr-line>
            <country>United States</country>
            <phone>1 3053484342</phone>
            <email>hyeyoung.hah@gmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-7763-1095</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Goldin</surname>
            <given-names>Deana</given-names>
          </name>
          <degrees>PhD, DNP</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-0262-2546</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Ha</surname>
            <given-names>Sejin</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-7915-7286</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Information Systems and Business Analytics</institution>
        <institution>Florida International University</institution>
        <addr-line>Miami, FL</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Nicole Wertheim College of Nursing &amp; Health Sciences</institution>
        <institution>Florida International University</institution>
        <addr-line>Miami, FL</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Retail, Hospitality, and Tourism Management</institution>
        <institution>College of Education, Health, and Human Sciences</institution>
        <institution>The University of Tennessee, Knoxville</institution>
        <addr-line>Knoxville, TN</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Hyeyoung Hah 
        <email>hyeyoung.hah@gmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><month>08</month><year>2019</year></pub-date>
      <pub-date pub-type="epub">
        <day>29</day>
        <month>08</month>
        <year>2019</year>
      </pub-date>
      <volume>21</volume>
      <issue>8</issue>
      <elocation-id>e15087</elocation-id>
      <history>
        <date date-type="received">
          <day>18</day>
          <month>6</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>16</day>
          <month>7</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>28</day>
          <month>7</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>28</day>
          <month>7</month>
          <year>2019</year>
        </date>
      </history>
      <copyright-statement>©Hyeyoung Hah, Deana Goldin, Sejin Ha. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 29.08.2019.</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.jmir.org/2019/8/e15087/" xlink:type="simple"/><related-article related-article-type="correction-forward" xlink:title="This is a corrected version. See correction statement in:" xlink:href="https://www.jmir.org/2019/11/e17123" vol="21" page="e17123"> </related-article>
      <abstract>
        <sec sec-type="Background">
          <title>Background</title>
          <p>Telehealth technology can create a disruptive communication environment for frontline care providers who mediate virtual communication with specialists in electronic consultations. As providers are dealing with various technology features when communicating with specialists, their flexible attitude and behaviors to use various telehealth-related technology features can change the outcome of virtual care service.</p>
        </sec>
        <sec sec-type="Objective">
          <title>Objective</title>
          <p>The objective of this study is to examine frontline care providers’ technology adaptation behaviors in the electronic consultation context. From the perspective of frontline care providers, we reapply and retest a theoretical model, reflecting a mechanism through which technology users’ personal characteristics and technology adaptation behavior enhance virtual service performance, which is an important performance enabler in this online meeting context. In provider-to-provider communication, particularly, we explore the association among providers’ information technology (IT)–related personal characteristics, adaptive telehealth technology use, and virtual service performance.</p>
        </sec>
        <sec sec-type="Methods">
          <title>Methods</title>
          <p>An online survey was administered to collect individual providers’ personal traits, IT adaptation, and perception on virtual service performance. Partial least squares-structural equation modeling was used to estimate our predictive model of personal traits—IT adaptation, such as exploitative use (use the telehealth technology in a standard way), and exploratory use (use the telehealth technology as innovative way)—and virtual service performance.</p>
        </sec>
        <sec sec-type="Results">
          <title>Results</title>
          <p>We collected 147 responses from graduate nursing students who were training to be nurse practitioners in their master’s program, resulting in 121 valid responses from the cross-section online survey. Our theoretical model explained 60.0% of the variance in exploitative use of telehealth technology, 44% of the variance in exploratory use of telehealth technology, and 66% of the variance in virtual service performance. We found that exploitative IT use is an important driver to increase virtual service performance (β=0.762, <italic>P</italic>&lt;.001), and personal characteristics such as habit are positively associated with both exploitative (β=0.293, <italic>P</italic>=.008) and exploratory use behaviors (β=0.414, <italic>P</italic>=.006), while computer self-efficacy is positively associated with exploitative use of telehealth technology (β=0.311, <italic>P</italic>=.047).</p>
        </sec>
        <sec sec-type="Conclusions">
          <title>Conclusions</title>
          <p>This study discusses the unique role of frontline care providers in a virtual care service context and highlights the importance of their telehealth adaptation behavior in provider-to-provider communication. We showed that providers perceive that telehealth technologies should function as intended, otherwise it may create frustration or avoidance of the telehealth technology. Moreover, providers’ habitual use of various technologies in daily lives also motivates them to adaptively use telehealth technology for improving virtual care service. Understanding providers’ technology habit and adaptation can inform health care policy and further provide a better view of the design of telehealth technology for online communication.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>telehealth technology</kwd>
        <kwd>adaptive technology use</kwd>
        <kwd>frontline care providers</kwd>
        <kwd>virtual care service</kwd>
        <kwd>daily habit of technology use</kwd>
        <kwd>PLS modeling</kwd>
        <kwd>telehealth</kwd>
        <kwd>mhealth</kwd>
        <kwd>ehealth</kwd>
        <kwd>digital health</kwd>
        <kwd>adaptive technology</kwd>
        <kwd>frontline care</kwd>
        <kwd>virtual care</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>As telehealth technologies enable virtual and timely communication among care providers, frontline care providers particularly face challenges in enhancing service performance while using such technologies. In the primary care setting, care provider groups such as doctors, nurse practitioners, and nurses have been the first point of contact for people who seek health care services [<xref ref-type="bibr" rid="ref1">1</xref>] within close proximity of patients in the location [<xref ref-type="bibr" rid="ref2">2</xref>]. As the use of telehealth technology in electronic consultation (e-consultation) has expanded care providers’ role to managing some specialty care work [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>] beyond locational boundaries [<xref ref-type="bibr" rid="ref5">5</xref>], it has become visible how they broker specialty visits between primary and specialty care by using telehealth technology [<xref ref-type="bibr" rid="ref6">6</xref>]. Telehealth technology is thus supposed to enhance frontline care providers’ virtual communication electronically. For example, care providers speak to patients via scheduled or on-demand/urgent visits; in addition, they communicate with specialists to ask questions and help patients avoid further face-to-face consultation with specialists [<xref ref-type="bibr" rid="ref7">7</xref>]. Our main focus in this paper is on the latter case, often termed telespecialty consultation or e-consultation [<xref ref-type="bibr" rid="ref8">8</xref>], which is the interaction between frontline care providers and specialists. In this environment, a patient typically does not see a specialist and relies solely on care providers' intervention to gain access to specialists, and thus, care providers’ need to manage each patient’s case in a timely manner while communicating with specialists. Thus, care providers are challenged to act as care moderators of the relationships between patients and specialists to manage expanded care responsibilities and improve service performance with the use of telehealth technology.</p>
        <p>Such care providers’ moderating role requires them to adequately select and use telehealth technologies for successful virtual care outcome. Telehealth technology does not refer to a single technology artifact, but to a number of electronic information and communication technologies (ICTs) to facilitate long-distance clinical care, patient and professional health-related education, and public health administration [<xref ref-type="bibr" rid="ref9">9</xref>]. Accordingly, prior literature has noted that care providers have increasingly used multiple technologies to manage not only the new form of health care, but also virtual communication simultaneously [<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref12">12</xref>]. However, such use of multiple technologies for virtual services has led to mixed results. Care providers perceived the use of a single telehealth technology to be beneficial to the timely management of referrals to specialists, but at the same time, they felt burdened by the additional workload that had shifted from specialists [<xref ref-type="bibr" rid="ref13">13</xref>]. In such processes, care providers’ increased use of other relevant technologies may create frustration and avoid adoption of new technology when certain technological features with which they are familiar do not perform as intended [<xref ref-type="bibr" rid="ref14">14</xref>] or supplement the role of care providers [<xref ref-type="bibr" rid="ref5">5</xref>]. More specifically, in the e-consultation context, care providers can feel constrained in sending messages to specialists if this familiar use of messaging technology is not integrated with other services or health systems [<xref ref-type="bibr" rid="ref15">15</xref>]. Thus, it is fair to say that care providers’ prior use of various technologies and features and their expectation of telehealth technology influence their telehealth use behavior.</p>
        <p>However, little attention has been devoted to understanding the telehealth-driven provider-to-provider communication in which individual providers’ technology use behavior as care moderators can influence virtual service performance. Several prior studies have mainly focused on the antecedents of virtual service performance [<xref ref-type="bibr" rid="ref16">16</xref>], and yet, the mechanisms that influence care moderators’ perception on the use of telehealth technology and service performance in the process of e-consultation are unknown. Given that telehealth technology shares similarities with other health technologies on various devices such as smartphones, tablets, and desktop/laptop computers [<xref ref-type="bibr" rid="ref17">17</xref>], care providers’ pre-existing experience and self-confidence in dealing with similar or new features from other technologies may not only affect their attitude about using telehealth technology [<xref ref-type="bibr" rid="ref18">18</xref>], but also the way in which they use the telehealth technology for virtual communication [<xref ref-type="bibr" rid="ref19">19</xref>]. In other words, a care provider may select and use a set of related telehealth technologies to manage online communication with specialists, which may allow them to enjoy familiar system features or may alter the intended capabilities of the telehealth technology artifacts (referred to as “adaptive use of IT” [<xref ref-type="bibr" rid="ref20">20</xref>]).</p>
        <p>Two aspects distinguish this study from prior studies. First, this study explicitly focuses on care providers’ postadoption behavior using a set of telehealth technologies. Thus far, extensive research has been performed at the intersection of human computer interaction (HCI), health informatics, design science, and information technology (IT) adoption strands, with the main focus on the cognitive/psychological aspect of technology use [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] and interactions with technology artifacts [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. For example, prior research noted mechanisms through which individual care providers’ intrinsic and extrinsic motivation, gratification, and use environment influence adoption intention [<xref ref-type="bibr" rid="ref25">25</xref>]. Additionally, exploration of how humans interact with social, organizational, and contextual environments has developed theoretical foundations to capture users’ technology adoption intention across nonhealth domains such as business, marketing, education, engineering, and agriculture (eg, [<xref ref-type="bibr" rid="ref26">26</xref>]). This paper, however, examines an unexplored area of technology use—telehealth technologies and users’ level of flexibility—to mix, match, and use them for the success of telehealth care communication. This adds value to telehealth management and relevant research, given that the current technology market for telehealth is led by care providers, tech firms, and payers, and telehealth technologies may not share common features or include all necessary features for various care regimen [<xref ref-type="bibr" rid="ref27">27</xref>]. For example, remote patient monitoring, as one of the important aspects of telehealth service, needs multiple technologies such as videoconferencing software, peripheral devices, telemedicine carts (filed kits) for the patient site, and remote patient monitoring kits [<xref ref-type="bibr" rid="ref28">28</xref>]. In addition, care providers use audio and video technologies for live patient care [<xref ref-type="bibr" rid="ref10">10</xref>]. In such a telehealth care environment, care providers play crucial roles in not only mediating as the first virtual contact for patients but also cocreating care plans with specialists. Their performance can thus affect the outcome of telehealth care services, which, in turn, influence telehealth technology adoption and use of other stakeholders in rural or medically underserved areas [<xref ref-type="bibr" rid="ref29">29</xref>]. As a consequence, comprehending users’ (ie, care providers’) experiences with related technologies is essential to understand their telehealth technology behavior.</p>
        <p>Second, this paper calls for an explicit focus on virtual communication between care providers and specialists. As telehealth service consists of multilateral communications among care stakeholders, primary care providers should moderate the encounters between those parties in case of virtual specialty care needed and enhance timely and quality of telehealth care. At the time of innovation, primary care providers are known to adapt their daily routines of care management to technological innovation, which leads to decreased productivity [<xref ref-type="bibr" rid="ref30">30</xref>]. However, little is known about care providers’ ability to adapt telehealth technology for virtual communication and team-based care services [<xref ref-type="bibr" rid="ref31">31</xref>]. From the perspective of frontline care providers who manage care processes in the location and connect to specialists remotely, the manner in which they evaluate the use of telehealth technologies and perform in this new care format can determine the success of telehealth care services in the long run. <xref ref-type="fig" rid="figure1">Figure 1</xref> summarizes the unique role of frontline care providers in a telehealth care process and is the focus of this study. In this study, we limit our focus on variation in the provider-to-provider communication while making patient-side inputs fixed to better isolate care providers’ technology adaptation behavior.</p>
        <p>Taken together, our aims are to examine whether care providers’ adaptive technology use behavior improves virtual service performance in e-consultation and to explore whether individual characteristics in relation to technology (personal innovativeness, computer self-efficacy, and habit) influence their adaptive use behavior. To this end, we examined two adaptive use behaviors: exploitative and exploratory use of telehealth technology. Exploitative technology use refers to the use of telehealth technology under the existing norms, while exploratory technology use involves the use of IT in a novel or unprecedented way. We hypothesized that these two adaptive IT behaviors enhance task performance on the part of care providers in the process of relaying patient information and managing specialists’ diagnoses and that personal traits may affect such adaptive IT use behaviors.</p>
      </sec>
      <sec>
        <title>Theoretical Background</title>
        <sec>
          <title>Adaptive Use of Telehealth Technology</title>
          <p>In this paper, we define telehealth technology as electronic ICTs that support both care management and various modalities of virtual care meetings. To explore care providers’ adaptive use of telehealth technology, we build on the Adaptive Structuration Theory (AST) at the level of individual users [<xref ref-type="bibr" rid="ref20">20</xref>]. In Information Systems (IS) literature, AST explains constituents’ adaptive responses to technological changes and decision outcomes in an organization. The theory describes the mechanisms through which constituents make sense of organizational, technology-driven changes by selecting, adapting, and altering existing “social structures,” all of which lead either to group decision outcomes or create new structures within the organizational context [<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref35">35</xref>]. Recently, Schmitz et al [<xref ref-type="bibr" rid="ref20">20</xref>] extended these adaptation behaviors to the level of individual users within organizations by proposing individual-level social interactions with the focal technology and tasks. This theory states that social interaction processes can occur through two structuration episodes, including technology adaptation and task adaptation, where adaptation can be in two modes: exploitative and exploratory adaptation. Exploitative adaptation reflects the use of technology in line with existing norms and interpretations (expected use), while exploratory adaptation indicates technology use based on nonstandard interpretations (unexpected use). The dynamic effects of adaptive behaviors on individuals’ performance have been demonstrated in various research settings [<xref ref-type="bibr" rid="ref20">20</xref>] such as job performance and satisfaction in nonhealth domains [<xref ref-type="bibr" rid="ref36">36</xref>].</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Focus of this study.</p>
