Professional Documents
Culture Documents
Designing Effective Mobile Health Apps Does Combining Behavior Change Techniques Really Create Synergies
Designing Effective Mobile Health Apps Does Combining Behavior Change Techniques Really Create Synergies
To cite this article: Kai Spohrer, Monica Fallon, Hartmut Hoehle & Armin Heinzl (2021)
Designing Effective Mobile Health Apps: Does Combining Behavior Change Techniques
Really Create Synergies?, Journal of Management Information Systems, 38:2, 517-545, DOI:
10.1080/07421222.2021.1912936
ABSTRACT KEYWORDS
Although several theories could be applied to stimulate mobile health Mobile health; design
(mHealth) use and change people’s health behaviors, theory-driven science; social comparison;
mHealth designs are scarce. Instead, developers and researchers often protection motivation; fear
appeals; stress management;
implement behavior change techniques and mix multiple techniques
behavior change theory
without explicitly considering their underlying theoretical mechan
isms. We call this practice into question and propose that combining
behavior change techniques does not necessarily result in synergistic
effects. Drawing on theories of protection motivation and social
upward comparison, we engage in explanatory design theorizing to
understand interactions of behavior change techniques and their
implications for mHealth design. We design, theorize about, and eval
uate four mHealth prototypes for stress alleviation. In a five-week field
experiment with n = 138 participants and a subsequent qualitative
substantiation, we show that there is a negative interaction effect of
protection motivation and social upward comparison, rendering their
combined application less effective. Our findings elicit mutual bound
ary conditions for theories of protection motivation and social upward
comparison. If mechanisms of one theory are present, they restrict the
effectiveness of mechanisms of the other theory. Thus, mHealth devel
opers need to use caution when combining different behavior change
techniques within one mHealth artifact.
Introduction
Mobile health (mHealth) (i.e., the practice of medicine and public health supported by
mobile device functionalities and applications [66]) is playing an increasingly important
role in enabling individuals to manage their health [2]. Given the benefits of mHealth, many
organizations, such as Barclays, IBM, Time Warner, and Target, have begun to incorporate
mHealth into corporate wellness programs to improve the health, well-being, and perfor
mance of their employees [18]. However, the extent to which individuals actively use
mHealth is often limited to few initial interactions and, thus, reduces the effectiveness in
improving users’ health behaviors and health outcomes [33]. Although a substantial
amount of money is invested to increase mHealth app use, only 4 percent of mHealth
developers manage to acquire more than 1 million downloads annually and only 30-40 per
cent of first-time users convert into active users [49]. The development of mHealth
CONTACT Kai Spohrer spohrer@uni-mannheim.de University of Mannheim Chair of General Management and
Information Systems, L15, 1-6, 68161 Mannheim, Germany.
Supplemental data for this article can be accessed on the publisher’s website
© 2021 Taylor & Francis Group, LLC
518 SPOHRER ET AL.
applications that stimulate active use therefore constitutes an enduring challenge of high
practical relevance [39].
Although there are a number of strong, empirically backed theories on health behavior
change that could guide mHealth developers in designing more frequently used and
effective mHealth, mHealth practice does not usually draw on theory [31]. Instead, it has
focused on combining behavior change techniques, such as goal setting or social comparison
[16, 36]. Behavior change techniques are defined as “an observable, replicable, and irredu
cible component of an intervention designed to alter or redirect causal processes that
regulate behavior” [42, p. 82]. Contemporary mHealth applications often draw on combi
nations of several such behavior change techniques [16, 36]. On average, recent reviews
found five distinct behavior change techniques per mHealth application in academic studies
[43]. This is likely due to the fact that current mHealth practice and much extant research
assume that combining multiple behavior change techniques results in synergistic effects,
which implies that behavior change techniques are commensurable and that combining
them results in more advantageous outcomes [17].
However, many health behavior change theories and behavior change techniques have
fundamentally different and potentially incommensurable underlying mechanisms, mak
ing the assumption of synergistic effects highly questionable. For example, prominent
behavior change techniques, such as fear arousal and social influence stem from separate
lines of investigation and build on different theoretical mechanisms [13, 30, 41, 42]. We
propose that such behavior change techniques draw on mechanisms that may actually
counteract or be fundamentally incommensurable. In line with this argument, recent
mHealth meta-analyses found no significant positive effects of greater numbers of com
bined behavior change techniques on behavioral outcomes [43]. Therefore, we suggest
that combining behavior change techniques without considering the theoretical mechan
isms underlying them may actually have a negative effect on outcomes rather than
synergistically improve them.
A dominant focus on behavior change techniques, rather than theories, could also be
problematic from a research perspective. Behavior change techniques have been proposed
as a unit of analysis that can be decoupled from their theoretical origins because behavior
change techniques are potentially related to multiple theories, well-defined, and repro
ducible, which facilitates their implementation and comparability across different settings
[41, 42]. We follow recent work that suggests it may be important to account for the causal
mechanisms that underlie each behavior change technique to truly understand their
effects [13, 30]. More specifically, the basic premise of our research is that a theory-free
focus on behavior change techniques may lead to combinations of counteracting mechan
isms in mHealth designs that obfuscate the techniques’ effects and prevent reliable
empirical evaluations. In that case, an overly narrow focus on behavior change techniques
and their combination would limit our ability to gain theoretical insights, understand
boundary conditions, and elicit incommensurability of causal mechanisms.
We call the focus on behavior change techniques in mHealth into question and aim to
show that there are combinations of wide-spread and accepted behavior change techniques
that mutually dampen their effects because they build on counteracting and incompatible
theoretical mechanisms. To do so, we turn to two popular behavior change theories that are
frequently embodied in widely used behavior change techniques [13, 30], namely social
upward comparison theory [20] and protection motivation theory [52]. Although these
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 519
theories both explain and predict health behavior change, they originate from distinct lines
of research and entail very different theoretical mechanisms. Specifically, protection moti
vation theory works through a fear arousal mechanism whereas social upward comparison
theory works through a social influence mechanism. Prior work provided much empirical
support for each of the two theories and their theoretical mechanisms in isolation, but their
interactions remain largely unexplored.
Against this backdrop, this study has the following goals:
(1) Combine and contrast social upward comparison and protection motivation as two
popular theoretical mechanisms of behavior change in mHealth;
(2) Theoretically develop how the mechanisms should negatively interact;
(3) Instantiate the theories in prototypes of an mHealth artifact;
(4) Empirically evaluate the predicted effects using the mHealth artifact.
To achieve these goals, we follow one of the less prominent design science approaches in
information systems (IS) literature: explanatory design theorizing [47, 67]. Explanatory
design theorizing is particularly suitable for our study because it explicitly considers the
interdependence of simultaneously implemented design features and informs designers
which features should be included in an artifact and why [45].
This study contributes to the information systems (IS) literature in four key ways. First, this
research bridges the theoretical boundaries between social comparison theory and protection
motivation theory. We theorize why and empirically show that their combination negatively
impacts mHealth use. Second, we illustrate that combining behavior change techniques does
not necessarily result in synergistic effects. This finding contributes to research on behavior
change techniques and calls widely held assumptions of synergies into question [13, 30].
Third, we showcase that building dedicated new technology is a promising way to create
insights into theoretical mechanisms that drive user behavior. Specifically, we use explanatory
design theorizing to develop prototypes based on two kernel theories and test hypotheses in
the domain of mHealth use. Finally, from a practical perspective, our study has important
implications for integrating behavior change techniques in mHealth design. The findings help
improve mHealth designs by considering underlying theoretical mechanisms. Our instantia
tions of the two theories can be used by future mHealth practice.
In the following sections, we review research on mHealth, explain how combining
behavior change techniques can have undesirable effects, and identify protection motivation
and social upward comparison as appropriate theories to study this issue. Then, we provide
comprehensive design recommendations for instantiating protection motivation and social
upward comparison in mHealth. Four prototypes of an mHealth app are developed and
evaluated in a field experiment with n = 138 participants and a subsequent qualitative
substantiation. Comparing variations of the mHealth app, we assess the effectiveness of
design instantiations in stimulating use and evaluate interaction effects.
