<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2025.1735913</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Explaining adoption of AI tools in education: a dual-path model of ethical concern and functional value</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Yu</surname>
<given-names>Tao</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2749005"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Tian</surname>
<given-names>Yihuan</given-names>
</name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3228681"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Huang</surname>
<given-names>Qianghong</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3316406"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Cheng</surname>
<given-names>Zuling</given-names>
</name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3316402"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Zhang</surname>
<given-names>Ru</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3310226"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>College of Art &#x0026; Design, Nanning University</institution>, <city>Nanning</city>, <country country="cn">China</country></aff>
<aff id="aff2"><label>2</label><institution>Department of Smart Experience Design, Graduate School of Techno Design, Kookmin University</institution>, <city>Seoul</city>, <country country="kr">Republic of Korea</country></aff>
<aff id="aff3"><label>3</label><institution>Culture Design Lab, Graduate School of Techno Design, Kookmin University</institution>, <city>Seoul</city>, <country country="kr">Republic of Korea</country></aff>
<aff id="aff4"><label>4</label><institution>Department of Global Convergence, Kangwon National University</institution>, <city>Chuncheon-si</city>, <country country="kr">Republic of Korea</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Ru Zhang, <email xlink:href="mailto:zhangru@unn.edu.cn">zhangru@unn.edu.cn</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-01-21">
<day>21</day>
<month>01</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2025</year>
</pub-date>
<volume>16</volume>
<elocation-id>1735913</elocation-id>
<history>
<date date-type="received">
<day>30</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>01</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>08</day>
<month>12</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Yu, Tian, Huang, Cheng and Zhang.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Yu, Tian, Huang, Cheng and Zhang</copyright-holder>
<license>
<ali:license_ref start_date="2026-01-21">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<sec>
<title>Introduction</title>
<p>As Artificial Intelligence-Generated Content (AIGC) tools (e.g., ChatGPT for writing assistance, Midjourney for image generation) diffuse into educational settings, their adoption reflects a psychological interplay between functional appraisals and ethical concerns. This study proposes and tests a dual-path model integrating the Technology Acceptance Model (TAM) with Protection Motivation Theory (PMT), incorporating Perceived Ethical Concern (PEC) and Moral Sensitivity (MS).</p>
</sec>
<sec>
<title>Methods</title>
<p>Ten latent constructs were modeled: Perceived Severity (PS), Perceived Vulnerability (PV), Self-Efficacy (SE), Response Efficacy (RE), Perceived Ease of Use (PEOU), Perceived Usefulness (PU), PEC, MS, Behavioral Intention (BI), and Continuance Intention (CI). Using structural equation modeling based on data from 589 respondents with prior AIGC experience, we evaluated 14 hypotheses.</p>
</sec>
<sec>
<title>Results</title>
<p>The results support the TAM pathway: PU and PEOU positively predict BI and CI. Meanwhile, PMT components operate indirectly; RE and SE influence appraisals by elevating PU and mitigating PEC, whereas PS and PV elevate PEC. PEC shows a significant negative effect on BI and an indirect negative impact on CI. Notably, this negative PEC-BI association is more pronounced among individuals with higher MS.</p>
</sec>
<sec>
<title>Discussion</title>
<p>The findings extend psychological accounts of AI tool adoption by jointly modeling moral appraisal and functional value in educational contexts. Furthermore, the study offers actionable implications for platform design and policy, suggesting that improving usability and efficacy cues while increasing ethical transparency can foster responsible, sustained use.</p>
</sec>
</abstract>
<kwd-group>
<kwd>AIGC</kwd>
<kwd>behavioral intention</kwd>
<kwd>educational technology</kwd>
<kwd>perceived ethical concern</kwd>
<kwd>protection motivation theory</kwd>
<kwd>technology acceptance model</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="4"/>
<table-count count="10"/>
<equation-count count="0"/>
<ref-count count="100"/>
<page-count count="18"/>
<word-count count="13534"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Educational Psychology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>In recent years, with the continuous breakthroughs in Generative Artificial Intelligence technologies and the maturation of large-scale model infrastructures, Artificial Intelligence-Generated Content (AIGC) tools have rapidly permeated the field of education (<xref ref-type="bibr" rid="ref96">Zawacki-Richter et al., 2019</xref>). Tools such as ChatGPT, Notion AI, Writesonic, and Copilot are widely used for various tasks including text generation, language refinement, question answering, code assistance, and even academic writing (<xref ref-type="bibr" rid="ref24">Dwivedi et al., 2021</xref>). Their powerful semantic generation capabilities not only significantly enhance teaching and learning efficiency but also break down the high barriers of professional expertise and time investment traditionally associated with content creation (<xref ref-type="bibr" rid="ref67">Ocen et al., 2025</xref>). In particular, within higher education settings, both students and teachers have integrated AIGC tools into daily educational practices at an unprecedented pace, using them for assignment support, thesis writing, project proposal generation, courseware design, translation and editing, and self-directed learning (<xref ref-type="bibr" rid="ref54">Lo, 2023</xref>). This phenomenon is part of a broader digital transformation in education, where AI is not merely a tool but a catalyst for reshaping learning ecosystems and skill requirements (<xref ref-type="bibr" rid="ref95">Zarifis and Efthymiou, 2022</xref>; <xref ref-type="bibr" rid="ref63">Naidoo, 2023</xref>). As highlighted in recent studies, the integration of AI necessitates a shift from traditional instruction to adaptive, technology-enhanced pedagogical frameworks (<xref ref-type="bibr" rid="ref77">Rughini&#x0219; et al., 2025</xref>). Meanwhile, some educational platforms have also begun actively integrating AIGC-based interface functions to enhance interactivity and personalization in teaching (<xref ref-type="bibr" rid="ref83">Smutny and Schreiberova, 2020</xref>). These developments also reflect the growing need for sustainable, scalable, and learner-centered educational infrastructures that leverage AI responsibly over the long term.</p>
<p>On one hand, AIGC tools are seen as powerful assistive technologies that can alleviate student workload and improve instructional quality. On the other hand, concerns are mounting over issues such as potential overreliance, unverifiable information authenticity, uncontrollable content generation, and unclear accountability. These issues raise serious questions regarding the legitimacy, rationality, and ethical boundaries of AIGC use in educational contexts (<xref ref-type="bibr" rid="ref26">Floridi and Chiriatti, 2020</xref>; <xref ref-type="bibr" rid="ref17">Cotton et al., 2024</xref>). For instance, some educators have reported academic misconduct stemming from students&#x2019; use of AIGC tools for writing assignments. Students themselves have noted that reliance on these tools weakens independent thinking. In response to increasing incidents of AIGC-enabled cheating, several universities have even temporarily adjusted their assessment mechanisms (<xref ref-type="bibr" rid="ref83">Smutny and Schreiberova, 2020</xref>). Although a growing body of research has explored the functional features and application value of AIGC technologies, most studies remain focused on usability and technology adoption pathways, with limited attention to users&#x2019; ethical concerns or moral perceptions in decision-making processes (<xref ref-type="bibr" rid="ref44">Karran et al., 2024</xref>). In real-world educational settings, users often base their decision to adopt AIGC tools not solely on perceived usefulness but on a psychological weighing of potential risks. For example, a student may believe that AIGC significantly improves writing efficiency Perceived Usefulness (PU), yet simultaneously worry that its use could lead to plagiarism Perceived Ethical Concern (PEC). This coexistence of tool efficacy and moral risk renders the adoption decision-making process more complex and fraught with uncertainty (<xref ref-type="bibr" rid="ref72">Rav&#x0161;elj et al., 2025</xref>).</p>
<p>While most existing studies have employed the Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT) to explore user behavior, these models primarily focus on technological factors such as PU and Perceived Ease of Use (PEOU) and their effects on Behavioral Intention (BI). However, they fall short in explaining users&#x2019; cognitive conflicts and behavioral responses when faced with ethical dilemmas (<xref ref-type="bibr" rid="ref28">Ghimire and Edwards, 2024</xref>). In contrast, the Protection Motivation Theory (PMT) emphasizes individuals&#x2019; cognitive appraisals of threats and coping strategies. It has been widely applied in research on health behavior, security behavior, and AI-related ethical risk, demonstrating strong explanatory power for risk-related cognition (<xref ref-type="bibr" rid="ref82">Shrivastava, 2025</xref>). Nevertheless, an integrated behavioral model that combines TAM and PMT&#x2014;while incorporating ethical cognition and individual moral traits&#x2014;remains lacking, especially for systematically explaining users&#x2019; adoption mechanisms and behavioral patterns regarding AIGC tools in educational contexts.</p>
<p>To address this gap, this study constructs a dual-pathway structural model by integrating TAM and PMT, which incorporates both a &#x201C;functional cognition pathway&#x201D; and an &#x201C;ethical cognition pathway.&#x201D; The model introduces PEC as a key ethical cognition variable and Moral Sensitivity (MS) as a moderating variable, aiming to investigate users&#x2019; cognitive mechanisms, psychological trade-offs, and BI when engaging with AIGC tools in educational settings (<xref ref-type="bibr" rid="ref15">Chenoweth et al., 2009</xref>; <xref ref-type="bibr" rid="ref93">Yang, 2024</xref>). Specifically, this study seeks to achieve the following three objectives:</p>
<list list-type="order">
<list-item>
<p>To examine how threat appraisal and coping cognition influence users&#x2019; perceptions of the usefulness of AIGC tools and their recognition of ethical issues;</p>
</list-item>
<list-item>
<p>To analyze how both the technological acceptance pathway and the ethical risk pathway jointly affect users&#x2019; BI;</p>
</list-item>
<list-item>
<p>To investigate how MS moderates the impact of ethical cognition on user behavior.</p>
</list-item>
</list>
<p>Through these objectives, this study aims to contribute to theory by addressing the lack of ethical considerations in existing technology adoption models, and to practice by offering ethically informed strategies for educational platforms and policy makers seeking to promote sustainable and inclusive adoption of AI technologies in education.</p>
</sec>
<sec id="sec2">
<label>2</label>
<title>Literature review</title>
<sec id="sec3">
<label>2.1</label>
<title>Research progress on AIGC tools in the field of education</title>
<p>From the functional perspective, numerous studies have demonstrated that AIGC tools hold significant potential as learning aids. Chen found that students using AIGC tools during writing exercises significantly improved their structural expression and task completion efficiency (<xref ref-type="bibr" rid="ref14">Chen et al., 2024</xref>). Lukas noted that AIGC systems provide learners with real-time feedback, rewriting suggestions, and translation support, thereby alleviating language barriers and cognitive burdens (<xref ref-type="bibr" rid="ref43">J&#x00FC;rgensmeier and Skiera, 2024</xref>). Crompton and Burke further emphasized that AIGC technologies enhance classroom interaction and promote personalized instruction, showing high adaptability and scalability, particularly in higher education and open learning environments (<xref ref-type="bibr" rid="ref19">Crompton and Burke, 2024</xref>). Across these studies, PU and PEOU have consistently been validated as key cognitive factors influencing students&#x2019; BI, thus reinforcing the core theoretical logic of TAM.</p>