            </caption>
            <graphic xlink:href="jmir_v21i8e15087_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>In health care, care providers’ adaptive use of telehealth technologies can play an important role in provider-to-provider communication. Weigel at al [<xref ref-type="bibr" rid="ref37">37</xref>] defined individuals’ adaptive use of health information technology (HIT) as “temporary or permanent modifications that a user makes to his or her behaviors or norms due to the limitations of the HIT.” Thus, if technologies do not fully support e-consultation, this condition can elicit users’ adaptation behaviors [<xref ref-type="bibr" rid="ref15">15</xref>]. In theory, the adaptive use of technology takes place when users have experienced various technologies and are expected to use existing or new technologies adaptively. In this case, the possible responses are either that they use a system feature as it is or modify some features to produce better outcomes. In the telehealth context, the adaptive use of telehealth technology is also expected, as health stakeholders increasingly use multiple technologies to communicate virtually with one another for care management beyond office visits. For example, care providers use personal messaging apps (eg, Whatsapp) and social network sites [<xref ref-type="bibr" rid="ref11">11</xref>] to moderate communications between patients and care providers in addition to the designated telehealth technologies [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. Hence, care providers’ adequate selection and use of other communication technologies may change the outcomes of telehealth services. In IS literature, such a moderating role of care providers is analogous to that of online meeting facilitators, whose behaviors not only affect the meeting outcomes, but also the other meeting attendees’ behaviors [<xref ref-type="bibr" rid="ref39">39</xref>]. More specifically, there are two important factors that affect online meeting outcomes: one is facilitators’ personal characteristics such as their level of experience and facilitation [<xref ref-type="bibr" rid="ref40">40</xref>], and the other is their technology-based skills [<xref ref-type="bibr" rid="ref41">41</xref>-<xref ref-type="bibr" rid="ref43">43</xref>]. In this paper, we focus on care providers’ technology-based skills, ie, technology adaptation behaviors and technology-driven personal traits as key determinants to influence virtual service performance.</p>
        </sec>
        <sec>
          <title>Virtual Service Performance</title>
          <p>This study considers virtual care performance to be one of the virtual meeting outcomes that captures care providers’ expected outcomes in response to adequate use of telehealth-related technologies in the e-consultation context. In general, the success of IT use or performance has been considered at multiple levels, such as at the individual, group, and organizational levels [<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>], and individual performance has been widely studied as a key dependent variable to measure individual users’ postadoptive IT use behavior [<xref ref-type="bibr" rid="ref46">46</xref>-<xref ref-type="bibr" rid="ref48">48</xref>]. Applied to our research context, care performance from primary care services has been measured by patients’ satisfaction [<xref ref-type="bibr" rid="ref49">49</xref>], care providers’ evaluation of care coordination [<xref ref-type="bibr" rid="ref50">50</xref>], or organizational performance [<xref ref-type="bibr" rid="ref51">51</xref>]. In fact, telehealth technologies need to be able to support various communication modalities via video-conferencing, texting, and a combination of both during care provision [<xref ref-type="bibr" rid="ref52">52</xref>]. Hence, it is critical that care providers apply effective virtual communication skills when managing electronic patient data [<xref ref-type="bibr" rid="ref53">53</xref>] and use various technological features, all of which depend upon their proper choice and actual use of the technologies. Thus, we suggest that care providers’ virtual service performance be determined by the adaptive use of telehealth technologies, and their performance can be improved with respect to effectiveness of care, care management, quality of care tasks, decreased error rates in communication, and sharing information [<xref ref-type="bibr" rid="ref54">54</xref>].</p>
        </sec>
        <sec>
          <title>Personal Innovativeness in Information Technology, Computer Self-Efficacy, and Habit</title>
          <p>Care providers’ responses to these challenges can be reinforced or redirected by their personal characteristics. Prior studies on information technology use have documented the importance of personal characteristics that help users experiment with and control new technology based on their beliefs and experience. When IT users communicate with others online, in general, and when they act as meeting facilitators in a virtual meeting, in particular, the user who presides over the meeting becomes more important, because individual characteristics such as technology-based skills, capabilities, and level of experience [<xref ref-type="bibr" rid="ref55">55</xref>] affect the success of online meetings and meeting members’ use of technologies [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. Given that care providers need to facilitate virtual communication with specialists, these users’ characteristics and beliefs about the use of telehealth and relevant technologies simultaneously help to predict the online communication outcome, which is virtual service performance in this study. Thus, care providers’ willingness and capability to use multiple telehealth-related technologies (including familiar and new features) and whether care providers possess characteristics that allow them to introduce more innovative ways of technology use can influence virtual service performance [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
          <p>The literature on postadoptive technology, behavior has acknowledged that users’ personal characteristics are important antecedents that explain their postadoption behavior [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>]. In this model, we identified personal innovativeness in IT use, computer self-efficacy, and habit as determinants to explain care providers’ adaptive telehealth technology use behaviors. First, personal innovativeness in IT use is defined as “the willingness of an individual to try out any new information technology” [<xref ref-type="bibr" rid="ref57">57</xref>]. This concept has been widely used in IT use studies to capture individuals’ intention to adopt technology, both generally [<xref ref-type="bibr" rid="ref59">59</xref>] and in health care domains [<xref ref-type="bibr" rid="ref60">60</xref>-<xref ref-type="bibr" rid="ref62">62</xref>]. In the adaptive use context, Chow et al [<xref ref-type="bibr" rid="ref63">63</xref>] found that personal innovativeness positively influenced adaptive IT use behavior. The higher innovativeness a user has, the more likely that he or she is to try new features and mix and match system features that are relevant to tasks (eg, by replacing some existing features with new ones, combining features, or inventing new ways to use certain features for tasks for which they were not intended). Second, computer self-efficacy—referring to a user’s belief about his or her capability to control telehealth technologies—is also likely to influence IT users’ motivation and outcomes [<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Users’ self-judgments about technology efficacy influence their beliefs about a focal technology’s ease of use [<xref ref-type="bibr" rid="ref65">65</xref>]. In postadoption IT use, individual users’ beliefs about their ability to use new technology are associated with the technology’s deep structural use [<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref67">67</xref>]. Lastly, habit concerns the notion that the “habitualization of action occurs more or less automatically via a subconscious response to a work situation” [<xref ref-type="bibr" rid="ref68">68</xref>]. Thus, people may be willing to adopt a new workplace technology when they understand other technologies in their lives. As automatic reactions to certain tasks that are attributable to prior learning, habits have been identified as predictors of technology adoption or moderators that interact with other factors in postadoption IT use [<xref ref-type="bibr" rid="ref69">69</xref>-<xref ref-type="bibr" rid="ref71">71</xref>]. Moreover, habits have been associated with continued use of IT [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref73">73</xref>] and its adaptive use [<xref ref-type="bibr" rid="ref74">74</xref>]. Schmitz [<xref ref-type="bibr" rid="ref20">20</xref>] used experience of technology as a personality trait, whereas we used habit instead. This is because habit captures an automatic reaction to certain tasks due to prior learning from technology, while experience reflects users’ exposure to a focal technology in the passage of time [<xref ref-type="bibr" rid="ref68">68</xref>]. As we focus on users’ prior learning from the use of various technologies, habit is more applicable to our telehealth care context. Taken together, individual characteristics act as key antecedents that predict care providers’ adaptive use behaviors.</p>
        </sec>
      </sec>
      <sec>
        <title>Research Model and Hypothesis Development</title>
        <sec>
          <title>Exploitative Use of Telehealth Technologies and Virtual Service Performance</title>
          <p>According to Schmitz [<xref ref-type="bibr" rid="ref20">20</xref>], exploitative use of focal technology occurs “when a user modifies technology features to facilitate usage of the technology consistent with how s/he perceives is intended or standard for the technology.” Thus, exploitative IT use reflects the routine use of IT under existing norms and expectations [<xref ref-type="bibr" rid="ref36">36</xref>]. Exploitative use of technology occurs in various settings. For example, users employ IT in repetitive tasks to improve efficiency [<xref ref-type="bibr" rid="ref75">75</xref>], complete tasks [<xref ref-type="bibr" rid="ref76">76</xref>], and maximize task performance [<xref ref-type="bibr" rid="ref77">77</xref>]. In a provider-to-provider context, care providers use personal messaging apps (eg, Whatsapp) to expedite communication with specialists after submitting e-consultation requests on telehealth technology platforms [<xref ref-type="bibr" rid="ref11">11</xref>]. In this case, combined use of the telehealth technology and personal messaging applications that accomplish repetitive tasks can facilitate instantaneous communication with specialists, all of which influence virtual care performance. Thus, we hypothesize the following:</p>
          <disp-quote>
            <p>Hypothesis 1: Exploitative use of telehealth positively affects virtual care performance.</p>
          </disp-quote>
        </sec>
        <sec>
          <title>Exploratory Use of Telehealth Technologies and Virtual Service Performance</title>
          <p>Exploratory technology use takes place “when a user develops new technology features to facilitate usage of the technology that s/he perceives is unusual or non-standard for the technology” [<xref ref-type="bibr" rid="ref20">20</xref>]. Nontraditional IT use allows users to identify certain new capabilities of IT, such as exploring new skills and experimentation [<xref ref-type="bibr" rid="ref76">76</xref>], and to make nonstandard interpretations of the focal phenomenon, leading to divergent consequences [<xref ref-type="bibr" rid="ref20">20</xref>]. Accordingly, exploratory use of telehealth technology for e-consultation indicates an innovative use of telehealth technology that fosters deviation from existing tasks and the search for alternatives [<xref ref-type="bibr" rid="ref77">77</xref>]. For example, to achieve timely communication with specialists, care providers need to be capable of managing images and reports and interacting with their electronic health records, which are typically accessed through their mobile phones [<xref ref-type="bibr" rid="ref78">78</xref>]. Finding ways to quickly process multimedia images or connect hospital systems via interface applications installed on care providers’ devices might be examples of the exploratory use of telehealth technologies. Therefore, we made the following hypothesis:</p>
          <disp-quote>
            <p>Hypothesis 2: Exploratory use of telehealth positively affects virtual care performance.</p>
          </disp-quote>
        </sec>
        <sec>
          <title>Individual Characteristics as Antecedents of the Adaptive Use of Telehealth Technologies</title>
          <p>This paper proposes that personal traits are formulated via cumulative exposure to various technologies across multiple life domains (such as the workplace and at home) and hypothesizes that such traits can expand care providers’ capabilities to use both existing and new features in telehealth-related technologies. Individual care providers’ existing beliefs about self-innovativeness, self-judgment about telehealth technology use, and accumulated habits from using daily technologies across multiple life domains can influence the way in which they adaptively use new features of telehealth technologies in both expected and reconfigured ways, particularly for communication with providers (<xref ref-type="fig" rid="figure2">Figure 2</xref>). Therefore, we made the following hypotheses:</p>
          <disp-quote>
            <p>Hypothesis 3: Care providers’ personal innovativeness with IT positively affects their adaptive (H3a: exploitative; H3b: exploratory) use of telehealth technologies.</p>
          </disp-quote>
          <disp-quote>
            <p>Hypothesis 4: Care providers’ computer self-efficacy positively affects their adaptive (H4a: exploitative; H4b: exploratory) use of telehealth technologies.</p>
          </disp-quote>
          <disp-quote>
            <p>Hypothesis 5: Care providers’ habits with regard to technology positively affect their adaptive (H5a: exploitative; H5b: exploratory) use of telehealth technologies.</p>
          </disp-quote>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>Research model. H: hypothesis; IT: information technology.</p>
            </caption>
            <graphic xlink:href="jmir_v21i8e15087_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Recruitment</title>
        <p>We recruited graduate nursing students at a university in the Southeastern United States who were studying to become family nurse practitioners and had experienced various types of technologies across different contexts. In telehealth care contexts, in particular, the demand of nurse practitioners is growing because they can collaborate with other specialists to comanage patient care cases for rural or disadvantaged population [<xref ref-type="bibr" rid="ref42">42</xref>]. With incorporation of such trends and our research focus on nurse practitioners’ role as frontline care providers in e-consultations with specialists, we had to use purposive sampling for those who could provide unique information about telehealth care services that could not be obtained elsewhere [<xref ref-type="bibr" rid="ref79">79</xref>]. The participants had been trained in the use of telehealth technologies in their education program and their communication with other care members in the simulation rooms, in which the nursing faculty had recorded and evaluated their electronic communication. In summary, our student sample could be legitimately used to capture their adaptive use of telehealth technologies. This nonprobability sampling met our goals to identify a representative sample of nurse practitioners who would be at the front line of telehealth care services as care providers (see [<xref ref-type="bibr" rid="ref78">78</xref>] for the taxonomies of purposive sampling). To test our hypotheses, a Web-based survey was administered in the spring and fall semesters in 2018. In the online survey, each participant read a case scenario and responded to the questionnaire in terms of their perception on prior experience, adaptive use of telehealth technology, and care service performance (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>).</p>
      </sec>
      <sec>
        <title>Statistical Analysis</title>
        <sec>
          <title>Instrument Development</title>
          <p>The measurement items were adopted from well-established IS literature and adapted to the telehealth context (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>). To measure the dependent variable, we adapted Goodhue’s [<xref ref-type="bibr" rid="ref47">47</xref>] five-item scale of task performance. This measure has been used to explain IT postadoption performance in various contexts, including health care [<xref ref-type="bibr" rid="ref58">58</xref>]. Two independent variables—exploitative and exploratory use—were measured using items from a previous study [<xref ref-type="bibr" rid="ref20">20</xref>], in which each item was assessed with four indicators. With regard to the input variables (antecedents to postadoptive IT use), personal innovativeness in IT was measured using three items adapted from a prior study [<xref ref-type="bibr" rid="ref57">57</xref>]. Computer self-efficacy (a user’s perception of his or her competency in using computers) was measured using four items developed by Compeau and Higgins [<xref ref-type="bibr" rid="ref64">64</xref>]. Habit reflects care providers’ automatic reactions to a new technology based on prior experience and was captured using four items [<xref ref-type="bibr" rid="ref68">68</xref>]. Finally, we collected demographic variables (age, income, education, gender, occupation status, and experience in using health apps) and mobile technology usage experience and treated them as control variables in the data analysis. All research variables were reflective constructs and measured on a seven-point Likert scale that ranged from 1 (“strongly disagree”) to 7 (“strongly agree”). To assess face validity, the researchers contextualized the survey scale to make it pertinent to the telehealth care situation. A pretest was performed to ensure content validity. The researchers and two nurse practitioners evaluated and refined each survey item. A total of 37 initial responses were used to revise and finalize the questionnaire for the final survey.</p>