Both mHealth practice [16, 36] and research [17, 43] often combine multiple behavior
change techniques into a single artifact. The line of thought underlying these combinations
originates from the idea that behavior change techniques can be more easily delineated,
implemented, and reproduced than instantiations of complete theories [1, 41, 42]. However,
the focus on isolated behavior change techniques has sometimes led to oversimplifying
conclusions regarding their combined effects. Specifically, mHealth research usually
assumes that positive effects of behavior change techniques are mutually reinforcing
when the techniques are combined [17].
Figure 1 visualizes two frequently found questionable conclusions from valid studies on
isolated behavior change techniques: Imagine two rigorous studies on the isolated effects of
behavior change techniques X and Y, respectively. Both X (Figure 1a) and Y (Figure 1b) are
validly shown to have significant positive effects on use and health outcomes. Questionable
conclusions can occur when it is assumed that the isolated techniques’ positive effects simply add
up (Figure 1c) or that the techniques even complement each other and create synergies (Figure
1d). We challenge these assumptions and argue that behavior change techniques can actually be
incommensurable and counteracting due to their underlying theoretical mechanisms.
In line with our argument, meta-analyses on whether a combination of behavior change
techniques leads to synergistic effects provide mixed results [43, 68]. They show that the
combination of behavior change techniques in mHealth is often piecemeal with the
combined techniques stemming from different theoretical origins [30, 43]. Effects on
behaviors, however, do not result from techniques themselves, but from the causal mechan
isms underlying them [41] and their cognitive evaluation [29]. If two behavior change
techniques are combined that trigger counteracting mechanisms, the effect should be lower
than the sum of positive effects or even negative. If such negative interactions of individually
beneficial techniques are common, solely integrating behavior change techniques without
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 521
considering their theoretical basis would clearly offer little value. It is so far unclear,
however, whether and to what extent such interactions of counteracting techniques indeed
influence mHealth use and outcomes. Moreover, we are not aware of any studies elaborat
ing such counteracting effects and their consequences for common behavior change
techniques in mHealth.
Figure 1. Questionable assumptions about synergistic effects of behavior change techniques. BCT,
behavior change technique.
Theoretical Background
To show the harmful potential of combining behavior change techniques without consider
ing their underlying theoretical mechanisms, we turn to social upward comparison theory
and protection motivation theory and examine their combination. These theories are two of
the most prominent behavior change theories with distinct theoretical mechanisms and are
frequently embodied in behavior change techniques [13, 30]. Whereas social upward
comparison is abundantly used in many mobile applications in features such as leader
boards or contests, protection motivation with its fear arousal mechanism is particularly
present in the healthcare context because “apparently the allure of obtaining the positive
benefits of health enhancement does not have the persuasive appeal of avoiding the negative
consequences” [51, p. 20]. In the following section, we elaborate the mechanisms underlying
these theories and conceptualize how they can counteract.
others’ [20]. If social upward comparison creates a perceived negative discrepancy between
individuals' own and others' performance, it stimulates them to take action to reduce the
discrepancy [20]. Prior work shows that self-evaluating one’s abilities in comparison to better
performing others can be encouraging, inspiring and self-motivating [60]. Stressed and
threatened individuals may compare upward to seek information on how better-off others
are coping with a problem, which allows them to gain inspiration and hope [60].
The boundaries of the positive effects of social upward comparison are, however, not so
clear-cut. Social upward comparison is sometimes interpreted as a social threat, in which
better performing others can threaten one’s self-esteem and perception of abilities [22].
Accordingly, researchers have studied how experiencing different types of threats influences
social comparison. Some scholars suggested that people experiencing a health threat, such as
cancer, rheumatoid arthritis, and chronic pain may compare more downwards than upwards
[61]. Meta-analyses suggest, however, that the presence of a threat can possibly reduce
upward comparison but comparing upward remains a predominant human preference [58].
Behavior change techniques instantiating elements of social upward comparison are
widely used in mHealth [36] and to understand app usage [69], for example in features
such as leaderboards and performance visibility. However, the extent to which social
comparison features interact with other commonly integrated features in mHealth remains
unclear [7]. On a more fundamental level, it remains unclear how the social influence
mechanisms underlying social upward comparison interact with the theoretical mechan
isms underlying other behavior change techniques.
behavior change techniques based on protection motivation theory include fear appeal
messages that contain threats of future health consequences or punishment, verbal persua
sion of one’s capabilities, and skill information [17, 42].
Despite the positive effects of protection motivation theory in persuading users to enact
a behavior, prior work has not clearly outlined the boundary conditions under which
protection motivation is effective. In particular, fear appeals are often presented to indivi
duals in minimally social contexts [65]. Thus, it is unclear how fear arousal mechanisms
underlying protection motivation theory interact with social influence mechanisms.
Studying such interactions is important because the impact of fear appeals is not uniform
across all users and may in part be determined by perceptions of social influence. In prior IS
research on protection motivation, social influence showed the strongest predictive ability
for adopting IS security behaviors compared to coping appraisals and threat appraisals [28].
Thus, IS research has called for research that helps to better understand social factors in
protection motivation models [10]. Although not fully evaluated, these statements suggest
that social influence mechanisms may counteract fear arousal mechanisms. Consequently,
we follow a design science approach that allows us to evaluate interactions between social
upward comparison and protection motivation in mHealth.
Theory-Guided Instantiation
To instantiate the theories of social upward comparison and protection motivation into
mHealth, we utilize elementary features of smartphones, namely, the continuous availability
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 525
of user data and push notifications. Contemporary smartphones and mobile networks allow
for close tracking of user activities in self-developed apps, collecting usage data, as well as
for analyzing, visualizing, and reacting to usage patterns. Moreover, users can typically be
reached at nearly all times through push notifications. These notifications can be pushed to
users so that they are displayed in the active view of the users’ smartphone, thus making it
nearly impossible to avoid the information. We rely on these elementary smartphone
features to create transferrable, manifest mHealth design features that completely represent
the theories’ independent variables and trigger the social upward comparison and protec
tion motivation mechanisms that stimulate increased mHealth use.
To become effective, the social upward comparison mechanism requires that individuals
perceive a negative discrepancy between their own and others’ performance on a compar
ison dimension and that no negative side-effects of social upward comparison overlay the
respective motivational effects. Thus, instantiations of social upward comparison theory in
mHealth need to clearly point users to a comparison dimension, ensure that the users
become aware of a negative performance discrepancy, and prevent three common side-
effects: envy and inter-personal quarrels [57], damage to self-esteem [22], and privacy
concerns [6]. Social upward comparison induces envy when a referent is perceived as
extremely superior, but still very similar to oneself [32]. Accordingly, close friends and
acquaintances at the top are the most common envy targets [26]. Social upward comparison
can damage one’s self-esteem if one feels that others witness the fact that one is doing much
worse than they are [22]. Finally, there have been escalating concerns about information
privacy in healthcare settings [6]. While mHealth rarely accounts for privacy concerns [59],
individuals are hesitant to disclose sensitive health information, even if they compare
themselves to others based on this information [6]. Accordingly, we developed messages
and visual displays that point mHealth users to a comparison dimension, show the user’s
negative performance discrepancy, and mitigate the common side-effects.
Tables 3a and 3b show the developed social upward comparison features in detail. We
developed push messages that suggest mHealth use as a comparison dimension, highlight
a negative discrepancy in mHealth use, and encourage users to make more detailed upward
comparisons using a performance visibility page. The developed performance visibility page
displays a graph, in which the average frequency of mHealth use of all other users is shown
in comparison to the focal user. The displayed data are automatically manipulated so that
the displayed average of mHealth use by all users is higher than the individual user’s. The
data manipulation ensures that all users can only compare upwards. Displaying the average
frequency of mHealth use by all users forces each user to compare to the anonymous
collective of all users, rather than comparing to individual users who perform better.