<p>However, as AIGC tools become increasingly embedded in critical teaching activities&#x2014;such as course writing, academic translation, and assessment completion&#x2014;associated ethical concerns have become more prominent. First, the risk of academic misconduct has significantly increased. Existing research indicates that students often struggle to distinguish between original and AI-generated content, leading to frequent incidents of plagiarism and academic dishonesty (<xref ref-type="bibr" rid="ref70">Plata et al., 2023</xref>). Second, AIGC may diminish students&#x2019; critical thinking abilities. <xref ref-type="bibr" rid="ref97">Zhai (2022)</xref> argued that overreliance on tool-generated content can lead to a &#x201C;cognitive outsourcing&#x201D; effect, impeding the development of independent cognitive construction and expressive capabilities. In addition, concerns related to unclear content authenticity, algorithmic opacity, and ambiguous accountability have emerged as critical ethical risks for both educators and platform administrators (<xref ref-type="bibr" rid="ref8">Ateeq et al., 2024</xref>). For instance, <xref ref-type="bibr" rid="ref92">Yakubu et al. (2025)</xref>, in a UTAUT-based study on college students&#x2019; adoption of AIGC writing tools, included only &#x201C;social influence&#x201D; and &#x201C;facilitating conditions&#x201D; as key predictors, without considering negative cognitive variables such as ethical concern. From an ethical perspective, several studies have attempted to introduce MS as a key moderating variable in user behavior models, to capture the intensity of individuals&#x2019; psychological responses to ethical issues. For instance, <xref ref-type="bibr" rid="ref89">Vance et al. (2012)</xref> found that MS significantly moderated users&#x2019; BI when facing information leakage risks in the context of information security behavior. <xref ref-type="bibr" rid="ref53">Liu et al. (2021)</xref>, in a study on AI algorithm transparency, noted that individuals with high MS are more inclined to respond ethically to algorithmic bias. A summary of representative literature on AIGC applications in education is provided in <xref ref-type="table" rid="tab1">Table 1</xref>.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Some representative literature on AIGC applications in education.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Aspect</th>
<th align="left" valign="top">Article</th>
<th align="left" valign="top">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="3">Writing assistance</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref37">Imran and Almusharraf (2023)</xref>
</td>
<td align="left" valign="middle">ChatGPT reshapes academic writing, requiring new training and safeguards for integrity.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref60">Mondal and Mondal (2023)</xref>
</td>
<td align="left" valign="middle">ChatGPT aids academic writing but raises concerns over reliability and ethical risks.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref56">Mahapatra (2024)</xref>
</td>
<td align="left" valign="middle">Findings show ChatGPT positively enhances students&#x2019; academic writing, with strong student approval.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Learning Efficiency</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref31">Guo et al. (2024)</xref>
</td>
<td align="left" valign="middle">AIGC enhances student motivation through personalized and interactive learning, while raising new challenges for educational practice and ethics.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref14">Chen et al. (2024)</xref>
</td>
<td align="left" valign="middle">AIGC is transforming education, led by the US, with research centered on assessment, instructional use, improved learning, and future directions.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref21">Dai (2024)</xref>
</td>
<td align="left" valign="middle">AIGC boosts design education by enhancing ideation, prototyping, and personalization, though integration and ethics require further research.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Instructional design</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref94">Yilmaz and Karaoglan Yilmaz (2023)</xref>
</td>
<td align="left" valign="middle">AI-augmented teaching enhances programming skills and educational outcomes by integrating advanced teaching methods with AI models.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref50">Li (2024)</xref>
</td>
<td align="left" valign="middle">AIGC technology enhances blended education in finance and economics by boosting effectiveness and fostering creative thought processes, but requires training teachers and ensuring data security.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref36">Huang and Wu (2024)</xref>
</td>
<td align="left" valign="middle">AIGC transforms television by automating scripts, virtual hosts, and editing, boosting quality, efficiency, and viewer engagement.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="2">Adoption intention</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref55">Lu et al. (2024)</xref>
</td>
<td align="left" valign="middle">This study applies TAM and TPB to examine teachers&#x2019; intention to use generative AI, finding that perceived usefulness and subjective norms significantly influence adoption.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref72">Rav&#x0161;elj et al. (2025)</xref>
</td>
<td align="left" valign="middle">This global study found that most higher education students responded positively to ChatGPT, considering it useful for learning and research.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Ethical risk</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref64">Nguyen et al. (2023)</xref>
</td>
<td align="left" valign="middle">This paper examines AI ethics in education, reviews existing policies, and emphasizes the need for a clear ethical framework.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref88">Susnjak and McIntosh (2024)</xref>
</td>
<td align="left" valign="middle">This study assesses ChatGPT&#x2019;s potential misuse in online exams, emphasizing risks to academic fairness and integrity.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref6">Ardito (2025)</xref>
</td>
<td align="left" valign="middle">This paper critiques the effectiveness and ethics of AI detection tools in higher education, calling for a reevaluation of academic integrity practices.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Psychological cognition</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref42">Jose et al. (2025)</xref>
</td>
<td align="left" valign="middle">This study examines the cognitive paradox of AI in education, balancing learning enhancement with cognitive offloading, and highlights the need for responsible use.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref10">Azeem and Abbas (2025)</xref>
</td>
<td align="left" valign="middle">This study explores how personality traits influence generative AI use in academia, with perceived fairness moderating the relationship.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref1">Abbas et al. (2024)</xref>
</td>
<td align="left" valign="middle">This study analyzes the reasons and consequences of college students using generative AI, noting that while it can support learning, it may also lead to dependency and a decline in critical thinking skills.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="2">Academic integrity</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref17">Cotton et al. (2024)</xref>
</td>
<td align="left" valign="middle">This study explores how to ensure academic integrity in the era of ChatGPT, analyzes the impact of AI on academic misconduct, and proposes corresponding countermeasures.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref59">McIntire et al. (2024)</xref>
</td>
<td align="left" valign="middle">Students often choose to plagiarize and cheat as a pragmatic mitigation of risk in academic pursuits, rather than an ethical issue.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Policy and regulatory frameworks</td>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref13">Chan (2023)</xref>
</td>
<td align="left" valign="middle">This paper proposes a comprehensive AI education policy framework covering teaching, governance, and operations, aiming to guide the application of AI in university administration.</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref99">Zhou and Li (2023)</xref>
</td>
<td align="left" valign="middle">This study explores the impact of generative AI technologies like ChatGPT on the modernization of educational governance and proposes building an education governance system based on &#x201C;a core with diversified governance.&#x201D;</td>
</tr>
<tr>
<td align="left" valign="middle">
<xref ref-type="bibr" rid="ref51">Li et al. (2025)</xref>
</td>
<td align="left" valign="middle">This study conducts a comparative analysis of policy documents from universities in the United States, Japan, and China, and proposes a University Policy Development Framework for Generative AI Governance (UPDF-GAI).</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec4">
<label>2.2</label>
<title>Theoretical foundations of user adoption behavior: TAM and PMT</title>
<p>To understand AIGC adoption in education, this study integrates TAM and PMT&#x2014;two key models explaining how users balance functional benefits with perceived ethical risks in decision-making. These theoretical perspectives are particularly valuable for understanding responsible technology adoption in sustainable educational environments. Originally proposed by <xref ref-type="bibr" rid="ref22">Davis (1989)</xref>, TAM is one of the most widely used frameworks in the information systems domain for predicting user behavior. It posits that two cognitive evaluations&#x2014;PU and PEOU&#x2014;are the key determinants of BI to use a new technology (<xref ref-type="bibr" rid="ref22">Davis, 1989</xref>). PU refers to the belief that using the technology will improve one&#x2019;s task performance, while PEOU reflects the perceived simplicity of the technology&#x2019;s operation. Together, these perceptions shape users&#x2019; positive evaluations and jointly influence their adoption decisions. Owing to its parsimonious structure and strong predictive validity, TAM has been widely applied in diverse fields such as educational technology, healthcare systems, and e-government (<xref ref-type="bibr" rid="ref79">Scherer et al., 2019</xref>; <xref ref-type="bibr" rid="ref25">ElKheshin and Saleeb, 2020</xref>; <xref ref-type="bibr" rid="ref90">Wang et al., 2022</xref>). In studies related to AIGC, scholars have confirmed the significant impact of PU and PEOU on user adoption. For example, <xref ref-type="bibr" rid="ref49">Li (2023)</xref> identified PU as one of the strongest predictors of adoption intention among university students using AI-based writing tools; moreover, PEOU was found to positively influence PU, thereby validating the chained causal structure within the TAM framework.</p>
<p>Despite its emphasis on technological performance evaluations in shaping adoption decisions, TAM pays insufficient attention to users&#x2019; psychological defense mechanisms and ethical evaluation processes when facing emerging technologies (<xref ref-type="bibr" rid="ref38">Islam et al., 2014</xref>). This limitation becomes particularly salient in the context of AIGC, which involves complex issues such as moral judgment, responsibility attribution, and value conflicts (<xref ref-type="bibr" rid="ref3">Ajibade, 2018</xref>). To address this theoretical gap, this study introduces PMT as the foundation for the risk perception pathway. Initially developed by Rogers to explain individuals&#x2019; protective behaviors in response to health threats (<xref ref-type="bibr" rid="ref27">Floyd et al., 2000</xref>), PMT has since been widely applied to areas such as information security (<xref ref-type="bibr" rid="ref84">Sommestad et al., 2015</xref>), data privacy (<xref ref-type="bibr" rid="ref12">Boerman et al., 2021</xref>), and AI technology adoption (<xref ref-type="bibr" rid="ref69">Park et al., 2024</xref>). The core of PMT involves two cognitive stages&#x2014;threat appraisal and coping appraisal&#x2014;through which individuals assess risks and decide whether to adopt protective behaviors. In education, these appraisals influence whether AIGC tools are seen as supporting sustainable and equitable learning. Threat appraisal includes Perceived Severity (PS) and Perceived Vulnerability (PV), while coping appraisal comprises Self-Efficacy (SE) and Response Efficacy (RE), reflecting users&#x2019; confidence in handling risks and the perceived effectiveness of coping strategies.</p>