        </sec>
        <sec>
          <title>Analysis</title>
          <p>This study used composite-based partial least squares-structural equation modeling (PLS-SEM) in SmartPLS (Version 3.0. Boenningstedt, Germany: SmartPLS GmbH) to assess the measurement and structural models [<xref ref-type="bibr" rid="ref80">80</xref>]. PLS-SEM is a causal model that has been frequently used in IS literature [<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref82">82</xref>] and is used to maximize the variance that the dependent latent constructs explain [<xref ref-type="bibr" rid="ref83">83</xref>]. We applied a bias-corrected and accelerated bootstrapping procedure with replacement using 5000 subsamples. Our hypotheses were tested using a one-tailed <italic>t</italic> test for unidirectional hypotheses.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>User Characteristics and Descriptive Statistics</title>
        <p>A cross-sectional online survey was sent to 210 students who were enrolled in the nurse practitioner education program. A total of 146 participants responded to the survey, yielding a response rate of 69.52%; of these, 121 valid responses were used for data analysis. Twenty-five responses were dropped because they only reported demographic information in the surveys. <xref ref-type="table" rid="table1">Table 1</xref> summarizes the respondent profiles. The majority were females (72.7%) and employed (full<bold>-</bold>time workers=54.5%; part<bold>-</bold>time workers=35.5%). All were well educated, with an undergraduate or higher degree, and nearly half were of white race (47.5%). <xref ref-type="table" rid="table1">Table 1</xref> summarizes the characteristics of the survey participants.</p>
        <p>In addition, an adequate sample size is necessary to estimate the PLS path model, which is guided by the 10-times rule and power analysis. On one hand, the 10 times rule dictates the use of “10 times the largest number of formative indicators used to measure a single construct, or 10 times the largest number of structural paths directed at a particular construct in the structural model” [<xref ref-type="bibr" rid="ref83">83</xref>]. On the other hand, power analysis provides a threshold for the statistical power necessary to detect an effect based on the maximum number of independent variables in the measurement and structural models. In our case, we had five independent variables, three maximum arrows pointing to a latent construct, and thus needed at least 45 observations to achieve a statistical power of 80% and <italic>R</italic><sup>2</sup> values of at least 0.25 (with a 5% probability of error) [<xref ref-type="bibr" rid="ref83">83</xref>]. Thus, our sample size (N=121) was deemed adequate to test the research model.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Participant characteristics (N=121).</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="770"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Demographic variables</td>
                <td>Values, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Gender</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td>33 (27.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td>88 (72.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Age (years)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>18-25</td>
                <td>12 (9.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>26-40</td>
                <td>85 (70.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>41-55</td>
                <td>20 (16.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>56-65</td>
                <td>4 (3.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Income status (US $)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>25,000-49,999</td>
                <td>24 (19.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>50,000-74,999</td>
                <td>48 (39.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>75,000-99,999</td>
                <td>16 (13.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>≥100,000</td>
                <td>13 (10.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Prefer not to answer</td>
                <td>20 (16.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Education</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Bachelor’s degree</td>
                <td>72 (59.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Master’s degree</td>
                <td>41 (33.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PhD</td>
                <td>2 (1.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Others</td>
                <td>6 (5.0)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Occupation<sup>a</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Working full time</td>
                <td>66 (54.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Working part time</td>
                <td>43 (35.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Unemployed</td>
                <td>8 (6.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Unable to work</td>
                <td>1 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Other</td>
                <td>3 (2.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Race<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>African American</td>
                <td>21 (17.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Asian</td>
                <td>18 (15.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Native Hawaiian or Pacific Islander</td>
                <td>1 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>White</td>
                <td>57 (47.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Other</td>
                <td>19 (15.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Prefer not to answer</td>
                <td>4 (3.3)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>All demographic questions were optional. Four respondents reported their occupation status as either “unable to work” or “other.” For clarity, we removed these responses and reran partial least squares analysis, producing the identical results.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>N=120.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Nonresponse Bias and Common Method Bias</title>
        <p>As our survey was self-reported, we evaluated two possible biases carefully: nonresponse bias and common method bias. Nonresponse bias derives from the differences between participants and nonparticipants in the survey [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref85">85</xref>]. This bias can be assessed by comparing our sample’s characteristics with those in the population and by comparing early and late respondents. We compared the early respondents (74.82%) and late respondents (25.18%) on each of the demographic characteristics (age, gender, education, income, and occupational status) and health application experience using a <italic>t</italic> test. There were no significant differences between the early and late respondents in our sample.</p>
        <p>Common method bias potentially threatened the veracity of our results, as data for the independent variables and dependent variable were collected in the same survey. Following a previous study [<xref ref-type="bibr" rid="ref86">86</xref>], we designed the survey instrument’s contents and order carefully. Furthermore, we performed the Harman single factor analysis to assess the bias. The results showed that one factor explained 36.90% of the variance, confirming that no single factor accounted for the majority of covariance. Thus, nonresponse bias and common method bias did not threaten this study’s findings.</p>
      </sec>
      <sec>
        <title>Measurement Model</title>
        <p>To determine each construct’s internal reliability, we first examined the item loadings and composite reliabilities. Each item loaded above 0.75 on its respective construct and was significant at <italic>P</italic>&lt;.05. Cronbach alpha was calculated to assess composite reliability and confirmed that all items’ values were above 0.7. Convergent validity was established if the average variance extracted (AVE) was above the threshold of 0.5, which suggests that the variance explained by indicators was greater than the unexplained variance. Discriminant validity was tested by assessing the Fornell-Larcker criterion and cross-loadings. To confirm the discriminant validity, the AVE of each construct should be greater than its squared correlations with other constructs [<xref ref-type="bibr" rid="ref87">87</xref>]. As shown in <xref ref-type="table" rid="table2">Tables 2</xref> and <xref ref-type="table" rid="table3">3</xref>, internal reliability, convergent validity, and discriminant validity were all confirmed.</p>
      </sec>
      <sec>
        <title>Hypothesis Testing: Partial Least Squares Modeling</title>
        <p>Following structural model assessment suggestions of de Guinea [<xref ref-type="bibr" rid="ref69">69</xref>], we evaluated the proposed path model using SmartPLS 3.0. The structural model’s quality was assessed by checking multicollinearity (variance inflation factor), path coefficients, <italic>R</italic><sup>2</sup> (variance explained), <italic>f</italic><sup>2</sup> (effect size), and the Stone-Geisser <italic>Q</italic><sup>2</sup> (model’s predictive relevance). The variance inflation factor was checked and confirmed to be less than 5, indicating that multicollinearity was not a problem in the study. We report the path coefficients’ significance, <italic>R</italic><sup>2</sup> and <italic>f</italic><sup>2</sup> in the full model results. Effect size (<italic>f</italic><sup>2</sup>) explains the changes when an exogenous construct of focus is included and when it is omitted from the model. As a rule of thumb, if <italic>f</italic><sup>2</sup> is 0.02, 0.15, and 0.35, the effects are considered to be small, medium, and large, respectively [<xref ref-type="bibr" rid="ref88">88</xref>]. Lastly, to assess the model’s predictive power, the Stone-Geisser Q<sup>2</sup> was used to indicate the sample’s predictive relevance. A <italic>Q</italic><sup>2</sup> value&gt;0 demonstrates that the path model has predictive relevance to a reflective, endogenous latent variable. The <italic>Q</italic><sup>2</sup> values for three of the endogenous constructs were &gt;0, indicating exploitative use (<italic>Q</italic><sup>2</sup>=0.51), exploratory use (<italic>Q</italic><sup>2</sup>=0.36), and virtual service performance (<italic>Q</italic><sup>2</sup>=0.54). Thus, the model’s predictive relevance was confirmed.</p>
        <p>For the path coefficients’ significance and the variance explained, <italic>R</italic><sup>2</sup>, our results demonstrated that exploitative technology use was positively associated with virtual service performance (β=0.76, <italic>P</italic>&lt;.001), while exploratory use did not explain the variation in virtual service performance (β=0.036, <italic>P</italic>=.49). With regard to the effects of individual characteristics, computer self-efficacy was significantly associated with exploitative technology use (β=0.31, <italic>P</italic>=.05). Lastly, habit was associated with both exploitative (β=0.29, <italic>P</italic>=.04) and exploratory use (β=0.41, <italic>P</italic>=.006). Therefore, hypotheses 1, 4a, 5a, and 5b were supported but hypotheses 2, 3a, 3b, 4b, and 5b were not supported. Among the control variables, education (β=–0.12, <italic>P</italic>=.01) was shown to affect virtual service performance negatively, while income level (β=0.11, <italic>P</italic>=.008) was positively associated with virtual service performance, as shown in <xref ref-type="table" rid="table4">Table 4</xref> and <xref ref-type="fig" rid="figure3">Figure 3</xref>.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Internal and convergent validity.</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="170"/>
            <col width="200"/>
            <col width="200"/>
            <col width="200"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Construct and items</td>
                <td>Factor loading</td>
                <td>Cronbach alpha</td>
                <td>Average variance extracted</td>
                <td>Mean (SD)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>HAB<sup>a</sup></bold>
                </td>
                <td>0.96</td>
                <td>0.89</td>
                <td>5.38 (1.22)</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>HAB1</td>
                <td>0.95</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>HAB2</td>
                <td>0.92</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>HAB3</td>
                <td>0.94</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>HAB4</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PIT<sup>b</sup></bold>
                </td>
                <td>0.97</td>
                <td>0.94</td>
                <td>4.67 (0.86)</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PIT1</td>
                <td>0.97</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PIT2</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PIT3</td>
                <td>0.97</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>CSE<sup>c</sup></bold>
                </td>
                <td>0.97</td>
                <td>0.92</td>
                <td>5.90 (0.96)</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>CSE1</td>
                <td>0.94</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>CSE2</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>CSE3</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>CSE4</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>EIU<sup>d</sup></bold>
                </td>
                <td>0.98</td>
                <td>0.94</td>
                <td>5.92 (1.14)</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>EIU1</td>
                <td>0.98</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>EIU2</td>
                <td>0.98</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>EIU3</td>
                <td>0.99</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>EIU4</td>
                <td>0.92</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>ERU<sup>e</sup></bold>
                </td>
                <td>0.96</td>
                <td>0.9</td>
                <td>4.78 (1.52)</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>ERU1</td>
                <td>0.92</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>ERU2</td>
                <td>0.94</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>ERU3</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>ERU4</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PERF<sup>f</sup></bold>
                </td>
                <td>0.97</td>
                <td>0.9</td>
                <td>5.63 (1.22)</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PERF1</td>
                <td>0.95</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PERF2</td>
                <td>0.97</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PERF3</td>
                <td>0.97</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PERF4</td>
                <td>0.96</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>PERF5</td>
                <td>0.89</td>
                <td> </td>
                <td> </td>
                <td> </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>HAB: habit.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>PIT: personal innovativeness with information technology.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>CSE: computer self-efficacy.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>EIU: exploitative use.</p>
            </fn>
            <fn id="table2fn5">
              <p><sup>e</sup>ERU: exploratory use.</p>
            </fn>
            <fn id="table2fn6">
              <p><sup>f</sup>PERF: care performance.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Discriminant validity. Diagonals represent the value of the average variance extracted, and off-diagonal elements are the squared correlations among construct.</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="400"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <thead>
              <tr valign="top">
                <td>Constructs</td>
                <td>1</td>
                <td>2</td>
                <td>3</td>
                <td>4</td>
                <td>5</td>
                <td>6</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1. Care performance</td>
                <td>0.95</td>
                <td>—<sup>a</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>2. Computer self-efficacy</td>
                <td>0.59</td>
                <td>0.96</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>3. Exploitive use</td>
                <td>0.80</td>
                <td>0.74</td>
                <td>0.97</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>4. Explorative use</td>
                <td>0.64</td>
                <td>0.60</td>
                <td>0.79</td>
                <td>0.95</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>5. Habit</td>
                <td>0.61</td>
                <td>0.86</td>
                <td>0.74</td>
                <td>0.65</td>
                <td>0.94</td>
                <td>— </td>
              </tr>
              <tr valign="top">
                <td>6. Personal innovativeness with information technology</td>
                <td>0.59</td>
                <td>0.86</td>
                <td>0.73</td>
                <td>0.62</td>
                <td>0.87</td>