Displaying only anonymous usage data prevents the common side-effects of social upward
comparison: Without a personally identifiable target, users cannot develop envy to better
performing individuals; without explicit individual usage patterns, users do not have to fear
unfavorable evaluations by other users and potential losses in self-esteem as others cannot
look down on them; without details about individuals, users do not have to fear that their
health data are disclosed to other users.
We instantiated protection motivation theory into mHealth through fear appeal push
messages. Following the specification of protection motivation theory that has frequently
been applied in IS research [28,55], fear appeals contain a threat appraisal, which empha
sizes on threat severity and susceptibility, and a coping appraisal, which emphasizes on self-
526 SPOHRER ET AL.
Note: Online Appendix B lists the fear appeal push notifications used in this study.
efficacy, response efficacy, and response cost. To instantiate these elements, each fear appeal
push message that we developed suggests that a particular health threat (e.g., stress) is
potentially harmful (e.g., impairing performance in sports and school) for groups of
individuals that include the user (e.g., college students). Each message further suggests
that using the specific mHealth app can alleviate this harm effectively (e.g., supporting
physiological stress recovery) and efficiently (e.g., through short and easy exercises). The
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 527
fear appeals thereby conform to current IS guidelines [55] by explaining how the threat puts
users at risk, showing concrete negative consequences and proximity of the threat, and
specifying a concrete protection response. The fear appeals are outlined in Online Appendix
B and are displayed in the active view of users’ smartphone as shown in Table 4. The
instantiations were qualitatively validated as described in the Prototyping and Artifact
Development section.
Hypotheses Development
The theory-guided instantiations in Tables 3a and 3b prompt individuals to compare
upward to the collective of other users while the collective exhibits higher performance in
mHealth use. Users who realize that they perform worse than other users regarding the
mHealth app as a comparison dimension will engage in an evaluation of the discrepancy
and of their abilities to reduce it. Given that the displayed score of mHealth use represents
the average mHealth use of all other users, the user can assume that many others use the
mHealth app more often than the average, whereas, again, many others use it less often than
the average. Thus, users can assume that they would drastically reduce the number of
individuals who outperform them if they reach the average score level. The prospect of not
being outperformed has strong motivational effects and triggers the user to engage in
mHealth use. Research on social comparison features in mHealth strongly supports this
reasoning. It shows that social comparison features stimulate users to engage more with
mHealth applications and make them strive to become top performers [62]. Thus, we
hypothesize:
Hypothesis 1 (H1): The social upward comparison instantiation has a positive effect on
mHealth use.
The instantiations of protection motivation theory in Table 4 and Online Appendix B are
consistent with prior work on fear appeals [52, 53]. They should thus trigger fear arousal
and a protection response. Because the developed fear appeal messages include information
about the severity of the threat as well as the user’s susceptibility to the threat (Table 4;
Online Appendix B), users who receive them will evaluate the threat to be relevant and
potentially harmful. Therefore, users will realize the need to evaluate their coping abilities
and act to alleviate the threat if viable [44]. The developed messages state that users can
avert the health threat through mHealth use and suggest that mHealth use does not create
high costs or effort (Table 4; Online Appendix B). Appraising their coping possibilities,
users will thus perceive mHealth use as an effective and efficient protection from the threat.
Consequently, they will more likely exhibit increased mHealth use as a viable protection
response to the relevant and harmful health threat. This reasoning is supported by prior
work on mHealth, which showed that fear appeal messages can play an important role in
mHealth acceptance and adoption behavior [24]. We hypothesize:
H1 and H2 posit that the instantiations of protection motivation and social upward
comparison theory in isolation have positive effects on mHealth use. At a first glance, it may
seem that combining them should yield synergistic effects and further increase mHealth use.
However, based on the mechanisms underlying them, we suggest that their combination
instead results in a negative interaction effect for two reasons.
First, the mechanisms create contradictory perceptions of threat and abilities. On the one
hand, fear appeal messages emphasize on the harm that may result from not making full use
of one’s abilities to avert a health threat. On the other hand, social upward comparison
information can threaten one’s perceived abilities by showing that one’s performance is
inferior to that of others. Through fear appeal messages, individuals develop a desire to
alleviate the threat to their personal health, thereby focusing on themselves and their own
abilities to cope with the threat; through social upward comparison, individuals may
question their abilities and shift the focus from their own ability to avert the health threat
towards their relative, and possibly inferior, abilities compared to others. Thus,
a combination of social upward comparison and protection motivation sends contradictory
and daunting signals.
Second, the static nature of fear appeals does not correspond with the dynamic nature of
social comparison. As such, fear appeals entail static threats. However, the perceived
susceptibility to a health threat is lower if one is acting to alleviate the threat [11].
Accordingly, fear appeal messages show weaker effects over time because users feel less
threatened as they enact a protection response. Social upward comparison, by contrast, is
dynamic and maintains its effects over time. As long as one is not the sole top performer,
one can still draw motivation from comparing one’s standing to better performing others,
even after the adoption of a new health behavior. In mHealth, dynamic social comparison
information may actually show users that they have adopted a recommended response
while simultaneously received fear appeal messages emphasize that the original threat still
exists. Thus, we propose that their combination sends mixed signals and results in less of the
desired behavior. We hypothesize:
Empirical Evaluation
We implemented the instantiations of protection motivation and social upward comparison
theory in an mHealth artifact in one specific mHealth domain, namely stress alleviation. We
developed four prototypes of the artifact which we refined and validated iteratively. The
main evaluation of the hypothesized effects then consisted of a five-week randomized field
experiment.
stress for three reasons. First, harmful stress is extremely common in knowledge workers,
professionals, and students [8]. As such, most U.S. adults experience stress on a moderate to
severe level daily [5]. Second, the alleviation of harmful stress can be effectively supported
by adequately designed personal health technology [14, 27], but few studies address the
design and evaluation of mHealth stress applications rigorously [21]. Third, there are few
stress management apps in Apple’s and Google’s app stores compared to other mHealth
domains [14, 27]. Recent studies and meta-analyses of evidence-based methods for stress
alleviation suggest that especially progressive muscle relaxation constitutes a promising
method that lacks implementation in mHealth [14, 27]. Our review of existing stress
management apps in both app stores conducted in 2020 (detailed review in Online
Appendix F) confirmed that implementations with progressive muscle relaxation are scarce.
In contrast to other stress alleviation methods such as meditation, keeping special diet, and
physical engagement in yoga or tai-chi, progressive muscle relaxation builds on relatively
short and inconspicuous exercises that can be conducted during work or school without
drawing much attention [19, 25].
features related to protection motivation and social upward comparison to verify that they
transmitted the desired messages. In the interviews, the participants confirmed the isolated
motivational effects related to protection motivation and social upward comparison
features.
Evaluation Procedure
The main evaluation of the hypothesized effects consisted of a five-week randomized field
experiment with n = 138 students in a 2 x 2 between-person design. Table 6 outlines the
experiment design. At the beginning of the experiment, participants completed a pre-
questionnaire about demographics and control variables. Then, participants were randomized
into four groups and asked to install a specific one of the four prototypes (protection motivation,
social upward comparison, combined, or control prototype). Participants were told that the
experiment’s purpose was to test a mobile stress-reduction application that provides progressive
muscle relaxation exercises to alleviate stress. They were instructed that the exercises had been
shown to reduce stress, but had never been included in an mHealth application design.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 531
Participants were required to install the application and open it at least once to allow push
notifications. Once the prototype was installed and activated, they were told that use of the app
was not mandatory but welcome. We did not send out any push notifications during the first ten
days of the experiment to allow participants to familiarize themselves with the app. Over the
course of the ensuing weeks, the treatment groups received the push notifications according to
their prototype. All notifications were launched between 10 AM and 7 PM with at least one
night’s time between two notifications. All members of a treatment group were sent the same
notifications at the same time. The respective notifications in Online Appendix B were pushed
once per participant. In total, the control group did not receive any push notifications, whereas
each participant in the social upward comparison, protection motivation, and combined
treatment groups received 3, 6, and 9 push notifications, respectively. During the five-week
study period, we collected data on mHealth use with trace data from the prototypes. After the
experiment, participants completed a post-experimental survey. We evaluated the collected data
quantitatively and qualitatively. To further substantiate the nature of the interaction effects, we
finally conducted a vignette-based qualitative evaluation with n = 36 participants.