<p>Previous research has demonstrated the predictive validity of PMT in explaining user avoidance, resistance or behavioral adjustment in response to technological risks. For example, <xref ref-type="bibr" rid="ref69">Park et al. (2024)</xref> found that in AI-based virtual service contexts, both PS and PV significantly influenced users&#x2019; adoption attitudes and BI, while SE and RE enhanced users&#x2019; perceptions of strategic effectiveness and increased their willingness to adopt such technologies. In the cybersecurity domain, <xref ref-type="bibr" rid="ref23">Dodge et al. (2023)</xref> also identified SE and RE as key predictors of users&#x2019; adoption of recommended protective behaviors. Moreover, <xref ref-type="bibr" rid="ref86">Su et al. (2022)</xref>, in the tourism industry context, noted that PS and PV not only shaped practitioners&#x2019; risk awareness but also affected their SE and RE, which in turn strengthened their professional resilience and behavioral adjustment capabilities. Integrating PMT with TAM helps construct a comprehensive behavioral model that encompasses both positive motivations (functional adoption pathway) and negative motivations (risk defense pathway). In the context of educational applications of AIGC tools, users may simultaneously hold high functional expectations and ethical or risk-related concerns. Relying solely on TAM is insufficient to fully capture the internal psychological conflicts and dynamic trade-offs users experience (<xref ref-type="bibr" rid="ref34">Hsiao and Tang, 2024</xref>). More importantly, the four cognitive antecedents in PMT may not only directly influence users&#x2019; risk perceptions but also indirectly affect their evaluations of the tool&#x2019;s functionality, thereby impacting their BI (<xref ref-type="bibr" rid="ref35">Hsu and Silalahi, 2024</xref>). This potential chain mechanism&#x2014;from risk perception to functional evaluation to behavioral response&#x2014;offers a theoretically grounded and practically relevant framework that surpasses TAM in explaining actual user behavior, especially when applied to sustainable technology adoption strategies in education. Accordingly, this study builds upon the primary pathway of TAM by further incorporating the four cognitive antecedents of PMT as predictors of PU and PEC. This dual-pathway adoption behavior model not only extends the explanatory scope of traditional technology acceptance theories but also provides a more systematic theoretical foundation for understanding user behavior in ethically sensitive educational settings involving AIGC tools (<xref ref-type="bibr" rid="ref35">Hsu and Silalahi, 2024</xref>).</p>
</sec>
<sec id="sec5">
<label>2.3</label>
<title>The role of ethical cognition and moral psychology in technology adoption</title>
<p>In the field of technology acceptance and user behavior research, ethical dimensions have long been situated at the periphery. Particularly in the context of educational artificial intelligence tools, users&#x2019; concerns over potential moral risks, value conflicts, and normative uncertainties are often simplified as &#x201C;cognitive burdens&#x201D; or &#x201C;usage barriers.&#x201D; However, as ethical issues surrounding artificial intelligence technologies gain increasing attention from both society and academia, a growing number of scholars have begun to focus on the mechanisms of ethical cognition during technology adoption, attempting to incorporate &#x201C;ethical judgment&#x201D; into behavioral intention prediction models (<xref ref-type="bibr" rid="ref48">Kwon et al., 2020</xref>). Among these concepts, PEC&#x2014;a risk-oriented ethical cognition&#x2014;refers to an individual&#x2019;s subjective perception of moral conflict, ambiguous responsibility, system manipulativeness, and potential adverse consequences during technology use. Initially prominent in research on data privacy, algorithmic fairness, and AI transparency, PEC has since been introduced into studies of user acceptance of AI systems. In the context of educational AI, <xref ref-type="bibr" rid="ref78">Sain and Lawal (2024)</xref> found that students&#x2019; recognition of ethical risks associated with content generation tools significantly and negatively predicted their usage intentions, with heightened sensitivity observed in high-risk scenarios such as academic writing and course assessments. Specific manifestations of PEC in AIGC applications include lack of content originality, unclear attribution of responsibility, model bias risks, increased student dependency, and unbalanced evaluation mechanisms by instructors. <xref ref-type="bibr" rid="ref34">Hsiao and Tang (2024)</xref> argued that the challenges posed by AIGC in educational settings are not merely technical but constitute a fundamental disruption to the legitimacy of knowledge production. Thus, conceptualizing PEC as a key cognitive factor influencing BI not only responds to the ethical realities introduced by AI technologies but also enhances the model&#x2019;s capacity to capture complex psychological structures. Moreover, understanding ethical cognition is essential for ensuring the responsible integration of AIGC tools into education systems that aim to be sustainable and socially accountable.</p>
<p>Notably, the effect of ethical cognition on BI is not uniform across all user groups. Individuals may respond differently to the same ethical issue, and this variation often stems from differences in moral psychological traits. One such trait is MS&#x2014;an individual&#x2019;s ability to recognize and respond to moral cues in ethically charged situations&#x2014;which serves as a critical moderating variable in the relationship between PEC and BI (<xref ref-type="bibr" rid="ref20">Crowell et al., 2008</xref>). According to the Four-Component Model (<xref ref-type="bibr" rid="ref73">Rest et al., 1999</xref>), MS constitutes the initial stage of activating moral judgment, moral motivation, and moral action; without the recognition of a moral issue in a given context, subsequent judgment processes are unlikely to be triggered. In user behavior studies, MS is often treated as a moderator that explains variations in behavioral responses to ethical cognition. <xref ref-type="bibr" rid="ref62">Mower (2018)</xref> revealed that individuals with high MS are more inclined to adopt rejection or avoidance strategies when facing moral dilemmas Although originally applied in domains such as organizational behavior and medical ethics, MS&#x2014;as a psychological trait at the individual level&#x2014;has proven to be theoretically adaptable and empirically valid in AI ethics scenarios. This is particularly relevant in educational contexts, where both students and teachers may experience value conflicts triggered by the use of AIGC tools, and their levels of MS can significantly influence whether PEC translates into actual resistance to usage (<xref ref-type="bibr" rid="ref7">Ashford, 2021</xref>).</p>
</sec>
</sec>
<sec id="sec6">
<label>3</label>
<title>Research model and methodology</title>
<sec id="sec7">
<label>3.1</label>
<title>Theoretical integration and model development</title>
<sec id="sec8">
<label>3.1.1</label>
<title>Theoretical foundations of the research model: TAM and PMT</title>
<p>Given that AIGC technologies enhance learning efficiency while simultaneously raising various ethical concerns, users&#x2019; adoption behaviors are influenced not only by their perceptions of tool effectiveness but also by factors such as perceived moral risks. Therefore, based on established theoretical foundations, this study integrates TAM and PMT to construct a more comprehensive and explanatory user adoption model, incorporating both the functional evaluation pathway and the risk defense pathway (<xref ref-type="bibr" rid="ref66">Nikolic et al., 2024</xref>). TAM and PMT represent two distinct yet complementary cognitive pathways&#x2014;function-driven and risk-driven, respectively. In the context of AIGC applications in education, where technological functionality intersects with ethical sensitivity, the integration of these two theories allows for a more holistic understanding of user adoption mechanisms and extends the theoretical scope of TAM. Accordingly, this study proposes a dual-pathway user behavior model and introduces two additional variables&#x2014;PEC and MS&#x2014;to enhance the model&#x2019;s explanatory power under ethically sensitive conditions (<xref ref-type="bibr" rid="ref75">Rhim et al., 2021</xref>).</p>
</sec>
<sec id="sec9">
<label>3.1.2</label>
<title>Dual-pathway model construction and theoretical framework</title>
<p>In the functional cognition pathway, the model follows the classical structure of TAM, incorporating PEOU and PU as its core variables. PEOU not only positively influences PU but also, together with PU, positively predicts BI, thereby forming the main pathway logic of &#x201C;ease of use&#x2014;functional benefit&#x2014;adoption intention&#x201D; (<xref ref-type="bibr" rid="ref2">Adjekum et al., 2024</xref>). In addition, PU exerts an indirect positive influence on CI, reflecting the extended effect of functional cognition on sustained usage behavior. In the ethical cognition pathway, the model introduces PEC as a key mediating variable to capture users&#x2019; subjective judgment regarding potential ethical risks associated with AIGC tools, such as moral conflict, ambiguous academic responsibility, and increased tool dependency. PEC negatively predicts BI, embodying the mechanism of &#x201C;ethical concern&#x2014;behavioral inhibition&#x201D; (<xref ref-type="bibr" rid="ref78">Sain and Lawal, 2024</xref>). To reveal the formation mechanism of PEC, the model incorporates four antecedent variables from PMT: PS and PV positively influence PEC, representing users&#x2019; threat appraisal of risk, while SE and RE negatively influence PEC, reflecting the regulatory function of individuals&#x2019; coping abilities (<xref ref-type="bibr" rid="ref86">Su et al., 2022</xref>). Furthermore, these four PMT variables may also indirectly affect PU, indicating that risk cognition may interfere with functional evaluation and thereby indirectly influence BI (<xref ref-type="bibr" rid="ref75">Rhim et al., 2021</xref>). To account for individual differences in ethical reactions, the model incorporates MS as a moderating variable to examine its effect on the relationship between PEC and BI. Specifically, individuals with high MS are more likely to experience ethical anxiety when faced with the same ethical scenarios, exhibiting a stronger tendency toward behavioral inhibition. In other words, MS amplifies the negative effect of PEC on BI (<xref ref-type="bibr" rid="ref7">Ashford, 2021</xref>).</p>
</sec>
</sec>
<sec id="sec10">
<label>3.2</label>
<title>Hypotheses development</title>
<p>Based on the proposed structural model and theoretical logic, this section presents a series of research hypotheses focused on the causal relationships among the core variables, thereby providing a theoretical foundation for the subsequent empirical analysis.</p>
<sec id="sec11">
<label>3.2.1</label>
<title>Effects of PMT variables on PU</title>
<p>PU, a core construct within TAM, refers to users&#x2019; cognitive judgment that AIGC tools can improve their performance or efficiency in educational settings. However, this functional judgment is not isolated from risk assessment. Theoretically, the direct influence of PMT constructs on PU can be explained by the &#x201C;cognitive verification cost&#x201D; mechanism. When users perceive high severity or vulnerability (e.g., hallucinations or ethical pitfalls), they are compelled to allocate additional cognitive resources to verify and correct the AI output. This added effort diminishes the net efficiency gain, thereby directly reducing the tool&#x2019;s perceived usefulness. According to PMT, users&#x2019; evaluation of whether a tool is useful is often influenced by their subjective perceptions of potential threats and their confidence in coping with them. First, when users perceive the use of AIGC tools as potentially resulting in serious negative consequences&#x2014;such as diminished critical thinking or the erosion of students&#x2019; originality. Specifically, when their PS is high, their positive evaluation of the tool&#x2019;s effectiveness may be suppressed, thereby reducing PU (<xref ref-type="bibr" rid="ref29">Gonz&#x00E1;lez-Ponce et al., 2024</xref>).</p>
<disp-quote>
<p><italic>H1</italic>: <italic>PS has a significant negative effect on PU.</italic></p>
</disp-quote>
<p>Second, users believe they are personally vulnerable to such negative outcomes (i.e., high PV), they may develop doubts about the tool&#x2019;s reliability and long-term value, leading to a decline in PU. Empirical studies have shown that higher levels of PV often result in defensive attitudes, which in turn inhibit positive evaluations of technology (<xref ref-type="bibr" rid="ref40">Jelov&#x010D;an et al., 2021</xref>).</p>
<disp-quote>
<p><italic>H2: PV has a significant negative effect on PU.</italic></p>
</disp-quote>
<p>Conversely, when users have strong confidence in their own abilities (i.e., high SE) and believe they can use AIGC tools correctly and safely, they are more likely to focus on the tools&#x2019; benefits, which facilitates a higher level of PU. SE has been identified as one of the PMT variables most strongly associated with adoption intention and high performance-related cognition in multiple studies (<xref ref-type="bibr" rid="ref32">Hedayati et al., 2023</xref>).</p>
<disp-quote>
<p><italic>H3: SE has a significant positive effect on PU.</italic></p>
</disp-quote>
<p>Moreover, if users believe that proper management systems and guidance protocols are in place to effectively mitigate potential risks (i.e., high RE), their trust in the tool and perceived utility will likely increase. RE can effectively alleviate concerns about risk and shift user attention toward functional benefits (<xref ref-type="bibr" rid="ref18">Courneya and Hellsten, 2001</xref>).</p>
