Summary of studies that used coping theory in the information systems (IS) field
| Reference | Context | Method | Appraisals | Outcomes |
|---|---|---|---|---|
| Bala and Venkatesh (2016) | IT adaptation | Field study |
|
|
| Beaudry and Pinsonneault (2005) | Information technology (IT) use | Qualitative method (interviews, annual reports and job descriptions) |
|
|
| Bhattacherjee et al. (2018) | Mandatory IT use | Interviews |
|
|
| Chen et al. (2019) | Mobile shopping applications | Experiment |
|
|
| D'Arcy et al. (2014) | Security-related stress (SRS) | Survey |
|
|
| Christophe et al. (2011) | Disruptive IT | Experiment |
|
|
| Gong et al. (2020) | Mobile payments | Survey |
|
|
| Liang et al. (2019) | IT security | Experiment |
|
|
| Marakhimov and Joo (2017) | Wearable healthcare devices | Survey |
| Extended use |
| Nach and Lejeune (2010) | IT challenges to users' identity | Qualitative method (narrative synthesis) |
|
|
| Wu et al. (2017) | New IT systems | Survey and panel data |
|
|
| Reference | Context | Method | Appraisals | Outcomes |
|---|---|---|---|---|
| IT adaptation | Field study | Primary appraisal Perceived opportunity Perceived threat Secondary appraisal Perceived controllability | Avoidance Exploration-to-revert Exploration-to-innovate Exploitation | |
| Information technology (IT) use | Qualitative method (interviews, annual reports and job descriptions) | Primary appraisal Opportunity Threat Secondary appraisal IT control | Minimization of an IT event's negative consequences Individual efficiency and effectiveness Restoring personal emotional stability | |
| Mandatory IT use | Interviews | Primary appraisal Opportunity Threat Secondary appraisal IT control | Reluctant response Engaged response Deviant response Compliant response | |
| Mobile shopping applications | Experiment | Primary appraisal Perceived information overload Perceived intrusiveness Perceived reward Secondary appraisal Perceived information control Mobile computing self-efficacy | Discontinuance behavior | |
| Security-related stress (SRS) | Survey | Primary appraisal Secondary appraisal | Information security policy violation intentions | |
| Disruptive IT | Experiment | Primary appraisal Opportunity Threat Secondary appraisal IT control | Benefit satisficing Benefit maximizing Self-preservation Disturbance handling | |
| Mobile payments | Survey | Primary appraisal Perceived value Perceived threat Secondary appraisal Perceived controllability | Intentions to use mobile payment services | |
| IT security | Experiment | Perceived threat Perceived avoidability | Inward emotion-focused coping Problem-focused coping behavior Outward emotion-focused coping | |
| Wearable healthcare devices | Survey | Primary appraisal Challenge Threat | Extended use | |
| IT challenges to users' identity | Qualitative method (narrative synthesis) | Primary appraisal Positive emotional response Negative emotional response Secondary appraisal Controllability | Anti-identity Reinforced identity Ambivalent identity Redefined identity | |
| New IT systems | Survey and panel data | Giving-network closure Seeking-network closure | Post-adoption IT use Cognitive adaptation Behavioral adaptation Affective adaptation |