Measurement
Dependent Variables
We examined how the prototypes with various instantiations impacted the extent of mHealth
use. Extent of use is defined as the frequency of using a system and is a commonly used
measure of technology use [e.g. 12]. In our case, we measured extent of use by application
opening and training count. Specifically, application opening is measured as the number of
times a user opened the application. Training count is measured as the number of 3-minute
stress-reduction trainings that a user completed. After the five-week study period, we used
training count and application opening as objective measures of mHealth use.
Controls
We controlled for potential confounding variables through survey measures. First, we
controlled for social comparison orientation because individuals might differ in their
predisposition to engage in social comparison. Social comparison orientation is
a personal trait describing the extent to which people generally make comparisons about
their opinions, abilities, and general aspects of themselves [23]. Moreover, we controlled for
variables that are pronounced in rival theory, especially the health belief model. The health
belief model and protection motivation theory agree on the core constructs predicting
behavior change in the face of a health threat (i.e., threat severity and susceptibility,
response-efficacy, response costs, and self-efficacy) [48]. Research on the health belief
model, however, calls more intensively for including socio-demographic backgrounds and
especially education because individuals’ ability to deal with technology may influence how
they perceive health risks that are invoked through technology [3]. Thus, we control for
experience with mHealth as well as age, household income, and gender. We also control for
eHealth literacy, which assesses consumers’ perceived skills at using information technology
(IT) for health management [46]. Finally, we control for individuals’ perceived problems
with the health threat (i.e., stress) because the health belief model suggests that perceived
problems can constitute a particularly effective cue to action [48]. Online Appendix
A displays the scales and reliability measures.
532 SPOHRER ET AL.
Participants
A student sample was recruited for this study due to the prevalence of stress seen in this
population. Although often unduly dismissed, student samples can be a valuable source of
information if they fit with the general research goals [15]. While around two out of three
U.S. adults experience stress on a moderate to severe level daily, stress is becoming even
more prevalent in college students [8,9]. Studies regularly report elevated stress in a range
from 60 percent [35] to more than 75 percent [27] of college students. College students
experience a gain in autonomy entailing several stressors and demands that contribute to
these high numbers [27]. As such, many college students move away from home, leaving
family and friends; they have to learn to manage finances, cope with increased academic
workload and extracurricular activities, and need to make career choices [9,35]. mHealth
applications that help college students to alleviate stress are therefore in increasing
demand [27].
Participants were recruited from a bachelor’s course at a university in the United States.
They were offered 2.5 percent extra credit on their final grade in return for completing the
pre/post surveys and for installing and running the app on their Android or iOS smart
phone for the study period. Although our target was to obtain 30 participants per prototype,
we initially assigned 50 participants per prototype. We did so to achieve our target sample in
spite of some participants withdrawing from the study, or providing incomplete or unusable
responses. We excluded participants who failed to open the application at least once because
these participants did not expose themselves to the treatment.
The data from 138 participants was deemed usable and was analyzed to examine the
main and interaction effects of protection motivation and social upward comparison on the
two outcomes: application opening and training count. The participants were about equally
balanced regarding gender and age. There were no significant differences across the proto
type groups in terms of demographic characteristics, social comparison orientation,
mHealth experience, eHealth literacy, or perceived stress problems at the beginning of the
study period. Thus, we are confident that the variations in outcome variables are not caused
by systematic differences in demographics or predispositions across groups. Table 7 sum
marizes the demographics and pre-experimental measures.
Descriptive n = 32 n = 35 n = 30 n = 41 n = 138
Statistics %/M n/SD %/M n/SD %/M n/SD %/M n/SD %/M n/SD P-Value Chi2/F
Age < 20 years 22% 7 23% 8 37% 11 20% 8 25% 34 .38 3.11
20-29 years 78% 25 77% 27 63% 19 80% 33 75% 104 .38 3.11
Male 47% 15 46% 16 43% 13 51% 21 47% 65 .92 0.48
INC < $ 20,000 25% 8 26% 9 27% 8 15% 6 22% 31 .61 4.5
$ 20,000-100,000 28% 9 31% 11 30% 9 22% 9 28% 38 .61 4.5
> $ 100,000 47% 15 43% 15 43% 13 63% 26 50% 69 .61 4.5
SCO 2.21 0.89 2.18 0.88 2.3 0.93 2.09 0.78 2.18 0.86 .77 0.37
EXP 1.14 1.39 1.21 1.66 1.47 1.64 1.02 1.58 1.19 1.56 .69 0.49
HLIT 5.43 0.73 5.48 0.63 5.67 0.87 5.45 0.97 5.50 0.82 .66 0.53
PROBL 3.88 1.79 4.28 2.01 4.37 1.99 3.80 1.93 4.07 1.93 .52 0.75
Notes: test of group differences; M, mean; n, number of participants; PM, protection motivation; SUC, social upward
comparison; SD, standard deviation; INC, household income; SCO, social comparison orientation; EXP, mHealth experience;
HLIT, e-health literacy; PROBL, problem perception of stress.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 533
Manipulation Checks
We technically verified that the messages about protection motivation and social comparison
were pushed to the active view of participants’ smartphones and arrived as intended. Thus, it
was nearly impossible for participants to avoid this information. In the pre- and post-surveys,
we took several measures to ensure manipulation validity: First, we asked in the post-survey
whether the participants had received and read messages from the app during the experi
ment. All participants in the three treatment groups (n = 97) unanimously confirmed they
had received and read the messages, which was not the case for control group (n = 41)
participants, t(136) = 9.63, p < .001. Second, to ensure that the social comparison instantia
tions actually stimulated social upward comparison, all participants were asked to rate their
agreement1 with the statement “Other users used the health app much more often than I did”
in the post-survey. Participants who received social upward comparison treatment agreed
significantly more with the statement than participants who did not receive social compar
ison treatment (MSUC = 4.74, SDSUC = 1.45 vs. MNO_SUC = 4.25, SDNO_SUC = 1.24; z = -2.11, p
< .05). Third, to ensure the effectiveness of fear arousal through the protection motivation
instantiations, we assessed how much participants changed in their agreement1 with the
statement “I am scared about the prospect of getting stressed out by work” between pre- and
post-survey. There was no significant difference in agreement between the groups before the
study period (MProt.Mot = 3.72, SDProt.Mot = 1.78 vs. MNo_Prot.Mot = 3.97, SDNo_Prot.Mot = 1.61;
z = .86, p > .05). After the study period, participants who had received protection motivation
treatment showed increased agreement, whereas participants who had not received protec
tion motivation treatment showed lower agreement than before (MProt.Mot = 4.05, SDProt.Mot
= 1.66 vs. MNo_Prot.Mot = 3.75, SDNo_Prot.Mot = 1.55). A one-tailed z-test showed that the
difference in change was significant, z = -1.76, p < .05.
Evaluation Results
Effects on mHealth Use
We ran full factorial two-way analyses of variance (ANOVA) on the sample of 138
participants to examine the presence of interaction effects of protection motivation and
social upward comparison on the two mHealth use outcomes (training count and applica
tion opening). Once the interaction effect was established, we conducted simple main effects
analyses to examine the isolated effects of protection motivation and social upward
comparison without mutual interference by drawing on the subsamples that had received
no protection motivation treatment (n = 73) and no social upward comparison treatment
(n = 76), respectively. We ran analyses of covariance (ANCOVA) for all models to see
whether the results were robust in the presence of control variables. Table 8 displays the
different means and standard deviations, Table 9 displays the corresponding results of
ANOVA, ANCOVA, and simple main effects analyses.