<disp-quote>
<p><italic>H4: RE has a significant positive effect on PU.</italic></p>
</disp-quote>
</sec>
<sec id="sec12">
<label>3.2.2</label>
<title>Effects of PMT variables on PEC</title>
<p>PEC reflects users&#x2019; subjective attention to the potential moral dilemmas that AIGC tools may provoke in educational settings, such as plagiarism, diminished student accountability, and blurred authorship. According to PMT, users&#x2019; subjective assessments of threat severity during the threat appraisal phase significantly influence their level of moral alertness. When users perceive the potential consequences of AIGC tools to be highly destructive (i.e., high PS) or believe they are personally more susceptible to ethical misuse (i.e., high PV), they tend to exhibit stronger moral vigilance, thereby intensifying their PEC (<xref ref-type="bibr" rid="ref76">Ruan et al., 2020</xref>; <xref ref-type="bibr" rid="ref39">Jannat et al., 2024</xref>).</p>
<disp-quote>
<p><italic>H5: PS has a significant positive effect on PEC.</italic></p>
</disp-quote>
<disp-quote>
<p><italic>H6: PV has a significant positive effect on PEC.</italic></p>
</disp-quote>
<p>Conversely, if users believe they are capable of identifying risks and using the technology responsibly (i.e., high SE) or trust that institutional policies and guidelines can effectively regulate misuse (i.e., high RE), their ethical concerns may be partially mitigated, thus reducing the level of PEC (<xref ref-type="bibr" rid="ref11">Block and Keller, 1998</xref>; <xref ref-type="bibr" rid="ref80">Sher et al., 2017</xref>; <xref ref-type="bibr" rid="ref5">Al-Sharafi et al., 2021</xref>).</p>
<disp-quote>
<p><italic>H7: SE has a significant negative effect on PEC.</italic></p>
</disp-quote>
<disp-quote>
<p><italic>H8: RE has a significant negative effect on PEC.</italic></p>
</disp-quote>
</sec>
<sec id="sec13">
<label>3.2.3</label>
<title>TAM pathway: effects of PEOU and PU on BI</title>
<p>According to TAM, users evaluate technology primarily based on PEOU and PU. Numerous empirical studies have shown that PEOU not only reduces cognitive and operational costs by simplifying the usage process but also significantly enhances users&#x2019; overall perception of a tool&#x2019;s utility, thereby influencing their intention to adopt it. Specifically, when users perceive a system as easy to operate, their evaluation of its value tends to improve, leading to a heightened level of PU (<xref ref-type="bibr" rid="ref71">Rahman, 2018</xref>).</p>
<disp-quote>
<p><italic>H9: PEOU has a significant positive effect on PU.</italic></p>
</disp-quote>
<p>Furthermore, PEOU can directly reduce usage barriers and psychological resistance, thereby enhancing BI. Prior research suggests that users&#x2019; perceptions of intuitive usability can boost their confidence and willingness to adopt a system, especially during initial encounters with the technology (<xref ref-type="bibr" rid="ref47">Khosrow-Pour, 2003</xref>).</p>
<disp-quote>
<p><italic>H10: PEOU has a significant positive effect on BI.</italic></p>
</disp-quote>
<p>PU, a core construct of TAM, reflects users&#x2019; expectations regarding the benefits of using a technology. The positive relationship between PU and BI has been repeatedly validated in studies on AI technology adoption. The more users believe a given tool can improve their learning or work efficiency, the more likely they are to adopt it (<xref ref-type="bibr" rid="ref91">Xu et al., 2022</xref>; <xref ref-type="bibr" rid="ref4">Ali et al., 2024</xref>).</p>
<disp-quote>
<p><italic>H11: PU has a significant positive effect on BI.</italic></p>
</disp-quote>
</sec>
<sec id="sec14">
<label>3.2.4</label>
<title>Ethical pathway: the effect of PEC on BI</title>
<p>While PU and PEOU can stimulate users&#x2019; intention to adopt a technology, in ethically sensitive contexts, the risk-related concerns evoked by PEC may counteract the positive effects of functional cognition. When users believe that the use of AIGC tools may violate educational fairness, undermine student autonomy, or generate issues related to academic responsibility, they may consciously avoid adopting the tool&#x2014;even if its functional benefits are evident (<xref ref-type="bibr" rid="ref16">Chiu and Kuo, 2007</xref>).</p>
<disp-quote>
<p><italic>H12: PEC has a significant negative effect on BI.</italic></p>
</disp-quote>
</sec>
<sec id="sec15">
<label>3.2.5</label>
<title>Continuance pathway and the moderating role of MS</title>
<p>BI serves as a key antecedent to CI. Once users develop a clear intention to adopt a tool, they typically move toward forming habitual usage patterns, reflected in their continued use of the technology (<xref ref-type="bibr" rid="ref41">Jeong et al., 2025</xref>). Empirical research across various digital platforms and AI application contexts has consistently confirmed the positive predictive relationship between BI and CI (<xref ref-type="bibr" rid="ref100">Zhou et al., 2018</xref>; <xref ref-type="bibr" rid="ref52">Liu et al., 2023</xref>).</p>
<disp-quote>
<p><italic>H13: BI has a significant positive effect on CI.</italic></p>
</disp-quote>
<p>In addition, users&#x2019; responses to ethical information vary significantly. MS, as a psychological trait, describes an individual&#x2019;s capacity to recognize value conflicts in morally salient situations. When MS is high, users are more likely to perceive the severity of the issues represented by PEC, thereby amplifying the negative effect of PEC on BI. Research in moral education has demonstrated that individuals with high MS are more inclined to translate perceived moral conflicts into avoidance behavior (<xref ref-type="bibr" rid="ref85">Strahovnik, 2018</xref>).</p>
<disp-quote>
<p><italic>H14</italic>: <italic>MS positively moderates the relationship between PEC and BI; that is, the higher the MS, the stronger the negative effect of PEC on BI.</italic></p>
</disp-quote>
</sec>
<sec id="sec16">
<label>3.2.6</label>
<title>Proposed research model</title>
<p>In summary, based on the step-by-step development of the hypotheses above, this study constructs an integrated dual-pathway theoretical model that comprehensively considers both functional and ethical factors influencing the adoption of AIGC tools in educational contexts, as illustrated in <xref ref-type="fig" rid="fig1">Figure 1</xref>. This model will be empirically tested using Structural Equation Modeling (SEM) in subsequent analyses to evaluate its theoretical validity and explanatory power.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Proposed research model and hypotheses.</p>
</caption>
<graphic xlink:href="fpsyg-16-1735913-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Flowchart integrating Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). PMT includes perceived severity, vulnerability, self-efficacy, and response efficacy. TAM includes perceived ease of use and usefulness. Influences on perceived ethical concern and behavioral intention to use, which affects continuance intention. Moral sensitivity acts as a moderating factor. Solid lines indicate direct effects; dashed lines indicate moderation effects.</alt-text>
</graphic>
</fig>
</sec>
</sec>
<sec id="sec17">
<label>3.3</label>
<title>Empirical design and implementation strategy</title>
<sec id="sec18">
<label>3.3.1</label>
<title>Variable operationalization and instrument development</title>
<p>A structured questionnaire was developed to measure ten latent variables (i.e., PS, PV, SE, RE, PEOU, PU, PEC, MS, BI, CI), with items adapted from validated scales and refined for the educational AIGC context. All items were measured using a five-point Likert scale. The questionnaire included four sections: study introduction, demographic questions, measurement items (randomized to reduce bias), and closing remarks. Expert reviews and a pilot test (<italic>n</italic>&#x202F;=&#x202F;30) confirmed the clarity, validity, and contextual suitability of the instrument (see <xref ref-type="table" rid="tab2">Table 2</xref>).</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Questionnaire items.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Variables</th>
<th align="left" valign="top">Items</th>
<th align="left" valign="top">Issue</th>
<th align="left" valign="top">Reference</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="3">PS</td>
<td align="left" valign="middle">PS1</td>
<td align="left" valign="middle">I believe that the misuse of AIGC tools in education could lead to serious consequences.</td>
<td align="center" valign="middle" rowspan="3">
<xref ref-type="bibr" rid="ref65">Nguyen and Tang (2022)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">PS2</td>
<td align="left" valign="middle">If AIGC tools generate incorrect information, the impact could be highly detrimental.</td>
</tr>
<tr>
<td align="left" valign="middle">PS3</td>
<td align="left" valign="middle">I am concerned that AIGC may negatively affect students&#x2019; learning outcomes.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">PV</td>
<td align="left" valign="middle">PV1</td>
<td align="left" valign="middle">I believe I am susceptible to issues related to AIGC.</td>
<td align="center" valign="middle" rowspan="3">
<xref ref-type="bibr" rid="ref9">Ate&#x015F; and G&#x00FC;nd&#x00FC;zalp (2025)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">PV2</td>
<td align="left" valign="middle">I may encounter risks or misinformation when using AIGC.</td>
</tr>
<tr>
<td align="left" valign="middle">PV3</td>
<td align="left" valign="middle">I feel vulnerable to the negative impacts brought by AIGC.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">SE</td>
<td align="left" valign="middle">SE1</td>
<td align="left" valign="middle">I am capable of effectively using AIGC tools to complete learning tasks.</td>
<td align="center" valign="middle" rowspan="3">
<xref ref-type="bibr" rid="ref61">Morales-Garc&#x00ED;a et al. (2024)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">SE2</td>
<td align="left" valign="middle">I can identify and avoid potential problems when using AIGC.</td>
</tr>
<tr>
<td align="left" valign="middle">SE3</td>
<td align="left" valign="middle">I can use AIGC tools effectively even without guidance.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">RE</td>
<td align="left" valign="middle">RE1</td>
<td align="left" valign="middle">By using AIGC properly, I can effectively avoid its potential risks.</td>
<td align="center" valign="middle" rowspan="3">
<xref ref-type="bibr" rid="ref18">Courneya and Hellsten (2001)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">RE2</td>
<td align="left" valign="middle">I believe AIGC can be beneficial for learning if used correctly.</td>
</tr>
<tr>
<td align="left" valign="middle">RE3</td>
<td align="left" valign="middle">I think appropriate measures can effectively prevent the negative effects of AIGC.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">PEOU</td>
<td align="left" valign="middle">PEOU1</td>
<td align="left" valign="middle">I find AIGC tools easy to use.</td>
<td align="center" valign="middle" rowspan="3">
<xref ref-type="bibr" rid="ref33">Hess et al. (2014)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">PEOU2</td>
<td align="left" valign="middle">It is easy to complete tasks using AIGC tools.</td>
</tr>
<tr>
<td align="left" valign="middle">PEOU3</td>
<td align="left" valign="middle">Learning how to use AIGC is easy for me.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">PU</td>
<td align="left" valign="middle">PU1</td>
<td align="left" valign="middle">Using AIGC can improve my learning efficiency.</td>
<td align="center" valign="middle" rowspan="4">
<xref ref-type="bibr" rid="ref87">Sukirman et al. (2024)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">PU2</td>
<td align="left" valign="middle">AIGC tools help me accomplish complex tasks.</td>
</tr>
<tr>
<td align="left" valign="middle">PU3</td>
<td align="left" valign="middle">I believe AIGC is useful in learning.</td>
</tr>
<tr>
<td align="left" valign="middle">PU4</td>
<td align="left" valign="middle">AIGC can help me achieve better learning outcomes.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">PEC</td>
<td align="left" valign="middle">PEC1</td>
<td align="left" valign="middle">I am concerned that AIGC tools may lead to academic misconduct in education.</td>
<td align="center" valign="middle" rowspan="4">
<xref ref-type="bibr" rid="ref39">Jannat et al. (2024)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">PEC2</td>
<td align="left" valign="middle">Content generated by AIGC may pose problems related to authenticity or ethics.</td>
</tr>
<tr>
<td align="left" valign="middle">PEC3</td>
<td align="left" valign="middle">I believe relying on AIGC may impair students&#x2019; ability for independent learning.</td>
</tr>
<tr>
<td align="left" valign="middle">PEC4</td>
<td align="left" valign="middle">I think using AIGC in education involves ethical risks.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">MS</td>
<td align="left" valign="middle">MS1</td>
<td align="left" valign="middle">I am sensitive to possible moral issues in the use of technological tools.</td>
<td align="center" valign="middle" rowspan="4">