                <td>0.97</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Complete results of the hypothesis testing.</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="340"/>
            <col width="70"/>
            <col width="70"/>
            <col width="90"/>
            <col width="70"/>
            <col width="70"/>
            <col width="100"/>
            <col width="160"/>
            <thead>
              <tr valign="bottom">
                <td colspan="2">Path</td>
                <td>β<sup>a</sup></td>
                <td>SD</td>
                <td><italic>t</italic> test</td>
                <td><italic>P</italic> value</td>
                <td>
                  <italic>f</italic>
                  <sup>2b</sup>
                </td>
                <td>Effect size</td>
                <td>Hypothesis testing</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="9">
                  <bold>Virtual service performance</bold>
                </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H<sup>c</sup>1: Exploitive use</td>
                <td>0.762</td>
                <td>0.075</td>
                <td>10.16</td>
                <td>&lt;.001</td>
                <td>0.483</td>
                <td>Large</td>
                <td>Supported</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H2: Exploratory use</td>
                <td>0.036</td>
                <td>0.049</td>
                <td>0.69</td>
                <td>.49</td>
                <td>0.001</td>
                <td>—<sup>d</sup></td>
                <td>Not supported</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Exploitative use</bold>
                </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H3a: Personal innovativeness with IT<sup>e</sup></td>
                <td>0.201</td>
                <td>0.134</td>
                <td>1.531</td>
                <td>0.13</td>
                <td>0.019</td>
                <td>—</td>
                <td>Not supported</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H4a: Computer self-efficacy</td>
                <td>0.311</td>
                <td>0.155</td>
                <td>1.991</td>
                <td>0.047</td>
                <td>0.05</td>
                <td>Small</td>
                <td>Supported</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H5a: Habit</td>
                <td>0.293</td>
                <td>0.112</td>
                <td>2.648</td>
                <td>0.008</td>
                <td>0.042</td>
                <td>Small</td>
                <td>Supported</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Exploratory use</bold>
                </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H3b: Personal innovativeness with IT</td>
                <td>0.168</td>
                <td>0.155</td>
                <td>1.095</td>
                <td>0.27</td>
                <td>0.01</td>
                <td>—</td>
                <td>Not supported</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H4b: Computer self-efficacy</td>
                <td>0.102</td>
                <td>0.149</td>
                <td>0.672</td>
                <td>0.5</td>
                <td>0.004</td>
                <td>—</td>
                <td>Not supported</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>H5b: Habit</td>
                <td>0.414</td>
                <td>0.15</td>
                <td>2.781</td>
                <td>0.006</td>
                <td>0.06</td>
                <td>Small</td>
                <td>Supported</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Control variables</bold>
                </td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>Age</td>
                <td>0.01</td>
                <td>0.06</td>
                <td>0.11</td>
                <td>0.91</td>
                <td>0</td>
                <td>—</td>
                <td>N/A<sup>f</sup></td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>Education</td>
                <td>–0.12</td>
                <td>0.05</td>
                <td>2.44</td>
                <td>0.02</td>
                <td>0.031</td>
                <td>Small</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>Gender</td>
                <td>–0.09</td>
                <td>0.05</td>
                <td>1.67</td>
                <td>0.1</td>
                <td>0.009</td>
                <td>—</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td> </td>
                <td>Income</td>
                <td>0.11</td>
                <td>0.04</td>
                <td>2.65</td>
                <td>0.01</td>
                <td>0.02</td>
                <td>Small</td>
                <td>N/A</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>Standard regression coefficient.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>Effect size.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>H: hypothesis.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>Not available.</p>
            </fn>
            <fn id="table4fn5">
              <p><sup>e</sup>IT: information technology.</p>
            </fn>
            <fn id="table4fn6">
              <p><sup>f</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Structural evaluation of the telehealth adaptive use model. IT: information technology.</p>
          </caption>
          <graphic xlink:href="jmir_v21i8e15087_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The purpose of this study was to contextualize and test a research model that examined the determinants of the adaptive use of telehealth technologies in e-consultation. Using AST at the individual level, we examined the mechanisms by which exploitative and exploratory use of telehealth technologies and three personal traits (ie, personal innovativeness in IT, computer self-efficacy, and habit) influence virtual service performance.</p>
        <p>Our results indicate that care providers are willing to use telehealth technologies exploitatively to communicate with specialists in e-consultations and perceive it as a virtual service performance enhancer. With regard to the hypotheses on adaptive use and virtual service performance (hypotheses 1 and 2), exploitative use of telehealth technologies was found to be a strong factor that explains care providers’ virtual service performance (β=0.762, <italic>P</italic>&lt;.001), while exploratory use was not (β=0.036, <italic>P</italic>=.49). Moreover, with regard to hypotheses 3 through 5, we found that personal innovativeness in IT is insignificant for explaining adaptive use in our context (<italic>P</italic>=.13 for exploitative use and <italic>P</italic>=.27 for exploratory use, respectively); computer self-efficacy has a significant, positive effect on the exploitative use of telehealth technologies (β=0.311, <italic>P</italic>=.047); and habitual use of nonhealth technologies in daily life is associated with care providers’ willingness to engage in both exploitative (β=0.293, <italic>P</italic>=.008) and exploratory adaptive use of new telehealth technology (β=0.414, <italic>P</italic>=.006).</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Despite the meaningful and practical findings in this study, our results should be interpreted with caution due to some limitations. First, we selected a purposive sample of graduate nursing students for our study. Although this is a legitimate sample, the ability to generalize the findings may be limited because our participants have experienced e-consultation in the education-focused, simulated contexts. Second, while our cross-sectional sample shows adequate responses to estimate our hypothesized path model using PLS-SEM, a larger sample with a panel structure would increase the statistical power of the findings and control for any unobserved confounding factor using panel data analysis. Particularly, time-series cross-sectional data on capturing various technology use among care providers would provide more in-depth understanding of virtual telehealth care services. Third, we did not include task adaptation behavior based on our research context’s characteristics. The education program requires individuals to adhere to the standard protocol of patient cases, such that any adaptive task behaviors are evaluated as a failure in the medical setting. Thus, we limited our focus to the participants’ adaptive use of telehealth technology only. It would be meaningful to investigate task and technology adaptation behaviors in the health care contexts in which the selection of tasks and technologies are flexible in future research. Fourth, this research considered care providers’ perception about their willingness to use telehealth technology either in a traditional way or in an innovative way and its downstream effect on perceived service performance. This is because we viewed telehealth technology as a set of related information and communication technologies and asked participants’ adaptation behavior in a general context. It would be worthwhile to revisit our research model to certain care contexts (eg, diabetes) and capture actual measures of virtual service performance. Lastly, future research can be further extended to explore other stakeholders’ attitude and behaviors about telehealth technology in e-consultation. For example, our research model can explain how adaptive use of telehealth technology by frontline care providers influences the level of patients’ satisfaction and health outcomes as well as those of specialists.</p>
      </sec>
      <sec>
        <title>Comparison with Prior Work</title>
        <p>This study contributes to both the IS and health care literature on the postadoptive use of telehealth technology. First, this research contributes to the IS literature by exploring adaptive IT use behavior from an individual meeting facilitator’s perspective and attempting to identify a contextualized theory in e-consultation. Specifically, we considered e-consultations between care providers and specialists in a virtual meeting context and proposed that as virtual meeting facilitators, care providers’ willingness to use telehealth technologies is an important predictor of virtual service tasks’ success. Previous IS literature on online meeting technology use has documented that technology types, environmental factors, and user characteristics are key factors that predict outcomes from a multilevel perspective. From a group perspective, technical support for group users and the fit between tasks and technologies are important determinants of the success of online meeting technology use [<xref ref-type="bibr" rid="ref89">89</xref>]. In terms of individuals’ behavior, extant studies have emphasized the important role that human facilitators’ characteristics play in predicting the outcomes of online meetings [<xref ref-type="bibr" rid="ref43">43</xref>]. Given care providers’ unique position as those who relay clinical information and decisions between patients and specialists in health care and the availability of flexible options to select and use telehealth technologies for provider-to-provider communication, there is an urgent need to examine whether, and in what way, such meeting facilitators’ adaptive use of IT predicts the success of virtual service performance.</p>
        <p>Our study is unique in that we focused explicitly on care providers’ virtual role in telehealth communication and their performance under a new definition of telehealth technology (ie, use of telehealth and telehealth-related technologies). Care providers’ role differs from that of general online facilitators in online meetings, in that they manage multilateral communication between patients and specialists and although there is a designated telehealth platform for their communications, sometimes, communication with the two different groups involves the use of additional technologies that complement or substitute the existing technology’s capabilities. Given that providers [<xref ref-type="bibr" rid="ref58">58</xref>] and patients [<xref ref-type="bibr" rid="ref90">90</xref>] were the main user groups of interest in previous studies for predicting telehealth technologies’ success, this study contributes to the health care literature by examining the adaptive structuration theory of individual from a care provider’s perspective and identifying salient constructs (the exploitative use of IT) in a research model to develop a contextualized theory. Second, the result that habit plays a significant role in adaptive IT use calls for more attention in IS research on how users’ habits accumulate from different life domains to affect their postadoptive use of multiple technologies [<xref ref-type="bibr" rid="ref91">91</xref>]. Previous postadoption studies have established that habit reflects the extent to which people tend to perform behaviors automatically because of past learning [<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref92">92</xref>-<xref ref-type="bibr" rid="ref95">95</xref>]. However, the relationship between habit and the continued use of IT has been mostly tested in a single domain; for example, mobile phone habits predict mobile phone use [<xref ref-type="bibr" rid="ref93">93</xref>] and mobile internet habits affect mobile internet technology use [<xref ref-type="bibr" rid="ref95">95</xref>]. In a health care setting, however, our findings emphasize that cross-domain, habitual IT use influences care providers’ adaptive technology behaviors. Our interviews with two nurse practitioners in family medicine also reflected these positive effects of the habitual use of technology in nonwork domains. One nurse practitioner stated,</p>
        <disp-quote>
          <p>My use of personal non-health-related technology gives me hope that I am computer savvy and would be able to learn new computer technology that is used in patient settings.</p>
        </disp-quote>
        <p>Another said:</p>
        <disp-quote>
          <p>Because of technology, I am able to see who is waiting in patient rooms and who is still waiting in the waiting room. When the numbers are high, it makes […] clinician[s] want to work faster so that they are not too delayed.</p>
        </disp-quote>
        <p>As telehealth medical services include three different communication modalities (video-conferencing, texting, and a hybrid of the two), care providers’ existing technology habits can help them select and use these three forms of communication and manage communication with patients and other providers.</p>
        <p>Moreover, we found a strong effect of exploitative use (expected use of telehealth technology) on virtual service performance by frontline care providers. These findings are in line with those of a previous study [<xref ref-type="bibr" rid="ref20">20</xref>], such that two modes of IT adaptation behaviors (exploitative and exploratory use) are differentially salient across research contexts. In other words, exploitative and exploratory adaptation behaviors may not coincide under the same context because users have different coping strategies toward information technologies [<xref ref-type="bibr" rid="ref96">96</xref>]. For example, explorative use of technology became salient in context of mobile technology in the BYOD (bring your own device) context [<xref ref-type="bibr" rid="ref20">20</xref>]; in the contexts of enterprise resource planning and product lifecycle management system use, exploratory as well as exploitative adaptation were differentially significant, contingent upon input factors [<xref ref-type="bibr" rid="ref36">36</xref>]. In our research context, the strong effect of exploitative use of telehealth technology may be due to the contextual characteristics of care process. Actually, health care is a controlled and highly concentrated environment such that care providers expect the technologies to function as expected by supplementing their clinical tasks [<xref ref-type="bibr" rid="ref5">5</xref>]. Since this study explored technology-related traits as antecedents to technology adaptation behavior in provider-to-provider communication, it is much anticipated that such technology adaptation behavior can vary by different contexts and heterogenous technology users.</p>
        <p>Lastly, education and income were shown to differentially influence virtual service performance. Prior studies have documented negative effects of demographic variables on technology use, as less educated participants may have less knowledge, whereas those who earn less income may have less opportunities to access advanced information technology [<xref ref-type="bibr" rid="ref97">97</xref>,<xref ref-type="bibr" rid="ref98">98</xref>]. In our research context, we can interpret that the current level of technology education from bachelor’s degree may not be on par with specifics of telehealth technology use for communication with specialists. In addition, our graduate nursing students with high income level may have been exposed to various technologies within and outside the education program or care settings. Thus, demographic characteristics of individual users need to be included when exploring technology adaptation behavior.</p>
      </sec>
      <sec>
        <title>Practical Implications</title>