Training Count
We found a significant negative interaction effect between protection motivation and social
upward comparison on training count (Table 9 M1). The interaction effect remained
significant and only increased in effect size in the presence of control variables (Table 9
M2). Simple main effects analyses showed that protection motivation had a significant,
534 SPOHRER ET AL.
medium sized positive effect on training count when social upward comparison was not
present (Table 9 M3), but protection motivation did not have a significant effect on training
count when social upward comparison was present (F(1,60) = .96, p > .1, ηp2 = .03).
Similarly, social upward comparison had a large, significant positive effect on training
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 535
Figure 2. Visualization of Simple Main Effects. PM, protection motivation; SUC, social upward comparison.
count when protection motivation was not present (Table 9 M5) but only a small, non-
significant effect when protection motivation was present (F(1,63) = 2.54, p > .1, ηp2 = .04).
Figure 2 illustrates the simple main effects. All effects remained stable with control variables
as covariates (Table 9 M4 & M6).
Application Opening
The negative interaction effect of protection motivation and social upward comparison on
application opening was only borderline significant (F(1,134) = 3.26, p < .1, ηp2 = .02, Table 9
M7) and remained so in light of control variables (Table 9 M8). According to simple main
effects analyses, protection motivation had a significant, medium sized positive effect on
application opening when social upward comparison was not present (Table 9 M9) but only
a small, non-significant effect when social upward comparison was present (F(1,60) = 0.68,
p > .1, ηp2 = .01). Social upward comparison had a large, significant positive effect in the
absence of protection motivation (Table 9 M11) but none when protection motivation was
present (F(1,63) = 0.65, p > .1, ηp2 = .01). Control variables did not qualitatively change these
results (Table 9 M10 & M12).
These results provided support for our hypotheses. Simple main effects analyses showed
that both protection motivation and social upward comparison have positive effects on
mHealth use when they are applied in isolation, thus providing support for H1 and H2. The
groups using different prototypes differed significantly in their use of the artifact. In line
with H3, the results demonstrated a negative interaction effect between protection motiva
tion and social upward comparison. Both protection motivation and social upward com
parison showed lower effect sizes and less significant effects when combined with the
respective other mechanism. In fact, participants provided with the combined prototype
used the artifact less frequently than participants provided with the social upward compar
ison prototype. As displayed in Table 8, social upward comparison resulted in the most
mHealth use, followed by combined social upward comparison and protection motivation,
protection motivation, and control conditions.
536 SPOHRER ET AL.
Post-Hoc Analysis
In the scope of the post-experimental survey, we asked and evaluated open-ended ques
tions. Specifically, we asked the participants what they liked and disliked about the applica
tion (FB1-FB3 in Online Appendix A). As we were interested in the negative interaction
effect, we examined all comments that related directly to the developed design features or
their consequences (i.e., notifications, the different views described in the Theory-Guided
Instantiation section, social comparison, or protection motivation) and compared negative
to positive and neutral comments. Two authors independently coded the free text answers
as either negative valence (-1) or neutral/positive valence (0). Cohen’s Kappa was .78 and
initial disagreements about single codes were quickly resolved through discussion between
the coders. Online Appendix D provides exemplary quotes. We then compared the relation
of negative to positive/neutral comments across the treatment and control groups. A Chi-
squared test was significant, Χ2(6,138) = 21.292, p < .01 (Table 10). The group with the
combined protection motivation and social upward comparison prototype was significantly
more likely to report negative feedback than users of the control prototype and users of the
prototypes that instantiated one theory only.
Some participants directly verbalized the negative interaction between protection moti
vation and social upward comparison that we hypothesized. For example, the following
quote of a participant who used the combined prototype illustrates the conflict between
wanting to cope with a personal health threat while simultaneously receiving information
about a social threat. The participant said:
I did not enjoy the pop-up notifications that said, ‘others are using the application more than
you.’ These gave me a negative feeling and made me less likely to want to use the application
because it became about competition and not bettering myself.
Qualitative Substantiation
Having statistically established the hypothesized effects of our instantiations under experi
mental conditions, we aimed to further substantiate the effects and to reduce concerns
about their potential cultural specificity. Thus, we recruited a sample of n = 36 students at
a university in Central Europe for a vignette-based qualitative evaluation. The participants
(aged 23-29 years, 23 female, 13 male) were invited to a personal meeting with an average
duration 45 minutes in which they received a vignette that led them through interactions
with one of the treatment prototypes (i.e., the protection motivation prototype, the social
upward comparison prototype, or the combined prototype). Each of the three prototypes
was received by n = 12 participants. The participants went through the vignette on their
own but were supported by a research assistant if they had questions or needed help. The
vignette entailed several push notifications according to the prototype (see Online
Appendix B) and participants with social comparison or combined prototypes were addi
tionally pointed to the performance view. Subsequently, each participant was interviewed
following a semi-structured interview guide (Online Appendix E). The interviews were
coded for perceived effects of the different design features.
The participants broadly confirmed the positive motivational effects of protection moti
vation and social upward comparison in isolation (Online Appendix E provides exemplary
quotes). Specifically, in the groups faced with prototypes that instantiated social upward
comparison or protection motivation in isolation, there were no statements that reported
perceived negative effects on the motivation to use the mHealth app that were associated
only with the fear appeal messages (i.e., the protection motivation design feature) or with
the combination of the performance visibility page and the social upward comparison
messages (i.e., the social upward comparison design features). In contrast, participants
who were confronted with the combined design features of protection motivation and
social upward comparison elaborated on a number of negative perceptions. The perceived
negative effects matched the negative interaction effects of social upward comparison and
protection motivation that we theorized. First, statements referred to perceptions of con
flicting threats namely, a health threat through fear appeal messages and a social threat
through social upward comparison. Second, participants perceived that the dynamic infor
mation that allowed for social upward comparison was at odds with the static nature of fear
appeal messages (Online Appendix E provides exemplary quotes). Overall, the picture
painted by the qualitative substantiation in Europe was in line with the experimental results
from the United States. The interviews lent further support to our reasoning on the negative
interaction effect.
Discussion
Contemporary mHealth research and practice often implement piecemeal combinations of
several behavior change techniques [16, 36, 43]. We show that it is important to consider the
theoretical mechanisms underlying behavior change techniques instead of equipping
mHealth with a simple combination of popular techniques. The results of our study
illustrate that the widely applied techniques of protection motivation and social upward
comparison negatively interacted to influence mHealth use. Engaging in explanatory design
theorizing, we inscribed kernel theories into an artifact and evaluated the interdependence
of simultaneously implemented design features [45, 47]. This allowed us to theorize about
and test direct and interaction effects of protection motivation and social upward compar
ison on mHealth use. We tested these effects through a field experiment and substantiated
the reasoning qualitatively.
Theoretical Contributions
This study contributes to academic IS literature in three key ways. First, we theorize and
empirically demonstrate negative interaction effects between the mechanisms of two pro
minent behavior change theories, namely, social upward comparison and protection
538 SPOHRER ET AL.
motivation theory, and their effect on mHealth use. We theorized that this negative
interaction occurs because the mechanisms underlying the theories yield fundamentally
different types of threats and perceptions of one’s abilities to overcome the threat.
Experimental and qualitative results support this reasoning. Our findings thereby elicit
mutual boundary conditions for protection motivation and social upward comparison
theory. When mechanisms of one are present, they can restrict the effectiveness of the
other. These findings resonate with prior work that suggested social mechanisms could
influence the formation of fear and the effectiveness of fear-based campaigns [10]. Future
work can build on these results to provide more comprehensive models of the relationship
between health threat perceptions and social upward comparison to determine when each
one is actually appropriate and when it is not.