<xref ref-type="bibr" rid="ref74">Reynolds (2008)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">MS2</td>
<td align="left" valign="middle">I usually think carefully when faced with ethically charged situations.</td>
</tr>
<tr>
<td align="left" valign="middle">MS3</td>
<td align="left" valign="middle">I pay particular attention to whether technology is being used for legitimate purposes.</td>
</tr>
<tr>
<td align="left" valign="middle">MS4</td>
<td align="left" valign="middle">I tend to prioritize moral standards in my behavioral decisions.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">BI</td>
<td align="left" valign="middle">BI1</td>
<td align="left" valign="middle">I am willing to use AIGC tools in my future learning.</td>
<td align="center" valign="middle" rowspan="4">
<xref ref-type="bibr" rid="ref76">Ruan et al. (2020)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">BI2</td>
<td align="left" valign="middle">If possible, I intend to frequently use AIGC for learning support.</td>
</tr>
<tr>
<td align="left" valign="middle">BI3</td>
<td align="left" valign="middle">I plan to continuously explore the use of AIGC in education.</td>
</tr>
<tr>
<td align="left" valign="middle">BI4</td>
<td align="left" valign="middle">I prefer educational platforms that include AIGC features.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">CI</td>
<td align="left" valign="middle">CI1</td>
<td align="left" valign="middle">I intend to use AIGC tools as long-term learning aids.</td>
<td align="center" valign="middle" rowspan="3">
<xref ref-type="bibr" rid="ref100">Zhou et al. (2018)</xref>
</td>
</tr>
<tr>
<td align="left" valign="middle">CI2</td>
<td align="left" valign="middle">I am willing to continue using AIGC even if alternative tools are available.</td>
</tr>
<tr>
<td align="left" valign="middle">CI3</td>
<td align="left" valign="middle">I maintain a positive attitude toward the continued use of AIGC in the future.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec19">
<label>3.3.2</label>
<title>Sampling strategy and survey implementation</title>
<p>This study used non-probability convenience sampling to recruit university students, teachers, and education professionals with prior AIGC experience. A screening question ensured eligibility. A power analysis was conducted using G&#x002A;Power 3.1 to determine the minimum required sample size. To detect a medium effect size (f<sup>2</sup> =&#x202F;0.15) with a statistical power of 0.95 and a significance level of 0.05 (considering 10 predictors in the regression model), the calculated minimum sample size was 172. Our final sample of 589 participants significantly exceeds this requirement, ensuring adequate statistical power for data analysis. A pilot test (<italic>n</italic>&#x202F;=&#x202F;30) refined item clarity and optimized completion time. The final questionnaire was hosted on Wenjuanxing and distributed through targeted academic networks to ensure relevance. Specifically, recruitment links were shared in university student course groups, faculty professional exchange groups, and educational technology forums on WeChat and QQ. Responses were collected anonymously and voluntarily. Before accessing the questionnaire, all participants were presented with the study&#x2019;s purpose and privacy policy, and they provided digital informed consent by clicking an &#x2018;I Agree&#x2019; button. Data quality was ensured through logical checks, mandatory items, and reverse-coded questions. After data collection, responses were cleaned and prepared in Excel and SPSS for analysis. The survey complied with ethical standards, ensuring anonymity and academic-only use of data.</p>
</sec>
<sec id="sec20">
<label>3.3.3</label>
<title>Data analysis procedures and modeling approach</title>
<p>This study adopted SEM using SPSS and AMOS to assess measurement quality and test hypotheses. The process included: (1) data screening (checking for missing values and outliers) and descriptive statistics; (2) reliability and validity testing via Cronbach&#x2019;s <italic>&#x03B1;</italic>, Composite Reliability (CR), and Average Variance Extracted (AVE); (3) Confirmatory Factor Analysis (CFA) to assess model fit using indices such as CMIN/DF, CFI, TLI, RMSEA, and SRMR. After validating the measurement model, structural path analysis was conducted. The moderating effect of MS was tested through multi-group SEM and interaction-term regression. Discriminant validity was confirmed by comparing AVE with squared inter-construct correlations. Model robustness was ensured via multiple fit indices to avoid overfitting and confirm theoretical coherence.</p>
</sec>
</sec>
</sec>
<sec sec-type="results" id="sec21">
<label>4</label>
<title>Results</title>
<p>A total of 620 questionnaires were distributed, with 589 valid responses retained after screening, resulting in a 95.0% effective response rate. The sample showed a near-equal gender distribution (52% male, 48% female), with most respondents aged 19&#x2013;35 (64%). A combined 72% held bachelor&#x2019;s or master&#x2019;s degrees, and 25% held doctoral degrees. Students comprised 61% of the sample, while teachers accounted for 21%. All participants had prior AIGC experience, primarily for translation and editing (28%) and writing support (26%) (see <xref ref-type="table" rid="tab3">Table 3</xref>).</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>Demographic characteristics of respondents.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Category</th>
<th align="left" valign="top">Option</th>
<th align="center" valign="top">Frequency (n)</th>
<th align="center" valign="top">Percentage (%)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="2">Gender</td>
<td align="left" valign="middle">Male</td>
<td align="center" valign="middle">308</td>
<td align="char" valign="middle" char=".">52.29%</td>
</tr>
<tr>
<td align="left" valign="middle">Female</td>
<td align="center" valign="middle">281</td>
<td align="char" valign="middle" char=".">47.71%</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="5">Age</td>
<td align="left" valign="middle">18 or below</td>
<td align="center" valign="middle">7</td>
<td align="char" valign="middle" char=".">1.19%</td>
</tr>
<tr>
<td align="left" valign="middle">19&#x2013;25</td>
<td align="center" valign="middle">195</td>
<td align="char" valign="middle" char=".">33.11%</td>
</tr>
<tr>
<td align="left" valign="middle">26&#x2013;35</td>
<td align="center" valign="middle">185</td>
<td align="char" valign="middle" char=".">31.41%</td>
</tr>
<tr>
<td align="left" valign="middle">36&#x2013;45</td>
<td align="center" valign="middle">127</td>
<td align="char" valign="middle" char=".">21.56%</td>
</tr>
<tr>
<td align="left" valign="middle">46 or above</td>
<td align="center" valign="middle">75</td>
<td align="char" valign="middle" char=".">12.73%</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Educational background</td>
<td align="left" valign="middle">High school or below</td>
<td align="center" valign="middle">18</td>
<td align="char" valign="middle" char=".">3.06%</td>
</tr>
<tr>
<td align="left" valign="middle">Bachelor&#x2019;s degree</td>
<td align="center" valign="middle">230</td>
<td align="char" valign="middle" char=".">39.05%</td>
</tr>
<tr>
<td align="left" valign="middle">Master&#x2019;s degree</td>
<td align="center" valign="middle">194</td>
<td align="char" valign="middle" char=".">32.94%</td>
</tr>
<tr>
<td align="left" valign="middle">Doctorate or above</td>
<td align="center" valign="middle">147</td>
<td align="char" valign="middle" char=".">24.96%</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="5">Occupation</td>
<td align="left" valign="middle">Undergraduate</td>
<td align="center" valign="middle">206</td>
<td align="char" valign="middle" char=".">34.97%</td>
</tr>
<tr>
<td align="left" valign="middle">Graduate student</td>
<td align="center" valign="middle">155</td>
<td align="char" valign="middle" char=".">26.32%</td>
</tr>
<tr>
<td align="left" valign="middle">Teacher</td>
<td align="center" valign="middle">121</td>
<td align="char" valign="middle" char=".">20.54%</td>
</tr>
<tr>
<td align="left" valign="middle">Employee of education platform</td>
<td align="center" valign="middle">80</td>
<td align="char" valign="middle" char=".">13.58%</td>
</tr>
<tr>
<td align="left" valign="middle">Other</td>
<td align="center" valign="middle">27</td>
<td align="char" valign="middle" char=".">4.58%</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="2">AIGC tool usage frequency</td>
<td align="left" valign="middle">Occasionally</td>
<td align="center" valign="middle">314</td>
<td align="char" valign="middle" char=".">53.31%</td>
</tr>
<tr>
<td align="left" valign="middle">Frequently</td>
<td align="center" valign="middle">275</td>
<td align="char" valign="middle" char=".">46.69%</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="5">Purpose of AIGC tool usage</td>
<td align="left" valign="middle">Writing assistance</td>
<td align="center" valign="middle">152</td>
<td align="char" valign="middle" char=".">25.81%</td>
</tr>
<tr>
<td align="left" valign="middle">Translation and editing</td>
<td align="center" valign="middle">164</td>
<td align="char" valign="middle" char=".">27.84%</td>
</tr>
<tr>
<td align="left" valign="middle">Academic Q&#x0026;A</td>
<td align="center" valign="middle">128</td>
<td align="char" valign="middle" char=".">21.73%</td>
</tr>
<tr>
<td align="left" valign="middle">Courseware development</td>
<td align="center" valign="middle">103</td>
<td align="char" valign="middle" char=".">17.49%</td>
</tr>
<tr>
<td align="left" valign="middle">Other</td>
<td align="center" valign="middle">42</td>
<td align="char" valign="middle" char=".">7.13%</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Reliability analysis was conducted to evaluate the internal consistency of questionnaire items, indicating how well they measure the same construct. As shown in <xref ref-type="table" rid="tab4">Table 4</xref>, all ten constructs in the questionnaire exceeded Cronbach&#x2019;s alpha values above the 0.70 threshold, confirming satisfactory internal consistency. These results confirm that the measurement scales used in this study are reliable.</p>
<table-wrap position="float" id="tab4">
<label>Table 4</label>
<caption>
<p>Reliability analysis of questionnaire constructs.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Construct</th>
<th align="center" valign="top">Number of items</th>
<th align="center" valign="top">Cronbach&#x2019;s alpha</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">PS</td>
<td align="center" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.784</td>
</tr>
<tr>
<td align="left" valign="middle">PV</td>
<td align="center" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.774</td>
</tr>
<tr>
<td align="left" valign="middle">SE</td>
<td align="center" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.792</td>
</tr>
<tr>
<td align="left" valign="middle">RE</td>
<td align="center" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.830</td>
</tr>
<tr>
<td align="left" valign="middle">PEOU</td>
<td align="center" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.813</td>
</tr>
<tr>
<td align="left" valign="middle">PU</td>
<td align="center" valign="middle">4</td>
<td align="char" valign="middle" char=".">0.877</td>
</tr>
<tr>
<td align="left" valign="middle">PEC</td>
<td align="center" valign="middle">4</td>
<td align="char" valign="middle" char=".">0.853</td>
</tr>
<tr>
<td align="left" valign="middle">MS</td>
<td align="center" valign="middle">4</td>
<td align="char" valign="middle" char=".">0.891</td>
</tr>
<tr>
<td align="left" valign="middle">CI</td>
<td align="center" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.809</td>
</tr>
<tr>
<td align="left" valign="middle">BI</td>
<td align="center" valign="middle">4</td>
<td align="char" valign="middle" char=".">0.802</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Validity testing in this study examined both content and construct validity. Content validity was ensured by adapting measurement items from established literature and refining them through preliminary analysis. Construct validity was assessed via CFA, with all model fit indices meeting recommended thresholds (e.g., CMIN/DF&#x202F;=&#x202F;1.086, GFI&#x202F;=&#x202F;0.951, RMSEA&#x202F;=&#x202F;0.012, CFI&#x202F;=&#x202F;0.995), indicating a good model fit (see <xref ref-type="table" rid="tab5">Table 5</xref> and <xref ref-type="fig" rid="fig2">Figure 2</xref>). These results confirm the robustness of the measurement model. The following section examines convergent and discriminant validity.</p>
<table-wrap position="float" id="tab5">
<label>Table 5</label>
<caption>
<p>Confirmatory factor analysis (CFA) model fit indices.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Fit index</th>
<th align="center" valign="top">Recommended threshold</th>
<th align="center" valign="top">Observed value</th>
<th align="left" valign="top">Evaluation</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">CMIN/DF</td>
<td align="center" valign="middle">&#x003C;3</td>
<td align="char" valign="middle" char=".">1.086</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">GFI</td>
<td align="center" valign="middle">&#x003E;0.80</td>
<td align="char" valign="middle" char=".">0.951</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">AGFI</td>