        <p>This study’s findings can be applied to inform health care practitioners and health app designers. Strategic IT management is necessary for care providers who serve as virtual meeting managers in a telehealth setting [<xref ref-type="bibr" rid="ref81">81</xref>]. As telehealth medical services have garnered much attention, nurse practitioners have played an increasingly important role in supporting various online care services in which multiple technologies need to be operated appropriately. Our results demonstrate that care providers’ adaptive use of technology can help predict telehealth care performance, and therefore, more consideration should be given to the role of intermediary care providers in the care process between patients and specialists. As organizational structures influence both offline and online meeting outcomes [<xref ref-type="bibr" rid="ref99">99</xref>], health practitioners need to focus on organization-level strategies to enhance care providers’ online facilitation by examining the gaps that they have experienced using a variety of technologies across multiple life domains and providing relevant education in the use of focal technology [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref100">100</xref>]. Moreover, this study can be beneficial to telehealth designers and developers in terms of the design of HITs. Prior studies have documented that telehealth apps’ design of features, icons, and terminologies is important and that care providers expect all of these to function as intended [<xref ref-type="bibr" rid="ref14">14</xref>]. As health app developers continue to add new features to stay abreast of rapidly changing health care trends, it is important for them to consider health care consumers’ needs and users’ familiarity and comfort with the existing features that are evolving across a wide range of technologies and systems [<xref ref-type="bibr" rid="ref101">101</xref>].</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This study investigated frontline care providers’ unique role in e-consultation with specialists. By regarding the care providers explicitly as virtual meeting facilitators, we tested the association between their adaptive use of multiple telehealth-related technologies and virtual service performance. Care providers’ standard use of telehealth technologies was shown to be a salient factor that predicts success in virtual service, while the innovative use of telehealth technologies remained insignificant. Among their personal characteristics, the habits and computer self-efficacy that care providers acquired and developed in nonwork settings stimulated and enhanced their willingness to use multiple telehealth technologies in standard and creative ways.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Survey scenario.</p>
        <media xlink:href="jmir_v21i8e15087_app1.pdf" xlink:title="PDF File (Adobe PDF File), 117KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Survey instruments.</p>
        <media xlink:href="jmir_v21i8e15087_app2.pdf" xlink:title="PDF File (Adobe PDF File), 138KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AST</term>
          <def>
            <p>adaptive structuration theory</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">E-consultation</term>
          <def>
            <p>electronic consultation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">HCI</term>
          <def>
            <p>human computer interaction</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">HIT</term>
          <def>
            <p>health information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">ICT</term>
          <def>
            <p>information and communication technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">IS</term>
          <def>
            <p>information systems</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">IT</term>
          <def>
            <p>information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">PLS</term>
          <def>
            <p>partial least squares</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">SEM</term>
          <def>
            <p>structural equation modeling</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Perry</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Long</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Labrique</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Evidence on feasibility and effective use of mHealth strategies by frontline health workers in developing countries: systematic review</article-title>
          <source>Trop Med Int Health</source>
          <year>2015</year>
          <month>08</month>
          <volume>20</volume>
          <issue>8</issue>
          <fpage>1003</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/tmi.12525"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/tmi.12525</pub-id>
          <pub-id pub-id-type="medline">25881735</pub-id>
          <pub-id pub-id-type="pmcid">PMC4692099</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <source>Frontline Health Workers Coalition</source>
          <year>2019</year>
          <access-date>2019-07-24</access-date>
          <comment>Frontline Health Workers 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.frontlinehealthworkers.org/frontline-health-workers">https://www.frontlinehealthworkers.org/frontline-health-workers</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Daskivich</surname>
              <given-names>LP</given-names>
            </name>
            <name name-style="western">
              <surname>Vasquez</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Martinez</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tseng</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mangione</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Implementation and Evaluation of a Large-Scale Teleretinal Diabetic Retinopathy Screening Program in the Los Angeles County Department of Health Services</article-title>
          <source>JAMA Intern Med</source>
          <year>2017</year>
          <month>05</month>
          <day>01</day>
          <volume>177</volume>
          <issue>5</issue>
          <fpage>642</fpage>
          <lpage>649</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28346590"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamainternmed.2017.0204</pub-id>
          <pub-id pub-id-type="medline">28346590</pub-id>
          <pub-id pub-id-type="pii">2612116</pub-id>
          <pub-id pub-id-type="pmcid">PMC5818774</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaufman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pevzner</surname>
              <given-names>Jenia</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>Martha</given-names>
            </name>
            <name name-style="western">
              <surname>Cimino</surname>
              <given-names>James J</given-names>
            </name>
            <name name-style="western">
              <surname>Ebner</surname>
              <given-names>Susana</given-names>
            </name>
            <name name-style="western">
              <surname>Fields</surname>
              <given-names>Lesley</given-names>
            </name>
            <name name-style="western">
              <surname>Moreno</surname>
              <given-names>Vilma</given-names>
            </name>
            <name name-style="western">
              <surname>McGuiness</surname>
              <given-names>Christina</given-names>
            </name>
            <name name-style="western">
              <surname>Weinstock</surname>
              <given-names>Ruth S</given-names>
            </name>
            <name name-style="western">
              <surname>Shea</surname>
              <given-names>Steven</given-names>
            </name>
            <name name-style="western">
              <surname>Starren</surname>
              <given-names>Justin</given-names>
            </name>
          </person-group>
          <article-title>Understanding workflow in telehealth video visits: observations from the IDEATel project</article-title>
          <source>J Biomed Inform</source>
          <year>2009</year>
          <volume>42</volume>
          <issue>4</issue>
          <fpage>581</fpage>
          <lpage>92</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(09)00051-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2009.03.012</pub-id>
          <pub-id pub-id-type="medline">19358897</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(09)00051-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>MacNeill</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Fitzpatrick</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hendy</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Barlow</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Knapp</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bardsley</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Newman</surname>
              <given-names>SP</given-names>
            </name>
          </person-group>
          <article-title>Experiences of front-line health professionals in the delivery of telehealth: a qualitative study</article-title>
          <source>Br J Gen Pract</source>
          <year>2014</year>
          <volume>64</volume>
          <issue>624</issue>
          <fpage>e401</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://bjgp.org/cgi/pmidlookup?view=long&amp;pmid=24982492"/>
          </comment>
          <pub-id pub-id-type="doi">10.3399/bjgp14X680485</pub-id>
          <pub-id pub-id-type="medline">24982492</pub-id>
          <pub-id pub-id-type="pii">64/624/e401</pub-id>
          <pub-id pub-id-type="pmcid">PMC4073725</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Magadzire</surname>
              <given-names>BP</given-names>
            </name>
            <name name-style="western">
              <surname>Budden</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ward</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jeffery</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Frontline health workers as brokers: provider perceptions, experiences and mitigating strategies to improve access to essential medicines in South Africa</article-title>
          <source>BMC Health Serv Res</source>
          <year>2014</year>
          <month>11</month>
          <day>05</day>
          <volume>14</volume>
          <fpage>520</fpage>
          <pub-id pub-id-type="doi">10.1186/s12913-014-0520-6</pub-id>
          <pub-id pub-id-type="medline">25370799</pub-id>
          <pub-id pub-id-type="pii">s12913-014-0520-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC4230357</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Joschko</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Keely</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Grant</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Moroz</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Graveline</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Drimer</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Liddy</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Electronic Consultation Services Worldwide: Environmental Scan</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>12</month>
          <day>21</day>
          <volume>20</volume>
          <issue>12</issue>
          <fpage>e11112</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2018/12/e11112/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11112</pub-id>
          <pub-id pub-id-type="medline">30578187</pub-id>
          <pub-id pub-id-type="pii">v20i12e11112</pub-id>
          <pub-id pub-id-type="pmcid">PMC6320413</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hansen</surname>
              <given-names>SW</given-names>
            </name>
            <name name-style="western">
              <surname>Gogan</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Baxter</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Garfield</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Informed collaboration in health care: An embedded-cases study in geriatric telepsychiatry</article-title>
          <source>Info Systems J</source>
          <year>2018</year>
          <month>08</month>
          <day>22</day>
          <volume>29</volume>
          <issue>2</issue>
          <fpage>514</fpage>
          <lpage>547</lpage>
          <pub-id pub-id-type="doi">10.1111/isj.12218</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <source>Healthit.gov</source>
          <access-date>2019-07-24</access-date>
          <comment>Telemedicine and Telehealth 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthit.gov/topic/health-it-initiatives/telemedicine-and-telehealth">https://www.healthit.gov/topic/health-it-initiatives/telemedicine-and-telehealth</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <source>Mobihealthnews</source>
          <year>2017</year>
          <access-date>2019-07-24</access-date>
          <comment>Enterprise video conferencing company Zoom teams up with Epic to launch configurable telehealth platform 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mobihealthnews.com/content/enterprise-video-conferencing-company-zoom-teams-epic-launch-configurable-telehealth">https://www.mobihealthnews.com/content/enterprise-video-conferencing-company-zoom-teams-epic-launch-configurable-telehealth</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>WS</given-names>
            </name>
            <name name-style="western">
              <surname>Leung</surname>
              <given-names>AY</given-names>
            </name>
          </person-group>
          <article-title>Use of Social Network Sites for Communication Among Health Professionals: Systematic Review</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>03</month>
          <day>28</day>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>e117</fpage>
          <pub-id pub-id-type="doi">10.2196/jmir.8382</pub-id>
          <pub-id pub-id-type="medline">29592845</pub-id>
          <pub-id pub-id-type="pii">v20i3e117</pub-id>
          <pub-id pub-id-type="pmcid">PMC5895921</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vimalananda</surname>
              <given-names>VG</given-names>
            </name>
            <name name-style="western">
              <surname>Gupte</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Seraj</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Orlander</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Berlowitz</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fincke</surname>
              <given-names>BG</given-names>
            </name>
            <name name-style="western">
              <surname>Simon</surname>
              <given-names>SR</given-names>
            </name>
          </person-group>
          <article-title>Electronic consultations (e-consults) to improve access to specialty care: A systematic review and narrative synthesis</article-title>
          <source>J Telemed Telecare</source>
          <year>2015</year>
          <month>05</month>
          <day>20</day>
          <volume>21</volume>
          <issue>6</issue>
          <fpage>323</fpage>
          <lpage>330</lpage>
          <pub-id pub-id-type="doi">10.1177/1357633X15582108</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Ray</surname>
              <given-names>KN</given-names>
            </name>
            <name name-style="western">
              <surname>Mehrotra</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Giboney</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yee</surname>
              <given-names>HF</given-names>
            </name>
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Primary Care Practitioners' Perceptions of Electronic Consult Systems: A Qualitative Analysis</article-title>
          <source>JAMA Intern Med</source>
          <year>2018</year>
          <month>12</month>
          <day>01</day>
          <volume>178</volume>
          <issue>6</issue>
          <fpage>782</fpage>
          <lpage>789</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29801079"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamainternmed.2018.0738</pub-id>
          <pub-id pub-id-type="medline">29801079</pub-id>
          <pub-id pub-id-type="pii">2678459</pub-id>
          <pub-id pub-id-type="pmcid">PMC6145753</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klingberg</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wallis</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Hasselberg</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Yen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Fritzell</surname>
              <given-names>SC</given-names>
            </name>
          </person-group>
          <article-title>Teleconsultation Using Mobile Phones for Diagnosis and Acute Care of Burn Injuries Among Emergency Physicians: Mixed-Methods Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>10</month>
          <day>19</day>
          <volume>6</volume>
          <issue>10</issue>
          <fpage>e11076</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2018/10/e11076/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11076</pub-id>
          <pub-id pub-id-type="medline">30341047</pub-id>
          <pub-id pub-id-type="pii">v6i10e11076</pub-id>
          <pub-id pub-id-type="pmcid">PMC6231743</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hensel</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rai</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>VH</given-names>
            </name>
          </person-group>
          <article-title>Optimizing Electronic Consultation Between Primary Care Providers and Psychiatrists: Mixed-Methods Study</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>12</month>
          <day>06</day>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>e124</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2018/4/e124/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.8943</pub-id>
          <pub-id pub-id-type="medline">29625949</pub-id>
          <pub-id pub-id-type="pii">v20i4e124</pub-id>
          <pub-id pub-id-type="pmcid">PMC5910533</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Buck</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Manges</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kaboli</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Asynchronous teleneurology: A systematic review of electronic provider-to-provider communications</article-title>
          <source>Neurology</source>
          <year>2016</year>
          <volume>86</volume>
          <fpage>3.400</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <source>Healthcare IT News</source>
          <year>2018</year>
          <access-date>2019-07-24</access-date>
          <comment>Nurse burnout? Try telehealth, clinical decision support and analytics tools, expert says 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthcareitnews.com/news/nurse-burnout-try-telehealth-clinical-decision-support-and-analytics-tools-expert-says">https://www.healthcareitnews.com/news/nurse-burnout-try-telehealth-clinical-decision-support-and-analytics-tools-expert-says</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brewster</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Mountain</surname>
              <given-names>Gail</given-names>
            </name>
            <name name-style="western">
              <surname>Wessels</surname>
              <given-names>Bridgette</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>Ciara</given-names>
            </name>
            <name name-style="western">
              <surname>Hawley</surname>
              <given-names>Mark</given-names>
            </name>
          </person-group>