Second, we contribute to research on behavior change techniques and their mechan
isms of action [13,30] by showing that a combination of behavior change techniques does
not always result in synergistic effects. In fact, combinations of behavior change techni
ques can result in outcomes that are worse than the outcome of the techniques in
isolation. In our study, mHealth use was actually lower if participants dealt with simulta
neous instantiations of protection motivation and social upward comparison theory than
if they dealt with social upward comparison alone. This finding calls previously assumed
synergistic effects in mHealth research and practice [16, 17, 36] into question. Thus,
rather than focusing on behavior change techniques, more research should focus on the
potentially conflicting theoretical mechanisms underlying them and their boundary con
ditions. In a broader picture, our results suggest that the commonly recommended focus
on behavior change techniques as a unit of analysis [16, 36] could have detrimental
consequences for mHealth research in general. It could disconnect the unit of analysis
from underlying causal mechanisms, obfuscate individual effects, and prevent the identi
fication of boundary conditions and possible incommensurability. Future research may
thus need to treat the concept of behavior change techniques more cautiously and better
account for the causal mechanisms and theoretical frameworks in which they are
embedded.
Third, we contribute to the design knowledge in mHealth with explanatory design
theorizing about the effects of social upward comparison and protection motivation on
mHealth use. In doing so, we instantiated the theories in design features, conducted
a rigorous evaluation in the stress alleviation domain, and illustrated the main and inter
action effects of the instantiations. The presented generic blueprints for instantiating
protection motivation and social upward comparison in mHealth are based on elementary
smartphone features and can be reused in other mHealth domains. The tested hypotheses
and instantiations can jointly be regarded as a mid-range theory of the design of mHealth
artifacts [34, 45]. In providing one of few IS examples of explanatory design theorizing [47,
56], we finally draw attention to the role of purposefully developing new IT in order to build
knowledge about theoretical mechanisms that influence human behavior with IT. Our study
shows that explanatory design theorizing can help understand context-specific effects of
established theoretical mechanisms and refine associated kernel theories. We propose that
more IS research can utilize this method to better understand how combinations of design
features can interact to impact use and behavior.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 539
Practical Contributions
Our research informs practitioner communities and is important for mHealth developers.
First and foremost, our study suggests that mHealth designers should be very careful when
combining features of different behavior change techniques within one artifact. The com
monly held assumption that combinations of two beneficial behavior change techniques
should have additive or even complementary beneficial effects does not stand up to scrutiny.
We demonstrated that popular behavior change techniques belonging to theories of protec
tion motivation and social upward comparison theories had mentionable negative interac
tion effects. Adverse user reactions created through such interaction effects can constitute
a major risk to the success of a software product [38]. Where available, developers should
draw on behavior change techniques from the same theory or from theories building on
commensurate mechanisms. It is an important task for future research to create theory-
driven collections of commensurate techniques that go beyond the established rough
taxonomic classifications [17, 42] and account for the alignment of underlying theoretical
mechanisms.
Moreover, we show that it is promising to leverage mHealth use through anonymous
social upward comparison. Our finding reduces the pressure on mHealth developers to
create network effects based on their users’ extant relationship networks. As such, conven
tional knowledge on social influence in IS adoption would suggest that mHealth providers
need to attract many users whose opinions are important to each other, such as friends [64].
Our findings show that mHealth developers can instead provide users with opportunities
for anonymous social upward comparison, which is much easier to achieve. We demon
strated that this is technically feasible and that it fits with the context of mHealth where
privacy and anonymous social influence can be attractive [6, 59].
Additionally, characterizing and implementing effective mechanisms to leverage use in
mHealth is valuable for physicians, developers, and other practitioners who currently have
little guidance regarding what to base their recommendations of mHealth on [16, 50]. Our
results indicate that the inclusion of social upward comparison leverages more use than
protection motivation. Additionally, because we found a negative interaction effect between
social upward comparison and protection motivation, it is not advisable to integrate both
theoretical mechanisms into a single mobile application, but rather choose one over the
other. The results demonstrated that protection motivation has an effect on use when social
upward comparison is not present. Therefore, fear appeals are still feasible for increasing
use of mHealth and can be easily communicated to end-users through a push notification.
However, future research should investigate when one is more appropriate than the other.
students, which reduces potential concerns about culture-specific effects. However, not all
characteristics of college students may transfer to other social groups (e.g., a relatively high
eHealth literacy). Consequently, our work should be replicated in other demographic,
cultural, and occupational contexts, including high-stress environments, to increase the
generalizability of results. Likewise, future work can test the effects of the instantiations in
other mHealth contexts than stress alleviation.
Second, the development of our design features aimed to maximize the faithfulness of
theory instantiation rather than maximizing the effect on mHealth use. We acknowledge
that different push messages could have stronger effects on use. In line with guidelines for
explanatory design theorizing [45] and our study’s goal to evaluate theoretical effects,
however, we deemed it crucial to develop design features that validly represent the focal
theoretical mechanisms without risking potential interferences through other mechanisms.
Accordingly, we tailored features that are intentionally basic beyond the coverage of the
kernel theories. Thus, our fear appeals focus only on statements that implement threat
appraisals (threat severity and susceptibility) and coping appraisals (response-efficacy, self-
efficacy, response costs) according to protection motivation theory; our social upward
comparison features focus only on defining mHealth use as a comparison dimension,
emphasizing a negative performance discrepancy, and preventing common side effects
according to social upward comparison theory. Future research can build on our results
to tailor more complex messages and visual designs that have stronger effects on mHealth
use but needs to account for potential interaction effects with other behavior change
mechanisms.
Third, our treatment and control groups differed in the number of push notifications
they received. Some proportion of the main effects could therefore stem from the mere
presence of more notifications. Given that correlations of mHealth use with the number of
received notifications were not significant and all manipulation checks were successful, we
are confident that the difference in notifications did not strongly impact our findings.
Nonetheless, future research may replicate our results while including placebo messages
to ensure equal numbers of notifications across treatment and control groups.
Finally, we measured mHealth use objectively by collecting data using a web-based
backend system that tracks usage frequency to the level of single health exercises and
application openings. Such an objective measure is useful for capturing the extent to
which a system is used. However, research has also suggested richer use conceptualizations.
For example, the breadth of use (number of features used) or variety of use (the extent to
which a system is used to carry out different tasks) [12]. Future research can build on our
work by including such different conceptualizations of use.
Conclusion
Contemporary mHealth often combines behavior change techniques without sufficiently
considering the underlying theoretical mechanisms. We proposed that combining behavior
change techniques does not always result in synergies and improved user behaviors. We
tested these ideas drawing on theories of social upward comparison and protection motiva
tion. We engaged in explanatory design theorizing, including theory instantiation, artifact
development, and testing in a field experiment. The results show that protection motivation
and social upward comparison negatively interacted to impact mHealth use, rendering their
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 541
combination less effective. We suggest that this effect occurs because the theoretical
mechanisms underlying the instantiations yield different types of threats and counteracting
appraisals of one’s abilities. Our findings imply that mHealth developers need to be careful
when combining features from different behavior change techniques within one mHealth
application. Where available, developers should draw on behavior change techniques that
stem from the same theory and build on commensurate mechanisms. Otherwise, they could
inadvertently influence users to engage less frequently with their mHealth application.
Notes
1. 7-point scale (strongly disagree—strongly agree).
References
1. Abraham, C.; and Michie, S. A taxonomy of behavior change techniques used in interventions.
Health Psychology, 27, 3 (2008), 379–387.
2. Agarwal, R.; Gao, G.; DesRoches, C.; and Jha, A. Research commentary - The digital transfor
mation of healthcare: Current status and the road ahead. Information Systems Research, 21, 4
(2010), 796–809.
3. Ahadzadeh, A.S.; Pahlevan Sharif, S.; Ong, F.S.; and Khong, K.W. Integrating health belief
model and technology acceptance model: An investigation of health-related internet use.