<td align="center" valign="middle">&#x003E;0.80</td>
<td align="char" valign="middle" char=".">0.940</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">RMSEA</td>
<td align="center" valign="middle">&#x003C;0.08</td>
<td align="char" valign="middle" char=".">0.012</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">NFI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.942</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">IFI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.995</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">TLI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.994</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">CFI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.995</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">PNFI</td>
<td align="center" valign="middle">&#x003E;0.5</td>
<td align="char" valign="middle" char=".">0.809</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">PCFI</td>
<td align="center" valign="middle">&#x003E;0.5</td>
<td align="char" valign="middle" char=".">0.855</td>
<td align="left" valign="middle">Excellent</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Standardized output confirmatory factor analysis model diagram.</p>
</caption>
<graphic xlink:href="fpsyg-16-1735913-g002.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Diagram illustrating a structural equation model with constructs labeled PS, PV, SE, RE, PEOU, PU, PEC, MS, CI, and BI. Each construct connects to latent variables through arrows with numerical values indicating loading strength. The constructs are interconnected by curved arrows, each marked with a correlation coefficient.</alt-text>
</graphic>
</fig>
<p>Convergent validity was evaluated using AVE and CR. As shown in <xref ref-type="table" rid="tab6">Table 6</xref>, all constructs met the recommended thresholds (AVE&#x202F;&#x003E;&#x202F;0.50, CR&#x202F;&#x003E;&#x202F;0.70). Furthermore, standardized factor loadings exceeded 0.70 and were statistically significant (<italic>p</italic> &#x003C;&#x202F;0.001). These results confirm the strong convergent validity and internal consistency of the measurement model.</p>
<table-wrap position="float" id="tab6">
<label>Table 6</label>
<caption>
<p>Results of confirmatory factor analysis (CFA).</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Construct</th>
<th align="left" valign="top">Observed variable</th>
<th align="center" valign="top">Factor loading</th>
<th align="center" valign="top">S.E.</th>
<th align="center" valign="top">C.R.</th>
<th align="center" valign="top"><italic>p</italic></th>
<th align="center" valign="top">CR</th>
<th align="center" valign="top">AVE</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="3">PS</td>
<td align="left" valign="middle">PS1</td>
<td align="char" valign="middle" char=".">0.740</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="3">0.785</td>
<td align="char" valign="middle" char="." rowspan="3">0.548</td>
</tr>
<tr>
<td align="left" valign="middle">PS2</td>
<td align="char" valign="middle" char=".">0.741</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">14.728</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PS3</td>
<td align="char" valign="middle" char=".">0.741</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">14.734</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">PV</td>
<td align="left" valign="middle">PV1</td>
<td align="char" valign="middle" char=".">0.738</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="3">0.775</td>
<td align="char" valign="middle" char="." rowspan="3">0.535</td>
</tr>
<tr>
<td align="left" valign="middle">PV2</td>
<td align="char" valign="middle" char=".">0.715</td>
<td align="char" valign="middle" char=".">0.064</td>
<td align="char" valign="middle" char=".">14.119</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PV3</td>
<td align="char" valign="middle" char=".">0.740</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">14.333</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">SE</td>
<td align="left" valign="middle">SE1</td>
<td align="char" valign="middle" char=".">0.760</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="3">0.793</td>
<td align="char" valign="middle" char="." rowspan="3">0.561</td>
</tr>
<tr>
<td align="left" valign="middle">SE2</td>
<td align="char" valign="middle" char=".">0.761</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">15.538</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">SE3</td>
<td align="char" valign="middle" char=".">0.725</td>
<td align="char" valign="middle" char=".">0.067</td>
<td align="char" valign="middle" char=".">15.148</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">RE</td>
<td align="left" valign="middle">RE1</td>
<td align="char" valign="middle" char=".">0.793</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="3">0.830</td>
<td align="char" valign="middle" char="." rowspan="3">0.620</td>
</tr>
<tr>
<td align="left" valign="middle">RE2</td>
<td align="char" valign="middle" char=".">0.796</td>
<td align="char" valign="middle" char=".">0.055</td>
<td align="char" valign="middle" char=".">18.194</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">RE3</td>
<td align="char" valign="middle" char=".">0.773</td>
<td align="char" valign="middle" char=".">0.056</td>
<td align="char" valign="middle" char=".">17.844</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">PEOU</td>
<td align="left" valign="middle">PEOU1</td>
<td align="char" valign="middle" char=".">0.761</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="3">0.813</td>
<td align="char" valign="middle" char="." rowspan="3">0.593</td>
</tr>
<tr>
<td align="left" valign="middle">PEOU2</td>
<td align="char" valign="middle" char=".">0.784</td>
<td align="char" valign="middle" char=".">0.063</td>
<td align="char" valign="middle" char=".">16.745</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PEOU3</td>
<td align="char" valign="middle" char=".">0.764</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">16.517</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">PU</td>
<td align="left" valign="middle">PU1</td>
<td align="char" valign="middle" char=".">0.804</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="4">0.877</td>
<td align="char" valign="middle" char="." rowspan="4">0.641</td>
</tr>
<tr>
<td align="left" valign="middle">PU2</td>
<td align="char" valign="middle" char=".">0.778</td>
<td align="char" valign="middle" char=".">0.049</td>
<td align="char" valign="middle" char=".">19.963</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PU3</td>
<td align="char" valign="middle" char=".">0.834</td>
<td align="char" valign="middle" char=".">0.047</td>
<td align="char" valign="middle" char=".">21.624</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PU4</td>
<td align="char" valign="middle" char=".">0.786</td>
<td align="char" valign="middle" char=".">0.047</td>
<td align="char" valign="middle" char=".">20.227</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">PEC</td>
<td align="left" valign="middle">PEC1</td>
<td align="char" valign="middle" char=".">0.776</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="4">0.854</td>
<td align="char" valign="middle" char="." rowspan="4">0.594</td>
</tr>
<tr>
<td align="left" valign="middle">PEC2</td>
<td align="char" valign="middle" char=".">0.812</td>
<td align="char" valign="middle" char=".">0.054</td>
<td align="char" valign="middle" char=".">19.164</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PEC3</td>
<td align="char" valign="middle" char=".">0.755</td>
<td align="char" valign="middle" char=".">0.056</td>
<td align="char" valign="middle" char=".">17.909</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">PEC4</td>
<td align="char" valign="middle" char=".">0.737</td>
<td align="char" valign="middle" char=".">0.057</td>
<td align="char" valign="middle" char=".">17.462</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">MS</td>
<td align="left" valign="middle">MS1</td>
<td align="char" valign="middle" char=".">0.802</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="4">0.892</td>
<td align="char" valign="middle" char="." rowspan="4">0.673</td>
</tr>
<tr>
<td align="left" valign="middle">MS2</td>
<td align="char" valign="middle" char=".">0.828</td>
<td align="char" valign="middle" char=".">0.046</td>
<td align="char" valign="middle" char=".">21.710</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">MS3</td>
<td align="char" valign="middle" char=".">0.814</td>
<td align="char" valign="middle" char=".">0.046</td>
<td align="char" valign="middle" char=".">21.283</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">MS4</td>
<td align="char" valign="middle" char=".">0.838</td>
<td align="char" valign="middle" char=".">0.045</td>
<td align="char" valign="middle" char=".">22.019</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">CI</td>
<td align="left" valign="middle">CI1</td>
<td align="char" valign="middle" char=".">0.751</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="3">0.803</td>
<td align="char" valign="middle" char="." rowspan="3">0.576</td>
</tr>
<tr>
<td align="left" valign="middle">CI2</td>
<td align="char" valign="middle" char=".">0.794</td>
<td align="char" valign="middle" char=".">0.066</td>
<td align="char" valign="middle" char=".">16.628</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">CI3</td>
<td align="char" valign="middle" char=".">0.731</td>
<td align="char" valign="middle" char=".">0.067</td>
<td align="char" valign="middle" char=".">15.804</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">BI</td>
<td align="left" valign="middle">BI1</td>
<td align="char" valign="middle" char=".">0.728</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char="." rowspan="4">0.811</td>
<td align="char" valign="middle" char="." rowspan="4">0.518</td>
</tr>
<tr>
<td align="left" valign="middle">BI2</td>
<td align="char" valign="middle" char=".">0.723</td>
<td align="char" valign="middle" char=".">0.066</td>
<td align="char" valign="middle" char=".">15.405</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">BI3</td>
<td align="char" valign="middle" char=".">0.713</td>
<td align="char" valign="middle" char=".">0.075</td>
<td align="char" valign="middle" char=".">15.230</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">BI4</td>
<td align="char" valign="middle" char=".">0.714</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">15.252</td>
<td align="center" valign="middle">&#x002A;&#x002A;&#x002A;</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>&#x002A;&#x002A;&#x002A;Significance at the 0.001 level.</p>
</table-wrap-foot>
</table-wrap>
<p>Discriminant validity was confirmed by comparing the square roots of the AVE with inter-construct correlations (Fornell-Larcker criterion). As shown in <xref ref-type="table" rid="tab7">Table 7</xref>, the square roots of the AVE for each construct were greater than their correlations with other constructs, indicating that the measurement model demonstrates good discriminant validity.</p>
<table-wrap position="float" id="tab7">
<label>Table 7</label>
<caption>
<p>Discriminant validity analysis (Fornell&#x2013;Larcker criterion).</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th>Constructs</th>
<th align="center" valign="top">PS</th>
<th align="center" valign="top">PV</th>
<th align="center" valign="top">SE</th>
<th align="center" valign="top">RE</th>
<th align="center" valign="top">PEOU</th>
<th align="center" valign="top">PU</th>
<th align="center" valign="top">PEC</th>
<th align="center" valign="top">MS</th>
<th align="center" valign="top">CI</th>
<th align="center" valign="top">BI</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">PS</td>
<td align="char" valign="middle" char=".">0.741</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">PV</td>
<td align="char" valign="middle" char=".">0.325</td>
<td align="char" valign="middle" char=".">0.731</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">SE</td>
<td align="char" valign="middle" char=".">&#x2212;0.274</td>
<td align="char" valign="middle" char=".">&#x2212;0.282</td>
<td align="char" valign="middle" char=".">0.749</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">RE</td>
<td align="char" valign="middle" char=".">&#x2212;0.363</td>
<td align="char" valign="middle" char=".">&#x2212;0.311</td>
<td align="char" valign="middle" char=".">0.436</td>
<td align="char" valign="middle" char=".">0.787</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">PEOU</td>
<td align="char" valign="middle" char=".">&#x2212;0.372</td>
<td align="char" valign="middle" char=".">&#x2212;0.321</td>
<td align="char" valign="middle" char=".">0.383</td>
<td align="char" valign="middle" char=".">0.365</td>
<td align="char" valign="middle" char=".">0.77</td>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">PU</td>
<td align="char" valign="middle" char=".">&#x2212;0.321</td>
<td align="char" valign="middle" char=".">&#x2212;0.32</td>
<td align="char" valign="middle" char=".">0.384</td>
<td align="char" valign="middle" char=".">0.373</td>
<td align="char" valign="middle" char=".">0.414</td>
<td align="char" valign="middle" char=".">0.801</td>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">PEC</td>
<td align="char" valign="middle" char=".">0.278</td>