          <article-title>Factors affecting front line staff acceptance of telehealth technologies: a mixed-method systematic review</article-title>
          <source>J Adv Nurs</source>
          <year>2014</year>
          <month>01</month>
          <volume>70</volume>
          <issue>1</issue>
          <fpage>21</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1111/jan.12196</pub-id>
          <pub-id pub-id-type="medline">23786584</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schoen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Osborn</surname>
              <given-names>Robin</given-names>
            </name>
            <name name-style="western">
              <surname>Squires</surname>
              <given-names>David</given-names>
            </name>
            <name name-style="western">
              <surname>Doty</surname>
              <given-names>Michelle</given-names>
            </name>
            <name name-style="western">
              <surname>Rasmussen</surname>
              <given-names>Petra</given-names>
            </name>
            <name name-style="western">
              <surname>Pierson</surname>
              <given-names>Roz</given-names>
            </name>
            <name name-style="western">
              <surname>Applebaum</surname>
              <given-names>Sandra</given-names>
            </name>
          </person-group>
          <article-title>A survey of primary care doctors in ten countries shows progress in use of health information technology, less in other areas</article-title>
          <source>Health Aff (Millwood)</source>
          <year>2012</year>
          <month>12</month>
          <volume>31</volume>
          <issue>12</issue>
          <fpage>2805</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1377/hlthaff.2012.0884</pub-id>
          <pub-id pub-id-type="medline">23154997</pub-id>
          <pub-id pub-id-type="pii">hlthaff.2012.0884</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmitz</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Teng</surname>
              <given-names>Jt</given-names>
            </name>
            <name name-style="western">
              <surname>Webb</surname>
              <given-names>Kj</given-names>
            </name>
          </person-group>
          <article-title>Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals</article-title>
          <source>MIS Quarterly</source>
          <year>2016</year>
          <month>3</month>
          <day>3</day>
          <volume>40</volume>
          <issue>3</issue>
          <fpage>663</fpage>
          <lpage>686</lpage>
          <pub-id pub-id-type="doi">10.25300/MISQ/2016/40.3.07</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Sykes</surname>
              <given-names>TA</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>'Just what the doctor ordered': a revised UTAUT for EMR system adoption and use by doctors</article-title>
          <year>2011</year>
          <conf-name>The 44th Hawaii International Conference on System Sciences</conf-name>
          <conf-date>2011</conf-date>
          <conf-loc>Hawaii</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dünnebeil</surname>
              <given-names>Sebastian</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>Ali</given-names>
            </name>
            <name name-style="western">
              <surname>Blohm</surname>
              <given-names>Ivo</given-names>
            </name>
            <name name-style="western">
              <surname>Leimeister</surname>
              <given-names>Jan Marco</given-names>
            </name>
            <name name-style="western">
              <surname>Krcmar</surname>
              <given-names>Helmut</given-names>
            </name>
          </person-group>
          <article-title>Determinants of physicians' technology acceptance for e-health in ambulatory care</article-title>
          <source>Int J Med Inform</source>
          <year>2012</year>
          <volume>81</volume>
          <issue>11</issue>
          <fpage>746</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2012.02.002</pub-id>
          <pub-id pub-id-type="medline">22397989</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(12)00034-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>Todd R</given-names>
            </name>
            <name name-style="western">
              <surname>Tindall</surname>
              <given-names>R Douglas</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Jiajie</given-names>
            </name>
          </person-group>
          <article-title>Applying heuristic evaluation to improve the usability of a telemedicine system</article-title>
          <source>Telemed J E Health</source>
          <year>2006</year>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>24</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1089/tmj.2006.12.24</pub-id>
          <pub-id pub-id-type="medline">16478410</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agnisarman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Narasimha</surname>
              <given-names>Shraddhaa</given-names>
            </name>
            <name name-style="western">
              <surname>Chalil Madathil</surname>
              <given-names>Kapil</given-names>
            </name>
            <name name-style="western">
              <surname>Welch</surname>
              <given-names>Brandon</given-names>
            </name>
            <name name-style="western">
              <surname>Brinda</surname>
              <given-names>Fnu</given-names>
            </name>
            <name name-style="western">
              <surname>Ashok</surname>
              <given-names>Aparna</given-names>
            </name>
            <name name-style="western">
              <surname>McElligott</surname>
              <given-names>James</given-names>
            </name>
          </person-group>
          <article-title>Toward a More Usable Home-Based Video Telemedicine System: A Heuristic Evaluation of the Clinician User Interfaces of Home-Based Video Telemedicine Systems</article-title>
          <source>JMIR Hum Factors</source>
          <year>2017</year>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>e11</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://humanfactors.jmir.org/2017/2/e11/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/humanfactors.7293</pub-id>
          <pub-id pub-id-type="medline">28438724</pub-id>
          <pub-id pub-id-type="pii">v4i2e11</pub-id>
          <pub-id pub-id-type="pmcid">PMC5422657</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Torrent-Sellens</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Díaz-Chao</surname>
              <given-names>Ángel</given-names>
            </name>
            <name name-style="western">
              <surname>Soler-Ramos</surname>
              <given-names>Ivan</given-names>
            </name>
            <name name-style="western">
              <surname>Saigí-Rubió</surname>
              <given-names>Francesc</given-names>
            </name>
          </person-group>
          <article-title>Modeling and Predicting Outcomes of eHealth Usage by European Physicians: Multidimensional Approach from a Survey of 9196 General Practitioners</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>10</month>
          <day>22</day>
          <volume>20</volume>
          <issue>10</issue>
          <fpage>e279</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2018/10/e279/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9253</pub-id>
          <pub-id pub-id-type="medline">30348628</pub-id>
          <pub-id pub-id-type="pii">v20i10e279</pub-id>
          <pub-id pub-id-type="pmcid">PMC6231736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>A prospective and retrospective look at the diffusion model</article-title>
          <source>J Health Commun</source>
          <year>2004</year>
          <volume>9 Suppl 1</volume>
          <fpage>13</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1080/10810730490271449</pub-id>
          <pub-id pub-id-type="medline">14960401</pub-id>
          <pub-id pub-id-type="pii">94U5AHANQVRQTVAF</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <source>MobihealthNews.com</source>
          <year>2018</year>
          <access-date>2019-07-24</access-date>
          <comment>In-Depth: Four major telemedicine trends of 2018 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mobihealthnews.com/content/depth-four-major-telemedicine-trends-2018">https://www.mobihealthnews.com/content/depth-four-major-telemedicine-trends-2018</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <source>Health Information Technology Regional Extension Center</source>
          <year>2014</year>
          <access-date>2017-07-24</access-date>
          <comment>Telehealth start-up and resource guide 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.gptrac.org/wp-content/uploads/2015/01/TelligenTelehealthGuide-Final-2014.pdf">http://www.gptrac.org/wp-content/uploads/2015/01/TelligenTelehealthGuide-Final-2014.pdf</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rutledge</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kott</surname>
              <given-names>Karen</given-names>
            </name>
            <name name-style="western">
              <surname>Schweickert</surname>
              <given-names>Patty A</given-names>
            </name>
            <name name-style="western">
              <surname>Poston</surname>
              <given-names>Rebecca</given-names>
            </name>
            <name name-style="western">
              <surname>Fowler</surname>
              <given-names>Christianne</given-names>
            </name>
            <name name-style="western">
              <surname>Haney</surname>
              <given-names>Tina S</given-names>
            </name>
          </person-group>
          <article-title>Telehealth and eHealth in nurse practitioner training: current perspectives</article-title>
          <source>Adv Med Educ Pract</source>
          <year>2017</year>
          <volume>8</volume>
          <fpage>399</fpage>
          <lpage>409</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.doi.org/10.2147/AMEP.S116071"/>
          </comment>
          <pub-id pub-id-type="doi">10.2147/AMEP.S116071</pub-id>
          <pub-id pub-id-type="medline">28721113</pub-id>
          <pub-id pub-id-type="pii">amep-8-399</pub-id>
          <pub-id pub-id-type="pmcid">PMC5498674</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hoff</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Deskilling and adaptation among primary care physicians using two work innovations</article-title>
          <source>Health Care Manage Rev</source>
          <year>2011</year>
          <volume>36</volume>
          <issue>4</issue>
          <fpage>338</fpage>
          <lpage>48</lpage>
          <pub-id pub-id-type="doi">10.1097/HMR.0b013e31821826a1</pub-id>
          <pub-id pub-id-type="medline">21685794</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kvedar</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Coye</surname>
              <given-names>Molly Joel</given-names>
            </name>
            <name name-style="western">
              <surname>Everett</surname>
              <given-names>Wendy</given-names>
            </name>
          </person-group>
          <article-title>Connected health: a review of technologies and strategies to improve patient care with telemedicine and telehealth</article-title>
          <source>Health Aff (Millwood)</source>
          <year>2014</year>
          <volume>33</volume>
          <issue>2</issue>
          <fpage>194</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1377/hlthaff.2013.0992</pub-id>
          <pub-id pub-id-type="medline">24493760</pub-id>
          <pub-id pub-id-type="pii">33/2/194</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DeSanctis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Poole</surname>
              <given-names>Ms</given-names>
            </name>
          </person-group>
          <article-title>Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory</article-title>
          <source>Organization Science</source>
          <year>1994</year>
          <month>05</month>
          <volume>5</volume>
          <issue>2</issue>
          <fpage>121</fpage>
          <lpage>147</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.5.2.121</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goh</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>G(</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Evolving Work Routines: Adaptive Routinization of Information Technology in Healthcare</article-title>
          <source>Information Systems Research</source>
          <year>2011</year>
          <month>09</month>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>565</fpage>
          <lpage>585</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1110.0365</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kane</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Alavi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Information Technology and Organizational Learning: An Investigation of Exploration and Exploitation Processes</article-title>
          <source>Organization Science</source>
          <year>2007</year>
          <month>10</month>
          <volume>18</volume>
          <issue>5</issue>
          <fpage>796</fpage>
          <lpage>812</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.1070.0286</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Understanding User Revisions When Using Information System Features: Adaptive System Use and Triggers</article-title>
          <source>MIS Quarterly</source>
          <year>2012</year>
          <volume>36</volume>
          <issue>2</issue>
          <fpage>453</fpage>
          <lpage>478</lpage>
          <pub-id pub-id-type="doi">10.2307/41703463</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bala</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Adaptation to Information Technology: A Holistic Nomological Network from Implementation to Job Outcomes</article-title>
          <source>Management Science</source>
          <year>2015</year>
          <month>10</month>
          <day>27</day>
          <volume>62</volume>
          <issue>1</issue>
          <fpage>156</fpage>
          <lpage>179</lpage>
          <pub-id pub-id-type="doi">10.1287/mnsc.2014.2111</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weigel</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Landrum</surname>
              <given-names>WH</given-names>
            </name>
            <name name-style="western">
              <surname>Hall</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Human-technology adaptation fit theory for healthcare</article-title>
          <year>2009</year>
          <conf-name>The Twelfth Annual Conference of the Southern Association for Information Systems (SAIS), Charleston, SC</conf-name>
          <conf-date>2009</conf-date>
          <conf-loc>Charleston, SC</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>Catharina C</given-names>
            </name>
            <name name-style="western">
              <surname>Ros</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>van Leeuwen</surname>
              <given-names>Mia</given-names>
            </name>
            <name name-style="western">
              <surname>Schrijvers</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>How Professionals Share an E-Care Plan for the Elderly in Primary Care: Evaluating the Use of an E-Communication Tool by Different Combinations of Professionals</article-title>
          <source>J Med Internet Res</source>
          <year>2016</year>
          <month>11</month>
          <day>24</day>
          <volume>18</volume>
          <issue>11</issue>
          <fpage>e304</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2016/11/e304/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.6332</pub-id>
          <pub-id pub-id-type="medline">27884811</pub-id>
          <pub-id pub-id-type="pii">v18i11e304</pub-id>
          <pub-id pub-id-type="pmcid">PMC5146326</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Niederman</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Beise</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Beranek</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <article-title>Issues and Concerns about Computer-Supported Meetings: The Facilitator's Perspective</article-title>
          <source>MIS Quarterly</source>
          <year>1996</year>
          <month>03</month>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.2307/249540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Niederman</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Volkema</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The Effects of Facilitator Characteristics on Meeting Preparation, Set Up, and Implementation</article-title>
          <source>Small Group Research</source>
          <year>2016</year>
          <month>08</month>
          <day>19</day>
          <volume>30</volume>
          <issue>3</issue>
          <fpage>330</fpage>
          <lpage>360</lpage>
          <pub-id pub-id-type="doi">10.1177/104649649903000304</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Griffith</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Fuller</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Northcraft</surname>
              <given-names>GB</given-names>
            </name>
          </person-group>
          <article-title>Facilitator influence in group support systems: Intended and unintended effects</article-title>
          <source>Information Systems Research</source>
          <year>1998</year>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>20</fpage>
          <lpage>36</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>Gigi</given-names>
            </name>
            <name name-style="western">
              <surname>Bostrom</surname>
              <given-names>Rp</given-names>
            </name>
          </person-group>
          <article-title>A Facilitator’s General Model for Managing Socioemotional Issues in Group Support Systems Meeting Environments</article-title>
          <source>Journal of Management Information Systems</source>
          <year>2015</year>
          <month>12</month>