Journal of Medical Internet Research, 17, 2 (2015), 1–17.
4. Al-Durra, M.; Torio, M.-B.; and Cafazzo, J.A. The use of behavior change theory in
internet-based asthma self-management interventions: A systematic review. Journal of
Medical Internet Research, 17, 4 (2015), e89.
5. American Psychological Association. Stress in America. 2011. Accessed 2021 February 1, www.
stressinamerica.org .
6. Anderson, C.L.; and Agarwal, R. The digitization of healthcare: Boundary risks, emotion, and
consumer willingness to disclose personal health information. Information Systems Research,
22, 3 (2011), 469–490.
7. Arigo, D.; and Suls, J.M. Smartphone apps providing social comparison for health behavior
change: A need for better tailoring to person and context. mHealth, 4, 46 (2018), 1–3.
8. Baghurst, T.; and Kelley, B.C. An examination of stress in college students over the course of a
semester. Health Promotion Practice, 15, 3 (2014), 438–447.
9. Beiter, R.; Nash, R.; McCrady, M.; Rhoades, D.; Linscomb, M.; Clarahan, M.; and Sammut, S.
The Prevalence and Correlates of Depression, Anxiety, and Stress in a Sample of College
Students. Journal of Affective Disorders, 173, (2015), 90–96.
10. Boss, S.R.; Galletta, D.F.; Lowry, P.B.; Moody, G.D.; and Polak, P. What do systems users have
to fear? Using fear appeals to engender threats and fear that motivate protective security
behaviors. MIS Quarterly, 39, 4 (2015), 271–276.
11. Brewer, N.T.; Weinstein, N.D.; Cuite, C.L.; and Herrington, J.E. Risk perceptions and their
relation to risk behavior. Annals of Behavioral Medicine, 27, 2 (2004), 125–130.
12. Burton-Jones, A.; and Straub, D. Reconceptualizing system usage: An approach and empirical
test. Information Systems Research, 17, 3 (2006), 228–246.
13. Carey, R.N.; Connell, L.E.; Johnston, M.; et al. Behavior change techniques and their mechan
isms of action: A synthesis of links described in published intervention literature. Annals of
Behavioral Medicine, 53, 8 (2018), 693–707.
14. Christmann, C.A.; Hoffmann, A.; and Bleser, G. Stress management apps with regard to
emotion-focused coping and behavior change techniques: A content analysis. JMIR mHealth
and uHealth, 5, 2 (2017), e22.
542 SPOHRER ET AL.
15. Compeau, D.; Marcolin, B.; Kelley, H.; and Higgins, C.A. Generalizability of information
systems research using student subjects — A reflection on our practices and recommendations
for future research. Information Systems Research, 23, 4 (2012), 1093–1109.
16. Conroy, D.E.; Yang, C.H.; and Maher, J.P. Behavior change techniques in top-ranked
mobile apps for physical activity. American Journal of Preventive Medicine, 46, 6 (2014),
649–652.
17. Dusseldorp, E.; van Genugten, L.; van Buuren, S.; Verheijden, M.W.; and van Empelen, P.
Combinations of techniques that effectively change health behavior: Evidence from
meta-CART analysis. Health Psychology, 33, 12 (2014), 1530–1540.
18. Farr, C. How Fitbit Became The Next Big Thing In Corporate Wellness. 2016. Accessed 2021
February 1, https://www.fastcompany.com/3058462/how-fitbit-became-the-next-big-thing-in-
corporate-wellness .
19. Fessler N. Rasant entspannt: Die besten Minuten-Übungen gegen Alltagsstress. Stuttgart: TRIAS,
2013.
20. Festinger, L. A theory of social comparison processes. Human Relations, 7, 2 (1954), 117–140.
21. Gee, B.; Griffiths, K.M.; and Gulliver, A. Effectiveness of mobile technologies delivering
ecological momentary interventions for stress and anxiety: A systematic review. Journal of
the American Medical Informatics Association, 23, 1 (2016), 221–229.
22. Gerber, J.; Wheeler, L.; and Suls, J. A social comparison theory meta-analysis 60+ years on.
Psychological Bulletin, 144, 2 (2017), 177.
23. Gibbons, F.X.F.; and Buunk, B. Individual differences in social comparison: Development of
a scale of social comparison orientation. Journal of Personality and Social Psychology, 76, 1
(1999), 129–142.
24. Guo, X.; Han, X.; Zhang, X.; Dang, Y.; and Chen, C. Investigating m-Health acceptance from
a protection motivation theory perspective: Gender and age differences. Telemedicine and
e-Health, 21, 8 (2015), 661–669.
25. Hainbuch, F. Progressive Muskelentspannung. Munich: Graefe und Unzer, 2014.
26. Hill, S.E.; and Buss, D.M. Envy and Positional bias in the evolutionary psychology of manage
ment. Managerial and Decision Economics, 27, 2–3 (2006), 131-143.
27. Huberty, J.; Green, J.; Glissmann, C.; et al. Efficacy of the mindfulness meditation mobile app
“calm” to reduce stress among college students: Randomized controlled trial. Journal of
Medical Internet Research, 21, 6 (2019), e14273.
28. Johnston, A.C.; and Warkentin, M. Fear Appeals and information security behaviors: An
empirical study. MIS Quarterly, 34, 3 (2010), 549–566.
29. Jussupow, E.; Spohrer, K.; Heinzl, A.; and Gawlitza, J. Augmenting medical diagnosis deci
sions? An investigation into physicians’ decision making process with artificial intelligence.
Information Systems Research (2021), published online in Articles in Advance 26 Feb 2021,
https://doi.org/10.1287/isre.2020.0980
30. Kok, G.; Gottlieb, N.H.; Peters, G.-J.Y.; Mullen, P.D.; Parcel, G.S.; Ruiter, R.A.C; Fernández, M.
E.; Markham, C.; and Kay B.L. A taxonomy of behaviour change methods: An intervention
mapping approach. Health Psychology Review, 10, 3 (2016), 297-312.
31. de Korte, E.; Wiezer, N.; Roozeboom, M.B.; Vink, P.; and Kraaij, W. Behavior change
techniques in mHealth apps for the mental and physical health of employees: Systematic
assessment. JMIR mHealth and uHealth, 6, 10 (2018), e167.
32. Krasnova, H.; Widjaja, T.; Buxmann, P.; Wenninger, H.; and Benbasat, I. Why following
friends can hurt you: An exploratory investigation of the effects of envy on social networking
sites among college-age users. Information Systems Research, 26, 3 (2015), 585–605.
33. Krebs, P.; and Duncan, D.T. Health app use among us mobile phone owners: A national survey.
JMIR mHealth and uHealth, 3, 4 (2015), e101.
34. Kuechler, W.; and Vaishnavi, V. A framework for theory development in design science
research: Multiple perspectives. Journal of the Association for Information Systems, 13, 6
(2012), 395–423.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 543
35. Leppink, E.W.; Odlaug, B.L.; Lust, K.; Christenson, G.; and Grant, J.E. The young and the
stressed: Stress, impulse control, and health in college students. The Journal of Nervous and
Mental Disease, 204, 12 (2016), 931–938.
36. Lyons, E.J.; Lewis, Z.H.; Mayrsohn, B.G.; and Rowland, J.L. Behavior change techniques
implemented in electronic lifestyle activity monitors: A systematic content analysis. Journal
of Medical Internet Research, 16, 8 (2014), e192.
37. Maddux, J.E.; and Rogers, R.W. Protection motivation and self-efficacy: A revised theory of
fear appeals and attitude change. Journal of Experimental Psychology, 19, 5 (1983), 469–479.
38. Maruping, L.; Venkatesh, V.; Thong, J.; and Zhang, X. A Risk Mitigation framework for
information technology projects: A cultural contingency perspective. Journal of Management
Information Systems, 36, 1 (2019), 120–157.