<td align="char" valign="middle" char=".">0.343</td>
<td align="char" valign="middle" char=".">&#x2212;0.269</td>
<td align="char" valign="middle" char=".">&#x2212;0.284</td>
<td align="char" valign="middle" char=".">&#x2212;0.273</td>
<td align="char" valign="middle" char=".">&#x2212;0.258</td>
<td align="char" valign="middle" char=".">0.771</td>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">MS</td>
<td align="char" valign="middle" char=".">0.001</td>
<td align="char" valign="middle" char=".">0.074</td>
<td align="char" valign="middle" char=".">&#x2212;0.032</td>
<td align="char" valign="middle" char=".">&#x2212;0.013</td>
<td align="char" valign="middle" char=".">&#x2212;0.085</td>
<td align="char" valign="middle" char=".">&#x2212;0.007</td>
<td align="char" valign="middle" char=".">&#x2212;0.088</td>
<td align="char" valign="middle" char=".">0.821</td>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">CI</td>
<td align="char" valign="middle" char=".">&#x2212;0.373</td>
<td align="char" valign="middle" char=".">&#x2212;0.378</td>
<td align="char" valign="middle" char=".">0.39</td>
<td align="char" valign="middle" char=".">0.386</td>
<td align="char" valign="middle" char=".">0.375</td>
<td align="char" valign="middle" char=".">0.429</td>
<td align="char" valign="middle" char=".">&#x2212;0.322</td>
<td align="char" valign="middle" char=".">&#x2212;0.054</td>
<td align="char" valign="middle" char=".">0.759</td>
<td/>
</tr>
<tr>
<td align="left" valign="middle">BI</td>
<td align="char" valign="middle" char=".">&#x2212;0.381</td>
<td align="char" valign="middle" char=".">&#x2212;0.382</td>
<td align="char" valign="middle" char=".">0.305</td>
<td align="char" valign="middle" char=".">0.417</td>
<td align="char" valign="middle" char=".">0.363</td>
<td align="char" valign="middle" char=".">0.439</td>
<td align="char" valign="middle" char=".">&#x2212;0.251</td>
<td align="char" valign="middle" char=".">&#x2212;0.029</td>
<td align="char" valign="middle" char=".">0.542</td>
<td align="char" valign="middle" char=".">0.719</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This study employed SEM to test the proposed hypotheses. As shown in <xref ref-type="fig" rid="fig3">Figure 3</xref>, SEM enabled the analysis of complex causal relationships among latent variables. Model fit was assessed using standard indices to ensure empirical adequacy and theoretical consistency.</p>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption>
<p>Structural equation model.</p>
</caption>
<graphic xlink:href="fpsyg-16-1735913-g003.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Flowchart illustrating the integration of Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). The PMT factors include Perceived Severity, Perceived Vulnerability, Self-Efficacy, and Response Efficacy. TAM consists of Perceived Ease of Use, Perceived Usefulness, Behavioral Intention to Use, and Continuance Intention. Perceived Ethical Concern and Moral Sensitivity influence the model. Solid lines represent direct effects, while dashed lines indicate moderation effects, with statistical values annotated along the connections.</alt-text>
</graphic>
</fig>
<p>As shown in <xref ref-type="table" rid="tab8">Table 8</xref>, all model fit indices met recommended thresholds, indicating a well-fitting structural model. Absolute fit indices (CMIN/DF&#x202F;=&#x202F;1.297, GFI&#x202F;=&#x202F;0.948, AGFI&#x202F;=&#x202F;0.937, RMSEA&#x202F;=&#x202F;0.022) and incremental fit indices (NFI&#x202F;=&#x202F;0.935, IFI&#x202F;=&#x202F;0.984, TLI&#x202F;=&#x202F;0.982, CFI&#x202F;=&#x202F;0.984) confirmed a good model fit. Parsimonious indices (PNFI&#x202F;=&#x202F;0.821, PCFI&#x202F;=&#x202F;0.864) also exceeded the 0.50 standard. Collectively, these results demonstrate the robust fit of the structural model (see <xref ref-type="table" rid="tab9">Table 9</xref>).</p>
<table-wrap position="float" id="tab8">
<label>Table 8</label>
<caption>
<p>Model fit indices of the structural equation model (SEM).</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Fit index</th>
<th align="center" valign="top">Recommended threshold</th>
<th align="center" valign="top">Observed value</th>
<th align="left" valign="top">Evaluation</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">CMIN/DF</td>
<td align="center" valign="middle">&#x003C;3</td>
<td align="char" valign="middle" char=".">1.297</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">GFI</td>
<td align="center" valign="middle">&#x003E;0.80</td>
<td align="char" valign="middle" char=".">0.948</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">AGFI</td>
<td align="center" valign="middle">&#x003E;0.80</td>
<td align="char" valign="middle" char=".">0.937</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">RMSEA</td>
<td align="center" valign="middle">&#x003C;0.08</td>
<td align="char" valign="middle" char=".">0.022</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">NFI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.935</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">IFI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.984</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">TLI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.982</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">CFI</td>
<td align="center" valign="middle">&#x003E;0.9</td>
<td align="char" valign="middle" char=".">0.984</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">PNFI</td>
<td align="center" valign="middle">&#x003E;0.5</td>
<td align="char" valign="middle" char=".">0.821</td>
<td align="left" valign="middle">Excellent</td>
</tr>
<tr>
<td align="left" valign="middle">PCFI</td>
<td align="center" valign="middle">&#x003E;0.5</td>
<td align="char" valign="middle" char=".">0.864</td>
<td align="left" valign="middle">Excellent</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="tab9">
<label>Table 9</label>
<caption>
<p>Path coefficients and hypothesis testing results.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Path</th>
<th align="center" valign="top">Path coefficient</th>
<th align="center" valign="top">S.E.</th>
<th align="center" valign="top">C.R.</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">PU &#x2190; PEOU</td>
<td align="char" valign="top" char=".">0.201&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.068</td>
<td align="char" valign="top" char=".">3.716</td>
</tr>
<tr>
<td align="left" valign="middle">PU &#x2190; PS</td>
<td align="char" valign="middle" char=".">&#x2212;0.108&#x002A;</td>
<td align="char" valign="middle" char=".">0.063</td>
<td align="char" valign="middle" char=".">&#x2212;2.066</td>
</tr>
<tr>
<td align="left" valign="middle">PU &#x2190; PV</td>
<td align="char" valign="middle" char=".">&#x2212;0.132&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.068</td>
<td align="char" valign="middle" char=".">&#x2212;2.602</td>
</tr>
<tr>
<td align="left" valign="middle">PU &#x2190; SE</td>
<td align="char" valign="middle" char=".">0.180&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.063</td>
<td align="char" valign="middle" char=".">3.336</td>
</tr>
<tr>
<td align="left" valign="middle">PU &#x2190; RE</td>
<td align="char" valign="middle" char=".">0.149&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.057</td>
<td align="char" valign="middle" char=".">2.782</td>
</tr>
<tr>
<td align="left" valign="middle">PEC &#x2190; PS</td>
<td align="char" valign="middle" char=".">0.134&#x002A;</td>
<td align="char" valign="middle" char=".">0.058</td>
<td align="char" valign="middle" char=".">2.471</td>
</tr>
<tr>
<td align="left" valign="middle">PEC &#x2190; PV</td>
<td align="char" valign="middle" char=".">0.238&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">4.340</td>
</tr>
<tr>
<td align="left" valign="middle">PEC &#x2190; SE</td>
<td align="char" valign="middle" char=".">&#x2212;0.122&#x002A;</td>
<td align="char" valign="middle" char=".">0.058</td>
<td align="char" valign="middle" char=".">&#x2212;2.210</td>
</tr>
<tr>
<td align="left" valign="middle">PEC &#x2190; RE</td>
<td align="char" valign="middle" char=".">&#x2212;0.116&#x002A;</td>
<td align="char" valign="middle" char=".">0.053</td>
<td align="char" valign="middle" char=".">&#x2212;2.044</td>
</tr>
<tr>
<td align="left" valign="middle">BI &#x2190; EOU</td>
<td align="char" valign="middle" char=".">0.231&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.046</td>
<td align="char" valign="middle" char=".">4.375</td>
</tr>
<tr>
<td align="left" valign="middle">BI &#x2190; PU</td>
<td align="char" valign="middle" char=".">0.349&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.036</td>
<td align="char" valign="middle" char=".">6.679</td>
</tr>
<tr>
<td align="left" valign="middle">BI &#x2190; PEC</td>
<td align="char" valign="middle" char=".">&#x2212;0.145&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.036</td>
<td align="char" valign="middle" char=".">&#x2212;3.157</td>
</tr>
<tr>
<td align="left" valign="middle">CI &#x2190; BI</td>
<td align="char" valign="middle" char=".">0.580&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.045</td>
<td align="char" valign="middle" char=".">10.407</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>&#x002A;<italic>p</italic> &#x003C;&#x202F;0.05, &#x002A;&#x002A;<italic>p</italic> &#x003C;&#x202F;0.01, &#x002A;&#x002A;&#x002A;<italic>p</italic> &#x003C;&#x202F;0.001.</p>
</table-wrap-foot>
</table-wrap>
<p>Structural paths were estimated using Maximum Likelihood Estimation (MLE). Critical ratios exceeded &#x00B1;1.96, indicating that the results were statistically significant (<italic>p</italic> &#x003C;&#x202F;0.05). Specifically, PEOU (<italic>&#x03B2;</italic> =&#x202F;0.201), SE (<italic>&#x03B2;</italic> =&#x202F;0.180), and RE (<italic>&#x03B2;</italic> =&#x202F;0.149) positively influenced PU, while PS (<italic>&#x03B2;</italic> =&#x202F;&#x2212;0.108) and PV (<italic>&#x03B2;</italic> =&#x202F;&#x2212;0.132) had negative effects. Regarding PEC, PS (<italic>&#x03B2;</italic> =&#x202F;0.134) and PV (<italic>&#x03B2;</italic> =&#x202F;0.238) exerted positive effects, whereas SE (<italic>&#x03B2;</italic> =&#x202F;&#x2212;0.122) and RE (<italic>&#x03B2;</italic> =&#x202F;&#x2212;0.116) showed negative effects. Furthermore, both PEOU (<italic>&#x03B2;</italic> =&#x202F;0.231) and PU (<italic>&#x03B2;</italic> =&#x202F;0.349) positively predicted BI, while PEC (<italic>&#x03B2;</italic> =&#x202F;&#x2212;0.145) negatively impacted BI. Finally, BI had a strong positive effect on CI (<italic>&#x03B2;</italic> =&#x202F;0.580). These findings confirm that all hypothesized paths are statistically significant. However, it is important to note that the path coefficients for H1 (PS -&#x202F;&#x003E; PU, <italic>&#x03B2;</italic> =&#x202F;&#x2212;0.108) and H8 (RE -&#x202F;&#x003E; PEC, <italic>&#x03B2;</italic> =&#x202F;&#x2212;0.116) are relatively weak compared to other structural paths. This suggests that while risk perception factors do influence functional and ethical evaluations, their impact is less dominant than functional drivers like PEOU and PU.</p>
<p>To assess the moderating role of MS, hierarchical regression was conducted using SPSS 26.0. After controlling for demographic variables and AIGC usage patterns, PEC and MS were mean-centered, and an interaction term (PEC&#x202F;&#x00D7;&#x202F;MS) was added. Crucially, as shown in <xref ref-type="table" rid="tab10">Table 10</xref>, the control variable &#x2018;Occupation&#x2019; did not show a statistically significant effect on BI (<italic>p</italic> &#x003E;&#x202F;0.05). This lack of significant heterogeneity among students, teachers, and platform employees supports the validity of pooling these subgroups for the analysis. Subsequently, the interaction term had a significant negative effect on BI (<italic>&#x03B2;</italic>&#x202F;=&#x202F;&#x2212;0.121, <italic>p</italic>&#x202F;&#x003C;&#x202F;0.001), confirming that MS moderates the PEC&#x2013;BI relationship. Specifically, higher levels of MS amplify the negative impact of PEC on behavioral intention. The <italic>R</italic><sup>2</sup> value for this regression model was 0.095. It should be noted that this value reflects the variance explained specifically by the interaction analysis setup, rather than the full predictive power of the comprehensive structural model. The primary purpose of this regression was to test the significance of the moderating effect of MS, which was confirmed (<italic>p</italic> &#x003C;&#x202F;0.001), rather than to maximize variance explanation.</p>
<table-wrap position="float" id="tab10">
<label>Table 10</label>
<caption>
<p>Moderating effect of moral sensitivity (MS).</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th rowspan="2">Variables</th>
<th align="center" valign="top" colspan="4">Dependent variable&#x202F;=&#x202F;BI</th>
</tr>
<tr>
<th align="center" valign="top"><italic>B</italic></th>
<th align="center" valign="top">SE</th>
<th align="center" valign="top"><italic>t</italic></th>
<th align="center" valign="top"><italic>p</italic></th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">(Constant)</td>
<td align="char" valign="middle" char=".">3.731</td>
<td align="char" valign="middle" char=".">0.267</td>
<td align="char" valign="middle" char=".">13.977</td>
<td align="char" valign="middle" char=".">0.000</td>
</tr>
