Table 2

Summary of studies that used coping theory in the information systems (IS) field

ReferenceContextMethodAppraisalsOutcomes
Bala and Venkatesh (2016) IT adaptationField study
  • -

    Primary appraisal

  • -

    Perceived opportunity

  • -

    Perceived threat

  • -

    Secondary appraisal

  • -

    Perceived controllability

  • -

    Avoidance

  • -

    Exploration-to-revert

  • -

    Exploration-to-innovate

  • -

    Exploitation

Beaudry and Pinsonneault (2005) Information technology (IT) useQualitative method (interviews, annual reports and job descriptions)
  • -

    Primary appraisal

  • -

    Opportunity

  • -

    Threat

  • -

    Secondary appraisal

  • -

    IT control

  • -

    Minimization of an IT event's negative consequences

  • -

    Individual efficiency and effectiveness

  • -

    Restoring personal emotional stability

Bhattacherjee et al. (2018) Mandatory IT useInterviews
  • -

    Primary appraisal

  • -

    Opportunity

  • -

    Threat

  • -

    Secondary appraisal

  • -

    IT control

  • -

    Reluctant response

  • -

    Engaged response

  • -

    Deviant response

  • -

    Compliant response

Chen et al. (2019) Mobile shopping applicationsExperiment
  • -

    Primary appraisal

  • -

    Perceived information overload

  • -

    Perceived intrusiveness

  • -

    Perceived reward

  • -

    Secondary appraisal

  • -

    Perceived information control

  • -

    Mobile computing self-efficacy

  • -

    Discontinuance behavior

D'Arcy et al. (2014) Security-related stress (SRS)Survey
  • -

    Primary appraisal

  • -

    Secondary appraisal

  • -

    Information security policy violation intentions

Christophe et al. (2011) Disruptive ITExperiment
  • -

    Primary appraisal

  • -

    Opportunity

  • -

    Threat

  • -

    Secondary appraisal

  • -

    IT control

  • -

    Benefit satisficing

  • -

    Benefit maximizing

  • -

    Self-preservation

  • -

    Disturbance handling

Gong et al. (2020) Mobile paymentsSurvey
  • -

    Primary appraisal

  • -

    Perceived value

  • -

    Perceived threat

  • -

    Secondary appraisal

  • -

    Perceived controllability

  • -

    Intentions to use mobile payment services

Liang et al. (2019) IT securityExperiment
  • -

    Perceived threat

  • -

    Perceived avoidability

  • -

    Inward emotion-focused coping

  • -

    Problem-focused coping behavior

  • -

    Outward emotion-focused coping

Marakhimov and Joo (2017) Wearable healthcare devicesSurvey
  • -

    Primary appraisal

  • -

    Challenge

  • -

    Threat

Extended use
Nach and Lejeune (2010) IT challenges to users' identityQualitative method (narrative synthesis)
  • -

    Primary appraisal

  • -

    Positive emotional response

  • -

    Negative emotional response

  • -

    Secondary appraisal

  • -

    Controllability

  • -

    Anti-identity

  • -

    Reinforced identity

  • -

    Ambivalent identity

  • -

    Redefined identity

Wu et al. (2017) New IT systemsSurvey and panel data
  • -

    Giving-network closure

  • -

    Seeking-network closure

  • -

    Post-adoption IT use

  • -

    Cognitive adaptation

  • -

    Behavioral adaptation

  • -

    Affective adaptation

or Create an Account

Close Modal
Close Modal