39. McCurdie, T.; Taneva, S.; Casselman, M.; Yeung, M.; McDaniel, C.; Ho, W.; and Cafazzo, J.A.
mHealth consumer apps: The case for user-centered design. Biomedical Instrumentation &
Technology, 46, s2 (2012), 49-56.
40. Mettler, T.; Eurich, M.; and Winter, R. On the use of experiments in design science research:
A proposition of an evaluation framework. Communications of the Association for Information
Systems, 34, 1 (2014), 223–240.
41. Michie, S.; and Johnston, M. Theories and techniques of behaviour change: Developing
a cumulative science of behaviour change. Health Psychology Review, 6, 1 (2012), 1–6.
42. Michie, S.; Richardson, M.; Johnston, M.; Abraham, C.; Francis, J.; Hardeman, W.; Eccles, M.
P.; Cane, J.; and Wood, C.E. The behavior change technique taxonomy (v1) of 93 hierarchically
clustered techniques: Building an international consensus for the reporting of behavior change
interventions. Annals of Behavioral Medicine, 46, 1 (2013), 81-95.
43. Milne-Ives, M.; LamMEng, C.; de Cock, C.; van Velthoven, M.H.; and Ma, E.M. Mobile apps
for health behavior change in physical activity, diet, drug and alcohol use, and mental health:
Systematic review. JMIR mHealth and uHealth, 8, 3 (2020), e17046.
44. Milne, S.; Sheeran, P.; and Orbell, S. Prediction and intervention in health-related behavior: A
meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30,
1 (2000), 106–143.
45. Niehaves, B.; and Ortbach, K. The inner and the outer model in explanatory design theory: The
case of designing electronic feedback systems. European Journal of Information Systems, 25, 4
(2016), 303–316.
46. Norman, C.D.; and Skinner, H.A. eHEALS: The eHealth Literacy Scale. Journal of Medical
Internet Research, 8, 4 (2006), e27.
47. Peffers, K.; Tuunanen, T.; and Niehaves, B. Design science research genres: Introduction to the
special issue on exemplars and criteria for applicable design science research. European Journal
of Information Systems, 27, 2 (2018), 129–139.
48. Prentice-Dunn, S.; and Rogers, R.W. Protection motivation theory and preventive health:
Beyond the health belief model. Health Education Research, 1, 3 (1986), 153–161.
49. Research2Guidance. Number of mHealth App Downloads Worldwide from 2013 to 2017 (in
billions). In Statista - The Statistics Portal. 2018. Accessed 2021 February 1. https://www.
statista.com/statistics/625034/mobile-health-app-downloads/
50. Riley, W.T.; Rivera, D.E.; Atienza, A.A.; et al. Health behavior models in the age of mobile
interventions: Are our theories up to the task? Translational Behavioral Medicine, 1, 1 (2011),
53–71.
51. Robberson, M.R.; and Rogers, R.W. Beyond fear appeals: Negative and positive persuasive
appeals to health and self-esteem. Journal of Applied Social Psychology, 18, 3 (1988), 277–287.
52. Rogers, R. A Protection motivation theory of fear appeals and attitude change. The Journal of
Psychology, 91, 1 (1975), 93–114.
53. Rogers, R. Cognitive and physiological processes in fear appeals and attitude change: A revised
theory of protection motivation. In R. Petty and J. Cacioppo (eds.), Social Psychophysiology:
A Sourcebook. New York: Guilford, 1983, pp. 153–177.
544 SPOHRER ET AL.
54. Sawesi, S.; Rashrash, M.; Phalakornkule, K.; Carpenter, J.S.; and Jones, J.F. The impact of
information technology on patient engagement and health behavior change: A systematic
review of the literature. JMIR Medical Informatics, 4, 1 (2016), e1.
55. Schuetz, S.W.; Lowry, P.B.; Pienta, D.A.; and Thatcher, J.B. The effectiveness of abstract versus
concrete fear appeals in information security. Journal of Management Information Systems, 37,
3 (2020), 723–757.
56. Silici, M.; and Lowry, P.B. Using design-science based gamification to improve organizational
security training and compliance. Journal of Management Information Systems, 37, 1 (2019),
129–161.
57. Smith, R.H.; and Kim, S.H. Comprehending envy. Psychological Bulletin, 133, 1 (2007), 46–64.
58. Suls, J. and Wheeler, L. A selective history of classic and neo-social comparison theory. In
Handbook of Social Comparison. Boston MA: Springer US, 2000, pp. 3–19.
59. Sunyaev, A.; Dehling, T.; Taylor, P.L.; and Mandl, K.D. Availability and quality of mobile
health app privacy policies. Journal of the American Medical Informatics Association, 22, 1
(2015), e28–e33.
60. Taylor, S.; and Lobel, M. Social comparison activity under threat: Downward evaluation and
upward contacts. Psychological Review, 96, 4 (1989), 569–575.
61. Tennen, H.; McKee, T.E.; and Affleck, G. Social comparison in health and illness. In J. Suls and
L. Wheeler (eds.), Handbook of Social Comparison: Theory and Research. New York: Plenum,
2000, pp. 443–486.
62. Tong, H.L.; Coiera, E.; and Laranjo, L. Using a mobile social networking app to promote
physical activity: A qualitative study of users’ perspectives. Journal of Medical Internet
Research, 20, 12 (2018), e11439.
63. Venkatesh, V.; Aloysius, J.A.; Hoehle, H.; Burton, S.; and Walton, S.M. Design and evaluation
of auto-ID enabled shopping assistance artifacts in customers’ mobile phones: Two retail store
laboratory experiments. MIS Quarterly, 41, 1 (2017), 83–113.
64. Venkatesh, V.; Morris, M.; Davis, G.; and Davis, F. User acceptance of information technology:
Toward a unified view. MIS Quarterly, 27, 3 (2003), 425–478.
65. Wood, W. Attitude change: Persuasion and social influence. Annual Review of Psychology, 51,
(2000), 539–570.
66. Kay, M., Santos, J.,; and Takane, M. mHealth: New horizons for health through mobile
technologies. World Health Organization, 64, 7 (2011), 66-71.
67. Zahedi, F.; Walia, N.; and Jain, H. Augmented virtual doctor office: Theory-based design and
assessment. Journal of Management Information Systems, 33, 3 (2016), 776–808.
68. Zhao, J.; Freeman, B.; and Li, B. Can mobile phone apps influence people’s health behavior
change? An evidence review. Journal of Medical Internet Research, 18, 11 (2016), e287.
69. Zhao, X.; Tian, J.; and Xue, L. Herding and software adoption: A re-examination based on
post-adoption software discontinuance. Journal of Management Information Systems, 37, 2
(2020), 484–509.
Hartmut Hoehle is a Professor and Chair of Enterprise Systems at the University of Mannheim,
Germany. He received a Ph.D. in Information Systems from Victoria University of Wellington, New
Zealand. Dr. Hoehle’s research interests include the design, implementation, and use of enterprise
systems.. Stemming from his professional experiences gained while working at Deutsche Bank, he is
particularly interested in how services and products can be distributed through electronically
mediated channels. His work has appeared or is forthcoming in MIS Quarterly, European Journal
of Information Systems, Decision Support Systems, International Journal of Operations & Production
Management, and other journals.
Armin Heinzl is a Professor and Chair of General Management and Information Systems at the
University of Mannheim, Germany. He received his doctoral degree and habilitation from the
Koblenz Corporate School of Management, Germany. He was a professor at the University of
Bayreuth and has held visiting positions at Harvard, Berkeley, Irvine, ESSEC, LSE, and USI
Lugano. Dr. Heinzl’s research interests focus on digital innovation, particularly the design of
mHealth applications, the design of anthropomorphic systems, agile development practices, the
impact of artificial intelligence, innovation strategies in digital platforms, and the management of
digital innovations. His research has appeared in MIS Quarterly, Information Systems Research,
Journal of the Association of Information Systems, IEEE Transactions on Engineering Management,
IEEE Transactions on Software Engineering, and other journals.