          <day>08</day>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>23</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1080/07421222.1997.11518173</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kolfschoten</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Niederman</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Briggs</surname>
              <given-names>Ro</given-names>
            </name>
            <name name-style="western">
              <surname>de Vreede</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Facilitation Roles and Responsibilities for Sustained Collaboration Support in Organizations</article-title>
          <source>Journal of Management Information Systems</source>
          <year>2014</year>
          <month>12</month>
          <day>08</day>
          <volume>28</volume>
          <issue>4</issue>
          <fpage>129</fpage>
          <lpage>162</lpage>
          <pub-id pub-id-type="doi">10.2753/MIS0742-1222280406</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Delone</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>The DeLone and McLean Model of Information Systems Success: A Ten-Year Update</article-title>
          <source>Journal of Management Information Systems</source>
          <year>2014</year>
          <month>12</month>
          <day>23</day>
          <volume>19</volume>
          <issue>4</issue>
          <fpage>9</fpage>
          <lpage>30</lpage>
          <pub-id pub-id-type="doi">10.1080/07421222.2003.11045748</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petter</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>DeLone</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>McLean</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Measuring information systems success: models, dimensions, measures, and interrelationships</article-title>
          <source>European Journal of Information Systems</source>
          <year>2017</year>
          <month>12</month>
          <day>19</day>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>236</fpage>
          <lpage>263</lpage>
          <pub-id pub-id-type="doi">10.1057/ejis.2008.15</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Devaraj</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kohli</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Performance Impacts of Information Technology: Is Actual Usage the Missing Link?</article-title>
          <source>Management Science</source>
          <year>2003</year>
          <month>03</month>
          <volume>49</volume>
          <issue>3</issue>
          <fpage>273</fpage>
          <lpage>289</lpage>
          <pub-id pub-id-type="doi">10.1287/mnsc.49.3.273.12736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goodhue</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>RL</given-names>
            </name>
          </person-group>
          <article-title>Task-technology fit and individual performance</article-title>
          <source>MIS Quarterly</source>
          <year>1995</year>
          <volume>19</volume>
          <fpage>213</fpage>
          <lpage>236</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Junglas</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Abraham</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Watson</surname>
              <given-names>Rt</given-names>
            </name>
          </person-group>
          <article-title>Task-technology fit for mobile locatable information systems</article-title>
          <source>Decision Support Systems</source>
          <year>2008</year>
          <month>11</month>
          <volume>45</volume>
          <issue>4</issue>
          <fpage>1046</fpage>
          <lpage>1057</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2008.02.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Safran</surname>
              <given-names>DG</given-names>
            </name>
          </person-group>
          <article-title>Primary Care Performance in Fee-for-Service and Prepaid Health Care Systems</article-title>
          <source>JAMA</source>
          <year>1994</year>
          <month>05</month>
          <day>25</day>
          <volume>271</volume>
          <issue>20</issue>
          <fpage>1579</fpage>
          <lpage>1586</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.1994.03510440039030</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hoffer Gittell</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Coordinating Mechanisms in Care Provider Groups: Relational Coordination as a Mediator and Input Uncertainty as a Moderator of Performance Effects</article-title>
          <source>Management Science</source>
          <year>2002</year>
          <month>11</month>
          <volume>48</volume>
          <issue>11</issue>
          <fpage>1408</fpage>
          <lpage>1426</lpage>
          <pub-id pub-id-type="doi">10.1287/mnsc.48.11.1408.268</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <source>Advisory Board</source>
          <year>2017</year>
          <access-date>2019-07-24</access-date>
          <comment>You're probably measuring telehealth ROI wrong. Use these 6 metrics to do it right 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.advisory.com/research/market-innovation-center/the-growth-channel/2017/05/telehealth-roi">https://www.advisory.com/research/market-innovation-center/the-growth-channel/2017/05/telehealth-roi</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="web">
          <source>Spectrum Enterprise</source>
          <year>2017</year>
          <access-date>2019-07-24</access-date>
          <comment>How telehealth is transforming healthcare 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://enterprise.spectrum.com/content/dam/business/omega/enterprise/pdf/landing-pages/webelieve/SE_Telehealth_122217_v3_TS.pdf">https://enterprise.spectrum.com/content/dam/business/omega/enterprise/pdf/landing-pages/webelieve/SE_Telehealth_122217_v3_TS.pdf</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schwamm</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Telehealth: seven strategies to successfully implement disruptive technology and transform health care</article-title>
          <source>Health Aff (Millwood)</source>
          <year>2014</year>
          <month>02</month>
          <volume>33</volume>
          <issue>2</issue>
          <fpage>200</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1377/hlthaff.2013.1021</pub-id>
          <pub-id pub-id-type="medline">24493761</pub-id>
          <pub-id pub-id-type="pii">33/2/200</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nittas</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Mütsch</surname>
              <given-names>Margot</given-names>
            </name>
            <name name-style="western">
              <surname>Ehrler</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Puhan</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Electronic patient-generated health data to facilitate prevention and health promotion: a scoping review protocol</article-title>
          <source>BMJ Open</source>
          <year>2018</year>
          <month>08</month>
          <day>10</day>
          <volume>8</volume>
          <issue>8</issue>
          <fpage>e021245</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://bmjopen.bmj.com/cgi/pmidlookup?view=long&amp;pmid=30099392"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjopen-2017-021245</pub-id>
          <pub-id pub-id-type="medline">30099392</pub-id>
          <pub-id pub-id-type="pii">bmjopen-2017-021245</pub-id>
          <pub-id pub-id-type="pmcid">PMC6089308</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pauleen</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yoong</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Relationship Building and the use of ICT in Boundary-Crossing Virtual Teams: A Facilitator's Perspective</article-title>
          <source>Journal of Information Technology</source>
          <year>2001</year>
          <month>12</month>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>205</fpage>
          <lpage>220</lpage>
          <pub-id pub-id-type="doi">10.1080/02683960110100391</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chau</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>Pj</given-names>
            </name>
          </person-group>
          <article-title>Investigating healthcare professionals’ decisions to accept telemedicine technology: an empirical test of competing theories</article-title>
          <source>Information &amp; Management</source>
          <year>2002</year>
          <month>1</month>
          <volume>39</volume>
          <issue>4</issue>
          <fpage>297</fpage>
          <lpage>311</lpage>
          <pub-id pub-id-type="doi">10.1016/S0378-7206(01)00098-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Prasad</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology</article-title>
          <source>Information Systems Research</source>
          <year>1998</year>
          <month>06</month>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>204</fpage>
          <lpage>215</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.9.2.204</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Serrano</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Karahanna</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The Compensatory Interaction Between User Capabilities and Technology Capabilities in Influencing Task Performance: An Empirical Assessment in Telemedicine Consultations</article-title>
          <source>MIS Quarterly</source>
          <year>2016</year>
          <month>3</month>
          <day>3</day>
          <volume>40</volume>
          <issue>3</issue>
          <fpage>597</fpage>
          <lpage>621</lpage>
          <pub-id pub-id-type="doi">10.25300/MISQ/2016/40.3.04</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>GB</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>User Acceptance of Information Technology: Toward a Unified View</article-title>
          <source>MIS Quarterly</source>
          <year>2003</year>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>425</fpage>
          <lpage>478</lpage>
          <pub-id pub-id-type="doi">10.2307/30036540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chevalking</surname>
              <given-names>SL</given-names>
            </name>
            <name name-style="western">
              <surname>Ben Allouch</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Brusse-Keizer</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Postel</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Pieterse</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Identification of Users for a Smoking Cessation Mobile App: Quantitative Study</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>04</month>
          <day>09</day>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>e118</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/4/e118/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.7606</pub-id>
          <pub-id pub-id-type="medline">29631988</pub-id>
          <pub-id pub-id-type="pii">v20i4e118</pub-id>
          <pub-id pub-id-type="pmcid">PMC5913574</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Emani</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yamin</surname>
              <given-names>CK</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Karson</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Lipsitz</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Wald</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>Patient perceptions of a personal health record: a test of the diffusion of innovation model</article-title>
          <source>J Med Internet Res</source>
          <year>2012</year>
          <volume>14</volume>
          <issue>6</issue>
          <fpage>e150</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2012/6/e150/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2278</pub-id>
          <pub-id pub-id-type="medline">23128775</pub-id>
          <pub-id pub-id-type="pii">v14i6e150</pub-id>
          <pub-id pub-id-type="pmcid">PMC3517342</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Jing</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>Yiwen</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>Yao</given-names>
            </name>
          </person-group>
          <article-title>Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective</article-title>
          <source>Int J Med Inform</source>
          <year>2016</year>
          <volume>88</volume>
          <fpage>8</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2015.12.010</pub-id>
          <pub-id pub-id-type="medline">26878757</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(15)30077-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chow</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Herold</surname>
              <given-names>DK</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Extending the technology acceptance model to explore the intention to use Second Life for enhancing healthcare education</article-title>
          <source>Computers &amp; Education</source>
          <year>2012</year>
          <month>12</month>
          <volume>59</volume>
          <issue>4</issue>
          <fpage>1136</fpage>
          <lpage>1144</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2012.05.011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Compeau</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Higgins</surname>
              <given-names>CA</given-names>
            </name>
          </person-group>
          <article-title>Computer Self-Efficacy: Development of a Measure and Initial Test</article-title>
          <source>MIS Quarterly</source>
          <year>1995</year>
          <month>06</month>
          <volume>19</volume>
          <issue>2</issue>
          <fpage>189</fpage>
          <lpage>211</lpage>
          <pub-id pub-id-type="doi">10.2307/249688</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ozturk</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Bilgihan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Nusair</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Okumus</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>What keeps the mobile hotel booking users loyal? Investigating the roles of self-efficacy, compatibility, perceived ease of use, and perceived convenience</article-title>
          <source>International Journal of Information Management</source>
          <year>2016</year>
          <month>12</month>
          <volume>36</volume>
          <issue>6</issue>
          <fpage>1350</fpage>
          <lpage>1359</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.ijinfomgt.2016.04.005"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2016.04.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tams</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Craig</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy</article-title>
          <source>The Journal of Strategic Information Systems</source>
          <year>2018</year>
          <month>06</month>
          <volume>27</volume>
          <issue>2</issue>
          <fpage>170</fpage>
          <lpage>190</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.jsis.2017.07.004"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jsis.2017.07.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zimmer</surname>
              <given-names>Jc</given-names>
            </name>
            <name name-style="western">
              <surname>Gundlach</surname>
              <given-names>Mj</given-names>
            </name>
            <name name-style="western">
              <surname>McKnight</surname>
              <given-names>Dh</given-names>
            </name>
          </person-group>
          <article-title>Internal and External Dimensions of Computer Self-Efficacy: An Empirical Examination</article-title>
          <source>IEEE Trans Eng Manage</source>
          <year>2008</year>
          <month>11</month>
          <volume>55</volume>
          <issue>4</issue>
          <fpage>628</fpage>
          <lpage>644</lpage>
          <pub-id pub-id-type="doi">10.1109/TEM.2008.927825</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Thong</surname>
              <given-names>JYL</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology</article-title>
          <source>MIS Quarterly</source>
          <year>2012</year>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>157</fpage>
          <lpage>178</lpage>
          <pub-id pub-id-type="doi">10.2307/41410412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Guinea</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Markus</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Why Break the Habit of a Lifetime? Rethinking the Roles of Intention, Habit, and Emotion in Continuing Information Technology Use</article-title>
          <source>MIS Quarterly</source>
          <year>2009</year>
          <volume>33</volume>
          <issue>3</issue>
          <fpage>433</fpage>
          <lpage>444</lpage>
          <pub-id pub-id-type="doi">10.2307/20650303</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jasperson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>PE</given-names>
            </name>
            <name name-style="western">
              <surname>Zmud</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems</article-title>
          <source>MIS Quarterly</source>
          <year>2005</year>
          <volume>29</volume>
          <issue>3</issue>
          <fpage>525</fpage>
          <lpage>557</lpage>
          <pub-id pub-id-type="doi">10.2307/25148694</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McGowan</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Wasko</surname>
              <given-names>Molly</given-names>
            </name>
            <name name-style="western">
              <surname>Vartabedian</surname>
              <given-names>Bryan Steven</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>Robert S</given-names>
            </name>
            <name name-style="western">
              <surname>Freiherr</surname>
              <given-names>Desirae D</given-names>
            </name>
            <name name-style="western">
              <surname>Abdolrasulnia</surname>
              <given-names>Maziar</given-names>
            </name>
          </person-group>
          <article-title>Understanding the factors that influence the adoption and meaningful use of social media by physicians to share medical information</article-title>
          <source>J Med Internet Res</source>
          <year>2012</year>
          <month>09</month>
          <day>24</day>
          <volume>14</volume>
          <issue>5</issue>
          <fpage>e117</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2012/5/e117/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2138</pub-id>
          <pub-id pub-id-type="medline">23006336</pub-id>
          <pub-id pub-id-type="pii">v14i5e117</pub-id>
          <pub-id pub-id-type="pmcid">PMC3510763</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Limayem</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Understanding information systems continuance: The case of Internet-based learning technologies</article-title>
          <source>Information &amp; Management</source>
          <year>2008</year>
          <month>6</month>
          <volume>45</volume>
          <issue>4</issue>
          <fpage>227</fpage>
          <lpage>232</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2008.02.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Limayem</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hirt</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Force of Habit and Information Systems Usage: Theory and Initial Validation</article-title>
          <source>JAIS</source>
          <year>2003</year>
          <volume>4</volume>
          <issue>1</issue>
          <fpage>65</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.17705/1jais.00030</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nevo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nevo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pinsonneault</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A Temporally Situated Self-Agency Theory of Information Technology Reinvention</article-title>
          <source>MIS Quarterly</source>
          <year>2016</year>
          <month>1</month>
          <day>1</day>
          <volume>40</volume>
          <issue>1</issue>
          <fpage>157</fpage>
          <lpage>186</lpage>
          <pub-id pub-id-type="doi">10.25300/MISQ/2016/40.1.07</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Subramani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>How Do Suppliers Benefit from Information Technology Use in Supply Chain Relationships?</article-title>
          <source>MIS Quarterly</source>
          <year>2004</year>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>45</fpage>
          <lpage>73</lpage>
          <pub-id pub-id-type="doi">10.2307/25148624</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Examining explorative and exploitative uses of smartphones: a user competence perspective</article-title>
          <source>Info Technology &amp; People</source>
          <year>2015</year>
          <month>03</month>
          <day>02</day>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>133</fpage>
          <lpage>162</lpage>
          <pub-id pub-id-type="doi">10.1108/ITP-04-2013-0063</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Goo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nam</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Yoo</surname>
              <given-names>CW</given-names>
            </name>
          </person-group>
          <article-title>Smart tourism technologies in travel planning: The role of exploration and exploitation</article-title>
          <source>Information &amp; Management</source>
          <year>2017</year>
          <month>09</month>
          <volume>54</volume>
          <issue>6</issue>
          <fpage>757</fpage>
          <lpage>770</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.im.2016.11.010"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.im.2016.11.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="web">
          <source>Health Leaders</source>
          <year>2018</year>
          <access-date>2019-07-24</access-date>
          <comment>4 ways telemedicine is changing healthcare 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthleadersmedia.com/innovation/4-ways-telemedicine-changing-healthcare">https://www.healthleadersmedia.com/innovation/4-ways-telemedicine-changing-healthcare</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Teddlie</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Mixed Methods Sampling</article-title>
          <source>Journal of Mixed Methods Research</source>
          <year>2017</year>
          <month>06</month>
          <day>12</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>77</fpage>
          <lpage>100</lpage>
          <pub-id pub-id-type="doi">10.1177/1558689806292430</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ringle</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Straub</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>A Critical Look at the Use of PLS-SEM in MIS Quarterly</article-title>
          <source>MIS Quarterly</source>
          <year>2012</year>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>iii</fpage>
          <lpage>xiv</lpage>
          <pub-id pub-id-type="doi">10.2307/41410402</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahuja</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>JB</given-names>
            </name>
          </person-group>
          <article-title>Moving beyond Intentions and toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use</article-title>
          <source>MIS Quarterly</source>
          <year>2005</year>
          <volume>29</volume>
          <issue>3</issue>
          <fpage>427</fpage>
          <lpage>459</lpage>
          <pub-id pub-id-type="doi">10.2307/25148691</pub-id>
          <pub-id pub-id-type="medline">10.2307/25148691</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair Jr</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hopkins</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kuppelwieser</surname>
              <given-names>GV</given-names>
            </name>
          </person-group>
          <article-title>Partial least squares structural equation modeling (PLS-SEM)</article-title>
          <source>European Business Review</source>
          <year>2014</year>
          <month>03</month>
          <day>04</day>
          <volume>26</volume>
          <issue>2</issue>
          <fpage>106</fpage>
          <lpage>121</lpage>
          <pub-id pub-id-type="doi">10.1108/EBR-10-2013-0128</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Hult</surname>
              <given-names>GTM</given-names>
            </name>
            <name name-style="western">
              <surname>Ringle</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>A Primer On Partial Least Squares Structural Equation Modeling (PLS-SEM)</source>
          <year>2019</year>
          <publisher-loc>CA</publisher-loc>
          <publisher-name>Sage Publications, Inc</publisher-name>
          <fpage>328</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Overton</surname>
              <given-names>TS</given-names>
            </name>
          </person-group>
          <article-title>Estimating Nonresponse Bias in Mail Surveys</article-title>
          <source>Journal of Marketing Research</source>
          <year>1977</year>
          <month>08</month>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>396</fpage>
          <lpage>402</lpage>
          <pub-id pub-id-type="doi">10.2307/3150783</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pavlou</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model</article-title>
          <source>International Journal of Electronic Commerce</source>
          <year>2014</year>
          <month>12</month>
          <day>23</day>
          <volume>7</volume>
          <issue>3</issue>
          <fpage>101</fpage>
          <lpage>134</lpage>
          <pub-id pub-id-type="doi">10.1080/10864415.2003.11044275</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Podsakoff</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>MacKenzie</surname>
              <given-names>Scott B</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>Jeong-Yeon</given-names>
            </name>
            <name name-style="western">
              <surname>Podsakoff</surname>
              <given-names>Nathan P</given-names>
            </name>
          </person-group>
          <article-title>Common method biases in behavioral research: a critical review of the literature and recommended remedies</article-title>
          <source>J Appl Psychol</source>
          <year>2003</year>
          <month>10</month>
          <volume>88</volume>
          <issue>5</issue>
          <fpage>879</fpage>
          <lpage>903</lpage>
          <pub-id pub-id-type="doi">10.1037/0021-9010.88.5.879</pub-id>
          <pub-id pub-id-type="medline">14516251</pub-id>
          <pub-id pub-id-type="pii">2003-08045-010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fornell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Larcker</surname>
              <given-names>DF</given-names>
            </name>
          </person-group>
          <article-title>Evaluating Structural Equation Models with Unobservable Variables and Measurement Error</article-title>
          <source>Journal of Marketing Research</source>
          <year>1981</year>
          <month>02</month>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.2307/3151312</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Statistical Power Analysis For The Behavioral Sciences (2nd Edition)</source>
          <year>1988</year>
          <publisher-loc>Mahwah, NJ</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dennis</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research</article-title>
          <source>Journal of Management Information Systems</source>
          <year>2014</year>
          <month>12</month>
          <day>08</day>
          <volume>27</volume>
          <issue>2</issue>
          <fpage>9</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.2753/MIS0742-1222270201</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abel</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Shimada</surname>
              <given-names>Stephanie L</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Karen</given-names>
            </name>
            <name name-style="western">
              <surname>Ramsey</surname>
              <given-names>Christine</given-names>
            </name>
            <name name-style="western">
              <surname>Skanderson</surname>
              <given-names>Melissa</given-names>
            </name>
            <name name-style="western">
              <surname>Erdos</surname>
              <given-names>Joseph</given-names>
            </name>
            <name name-style="western">
              <surname>Godleski</surname>
              <given-names>Linda</given-names>
            </name>
            <name name-style="western">
              <surname>Houston</surname>
              <given-names>Thomas K</given-names>
            </name>
            <name name-style="western">
              <surname>Brandt</surname>
              <given-names>Cynthia A</given-names>
            </name>
          </person-group>
          <article-title>Dual Use of a Patient Portal and Clinical Video Telehealth by Veterans with Mental Health Diagnoses: Retrospective, Cross-Sectional Analysis</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>11</month>
          <day>07</day>
          <volume>20</volume>
          <issue>11</issue>
          <fpage>e11350</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/11/e11350/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11350</pub-id>
          <pub-id pub-id-type="medline">30404771</pub-id>
          <pub-id pub-id-type="pii">v20i11e11350</pub-id>
          <pub-id pub-id-type="pmcid">PMC6249500</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tamilmani</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rana</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Dwivedi</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Use of ‘Habit’ Is not a Habit in Understanding Individual Technology Adoption: A Review of UTAUT2 Based Empirical Studies</article-title>
          <source>Smart Working, Living and Organising. TDIT 2018. IFIP Advances in Information and Communication Technology</source>
          <year>2018</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>277</fpage>
          <lpage>294</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Polites</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Karahanna</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Shackled to the Status Quo: The Inhibiting Effects of Incumbent System Habit, Switching Costs, and Inertia on New System Acceptance</article-title>
          <source>MIS Quarterly</source>
          <year>2012</year>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>21</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.2307/41410404</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Soror</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hammer</surname>
              <given-names>Bi</given-names>
            </name>
            <name name-style="western">
              <surname>Steelman</surname>
              <given-names>ZR</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
            <name name-style="western">
              <surname>Limayem</surname>
              <given-names>MM</given-names>
            </name>
          </person-group>
          <article-title>Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective</article-title>
          <source>Info Systems J</source>
          <year>2015</year>
          <month>02</month>
          <day>24</day>
          <volume>25</volume>
          <issue>4</issue>
          <fpage>403</fpage>
          <lpage>427</lpage>
          <pub-id pub-id-type="doi">10.1111/isj.12065</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Thong</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead</article-title>
          <source>JAIS</source>
          <year>2016</year>
          <month>05</month>
          <volume>17</volume>
          <issue>5</issue>
          <fpage>328</fpage>
          <lpage>376</lpage>
          <pub-id pub-id-type="doi">10.17705/1jais.00428</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>YJ</given-names>
            </name>
            <name name-style="western">
              <surname>Ha</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Consumer Use of the Internet for Health Management</article-title>
          <source>Journal of Consumer Health on the Internet</source>
          <year>2016</year>
          <month>05</month>
          <day>09</day>
          <volume>20</volume>
          <issue>1-2</issue>
          <fpage>1</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1080/15398285.2015.1127114</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beaudry</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Pinsonneault</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Understanding User Responses to Information Technology: A Coping Model of User Adaptation</article-title>
          <source>MIS Quarterly</source>
          <year>2005</year>
          <volume>29</volume>
          <issue>3</issue>
          <fpage>493</fpage>
          <lpage>524</lpage>
          <pub-id pub-id-type="doi">10.2307/25148693</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Correa</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hinsley</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>de Zúñiga</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Who interacts on the Web?: The intersection of users’ personality and social media use</article-title>
          <source>Computers in Human Behavior</source>
          <year>2010</year>
          <month>3</month>
          <volume>26</volume>
          <issue>2</issue>
          <fpage>247</fpage>
          <lpage>253</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.chb.2009.09.003"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chb.2009.09.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Porter</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Donthu</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived access barriers and demographics</article-title>
          <source>Journal of Business Research</source>
          <year>2006</year>
          <month>9</month>
          <volume>59</volume>
          <issue>9</issue>
          <fpage>999</fpage>
          <lpage>1007</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.jbusres.2006.06.003"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2006.06.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carney</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Middle manager involvement in strategy development in not-for profit organizations: the director of nursing perspective - how organizational structure impacts on the role</article-title>
          <source>J Nurs Manag</source>
          <year>2004</year>
          <month>01</month>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>13</fpage>
          <lpage>21</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/j.1365-2834.2004.00388.x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/j.1365-2834.2004.00388.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hah</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Goldin</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Exploring Care Providers' Perceptions and Current Use of Telehealth Technology at Work, in Daily Life, and in Education: Qualitative and Quantitative Study</article-title>
          <source>JMIR Med Educ</source>
          <year>2019</year>
          <month>04</month>
          <day>22</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>e13350</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mededu.jmir.org/2019/1/e13350/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13350</pub-id>
          <pub-id pub-id-type="medline">31008708</pub-id>
          <pub-id pub-id-type="pii">v5i1e13350</pub-id>
          <pub-id pub-id-type="pmcid">PMC6658315</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fathi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Modin</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Nurses advancing telehealth services in the era of healthcare reform</article-title>
          <source>OJIN</source>
          <year>2017</year>
          <volume>22</volume>
          <issue>2</issue>
          <fpage>10</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.3912/OJIN.Vol22No02Man02</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