<tr>
<td align="left" valign="middle">Gender</td>
<td align="char" valign="middle" char=".">&#x2212;0.120</td>
<td align="char" valign="middle" char=".">0.063</td>
<td align="char" valign="middle" char=".">&#x2212;1.917</td>
<td align="char" valign="middle" char=".">0.056</td>
</tr>
<tr>
<td align="left" valign="middle">Age</td>
<td align="char" valign="middle" char=".">0.055</td>
<td align="char" valign="middle" char=".">0.030</td>
<td align="char" valign="middle" char=".">1.829</td>
<td align="char" valign="middle" char=".">0.068</td>
</tr>
<tr>
<td align="left" valign="middle">Educational background</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">0.037</td>
<td align="char" valign="middle" char=".">1.763</td>
<td align="char" valign="middle" char=".">0.078</td>
</tr>
<tr>
<td align="left" valign="middle">Occupation</td>
<td align="char" valign="middle" char=".">&#x2212;0.022</td>
<td align="char" valign="middle" char=".">0.026</td>
<td align="char" valign="middle" char=".">&#x2212;0.866</td>
<td align="char" valign="middle" char=".">0.387</td>
</tr>
<tr>
<td align="left" valign="middle">Awareness or use of AIGC tools</td>
<td align="char" valign="middle" char=".">0.002</td>
<td align="char" valign="middle" char=".">0.064</td>
<td align="char" valign="middle" char=".">0.035</td>
<td align="char" valign="middle" char=".">0.972</td>
</tr>
<tr>
<td align="left" valign="middle">Purpose of AIGC tool usage</td>
<td align="char" valign="middle" char=".">0.036</td>
<td align="char" valign="middle" char=".">0.026</td>
<td align="char" valign="middle" char=".">1.404</td>
<td align="char" valign="middle" char=".">0.161</td>
</tr>
<tr>
<td align="left" valign="middle">PEC</td>
<td align="char" valign="middle" char=".">&#x2212;0.200</td>
<td align="char" valign="middle" char=".">0.034</td>
<td align="char" valign="middle" char=".">&#x2212;5.846</td>
<td align="char" valign="middle" char=".">0.000</td>
</tr>
<tr>
<td align="left" valign="middle">MS</td>
<td align="char" valign="middle" char=".">&#x2212;0.014</td>
<td align="char" valign="middle" char=".">0.030</td>
<td align="char" valign="middle" char=".">&#x2212;0.479</td>
<td align="char" valign="middle" char=".">0.632</td>
</tr>
<tr>
<td align="left" valign="middle">PEC &#x00D7; MS</td>
<td align="char" valign="middle" char=".">&#x2212;0.121</td>
<td align="char" valign="middle" char=".">0.027</td>
<td align="char" valign="middle" char=".">&#x2212;4.471</td>
<td align="char" valign="middle" char=".">0.000</td>
</tr>
<tr>
<td align="left" valign="middle"><italic>R</italic><sup>2</sup>
</td>
<td align="center" valign="middle" colspan="4">0.095</td>
</tr>
<tr>
<td align="left" valign="middle"><italic>F</italic></td>
<td align="center" valign="middle" colspan="4">6.765</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Further simple slope analysis (<xref ref-type="fig" rid="fig4">Figure 4</xref>) showed that the negative effect of PEC on BI was more pronounced at high levels of MS, and weaker at low levels. This confirms that MS amplifies the inhibitory impact of ethical concerns on behavioral intention, supporting the proposed moderation hypothesis.</p>
<fig position="float" id="fig4">
<label>Figure 4</label>
<caption>
<p>Simple slope analysis of the moderating effect of MS.</p>
</caption>
<graphic xlink:href="fpsyg-16-1735913-g004.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Line graph showing the relationship between PEC and BI. The x-axis is labeled as Low PEC to High PEC, and the y-axis is labeled BI ranging from 3.8 to 5.2. Two lines represent Low MS and High MS, both decreasing in BI as PEC increases. The solid line for Low MS starts higher and declines less steeply than the dotted line for High MS.</alt-text>
</graphic>
</fig>
</sec>
<sec sec-type="discussion" id="sec22">
<label>5</label>
<title>Discussion</title>
<sec id="sec23">
<label>5.1</label>
<title>Summary of key findings</title>
<p>Building on TAM and PMT, this study developed a dual-pathway adoption model that incorporates two critical variables: PEC and MS. The model systematically investigates users&#x2019; adoption mechanisms of AIGC tools within educational settings. Structural equation modeling was used to test 14 hypothesized paths, all of which were found to be statistically significant, indicating a robust model fit and theoretical coherence. In the functional cognition pathway, PEOU had a significant positive effect on both PU and BI (supporting H9 and H10), while PU also significantly enhanced BI and further influenced CI (supporting H13). These findings confirm the applicability of the core TAM framework in the context of AIGC use in education.</p>
<p>In the risk cognition pathway, PS and PV negatively influenced PU but positively affected PEC. Conversely, SE and RE positively influenced PU while negatively affecting PEC. These results support the logic of the PMT framework by showing that both threat and coping appraisals shape users&#x2019; perceptions of AIGC tools&#x2019; functionality and ethical risks. Within the ethical pathway, PEC significantly and negatively impacted BI, indicating that ethical concerns can suppress users&#x2019; willingness to adopt AIGC tools in educational contexts. Moreover, MS significantly moderated the relationship between PEC and BI, with individuals high in MS being more likely to amplify the negative impact of ethical concerns on adoption behavior. Overall, the dual-pathway model successfully integrates functional, risk, and ethical cognitive dimensions, uncovering the multifaceted drivers of user behavior in educational AIGC scenarios. The findings also validate the explanatory power of MS as a key psychological trait, offering both theoretical and methodological contributions to future research on AI in education.</p>
</sec>
<sec id="sec24">
<label>5.2</label>
<title>Discussion of functional and risk pathways</title>
<p>Among the positive predictors of PU, PEOU and RE showed the most significant effects. Users who perceive AIGC tools as intuitive, easy to operate, and user-friendly are more likely to positively evaluate their usefulness&#x2014;this finding aligns with the core logic of TAM as proposed by <xref ref-type="bibr" rid="ref22">Davis (1989)</xref> (supporting H9). Notably, however, RE also had a strong and statistically significant impact on PU, with an effect size nearly comparable to PEOU (supporting H4). This suggests that in educational contexts, users&#x2019; trust in institutional safeguards plays a critical role in their assessment of a tool&#x2019;s value. In the domain of health technology adoption, prior studies have found that users&#x2019; perception of clearly defined rules and governance mechanisms significantly enhances both perceived utility and behavioral intention (<xref ref-type="bibr" rid="ref98">Zhang et al., 2017</xref>). Similarly, in AI-driven education, higher RE is associated with stronger PU. Particularly in education&#x2014;a domain characterized by high responsibility&#x2014;the need for institutional clarity becomes more pronounced, amplifying the role of RE in shaping perceptions (<xref ref-type="bibr" rid="ref68">Osman and Yatam, 2024</xref>). By contrast, although SE had a statistically significant positive effect on PU (supporting H3), its influence was relatively weaker. This may reflect users&#x2019; perception of AIGC tools as &#x201C;functionally rich but logically complex&#x201D;&#x2014;even those with adequate experience may still lack confidence in managing output quality (<xref ref-type="bibr" rid="ref58">Masry Herzallah and Makaldy, 2025</xref>). This finding echoes <xref ref-type="bibr" rid="ref45">Kasneci et al. (2023)</xref> argument that although AIGC can enhance efficiency in education, excessive reliance on system logic may reduce users&#x2019; perceived control and agency.</p>
<p>Regarding negative influences on PU, the suppressive effects of PS and PV are statistically significant but relatively weak (supporting H1 and H2). This suggests that while users recognize the potential severe consequences of AIGC usage (e.g., hallucinations or bias), these risks do not substantially diminish their perception of the tool&#x2019;s utility. This &#x2018;utility-over-risk&#x2019; calculus implies that in educational settings, the demand for efficiency often outweighs concerns about potential severity. These results support PMT assumption that threat perception weakens positive evaluations (<xref ref-type="bibr" rid="ref76">Ruan et al., 2020</xref>), and further indicate that users&#x2019; risk cognition has deeply permeated their value judgments of AIGC tools. This diverges from the traditional TAM assumption that PU is generally unaffected by negative variables, and can be explained by the contextual specificity of education: AIGC tools are directly linked to critical issues such as student assignments, fair evaluation, and content originality. When users recognize the potential risks&#x2014;such as encouraging academic laziness or blurring responsibility&#x2014;they may downgrade their value assessments even if they acknowledge the tool&#x2019;s efficiency. This aligns with <xref ref-type="bibr" rid="ref46">Kelly et al.&#x2019;s (2023)</xref> findings that educational users often hold a dual perception of AIGC as &#x201C;useful but potentially harmful,&#x201D; especially in high-stakes scenarios such as examinations and grading, where PU is easily disrupted by ethical evaluations. In addition, the study found that RE had a significant negative effect on PEC. However, this effect was relatively modest (H8: <italic>&#x03B2;</italic> =&#x202F;&#x2212;0.116). This indicates that simply believing in the effectiveness of external regulations or policy safeguards is not enough to fully eliminate users&#x2019; ethical anxieties. Since AIGC ethics involve complex value judgments, institutional responses alone may have a limited capacity to soothe users&#x2019; subjective ethical concerns compared to internal factors. RE not only significantly reduces PEC (<xref ref-type="bibr" rid="ref5">Al-Sharafi et al., 2021</xref>) but also contributes positively to the formation of PU (<xref ref-type="bibr" rid="ref98">Zhang et al., 2017</xref>). This mechanism can be attributed to RE&#x2019;s function in building psychological safety: when users believe that there are clear rules and institutional protections, they are more likely to downplay ethical risks and elevate utility evaluations. This finding is consistent (<xref ref-type="bibr" rid="ref78">Sain and Lawal, 2024</xref>), which shows that in ethically sensitive contexts, trust mechanisms at the organizational or platform level often surpass individual self-efficacy in driving technology acceptance.</p>
<p>Regarding the formation of ethical concerns, the analysis confirmed that threat appraisals (i.e., PS and PV) significantly heightened PEC (supporting H5 and H6). Theoretically, this suggests that risk perception acts as a cognitive trigger for &#x2018;moral vigilance.&#x2019; When users believe that AIGC misuse leads to severe consequences (e.g., academic dishonesty) or feel personally susceptible to these risks, their psychological defense mechanisms are activated, manifesting as heightened ethical anxiety. Conversely, coping appraisals (i.e., SE and RE) acted as protective factors, significantly mitigating PEC (supporting H7 and H8). This indicates that a &#x2018;sense of control&#x2019; acts as a buffer against ethical distress. When users feel competent in managing the tool SE or trust that external regulations are effective RE, they perceive the ethical risks as manageable rather than overwhelming, thereby lowering their overall level of concern.</p>
<p>Taken together, this study identifies PU as a critical intersection between the TAM and PMT pathways, reflecting a dual dynamic&#x2014;being suppressed by risk variables while simultaneously promoted by structural trust. This structural tension suggests that in the adoption of educational AI tools, the cognitive weight of PU is shaped not only by perceptions of tool performance but also by users&#x2019; subjective assessments of whether the associated risks are manageable. Functional design alone may not be sufficient to drive adoption intentions; rather, psychological assurance must be built through institutional safeguards, user training, and ethical education to establish both a sense of control and trust (<xref ref-type="bibr" rid="ref58">Masry Herzallah and Makaldy, 2025</xref>).</p>
</sec>
<sec id="sec25">
<label>5.3</label>
<title>Ethical mechanisms and moderating effects (PEC and MS)</title>
<p>In this study, PEC emerged as a significant negative predictor of BI. Although its path coefficient (<italic>&#x03B2;</italic> =&#x202F;&#x2212;0.145) is smaller than that of functional drivers such as PU (<italic>&#x03B2;</italic> =&#x202F;0.349) and PEOU (<italic>&#x03B2;</italic> =&#x202F;0.231), its theoretical significance implies that ethical concerns act as a distinct psychological barrier (supporting H12). This finding indicates that, in educational contexts, users&#x2019; adoption of AIGC tools is not solely driven by functional expectations, but is highly sensitive to ethical implications. Especially in high-risk academic scenarios such as coursework, academic writing, and examinations, users&#x2019; awareness of issues like &#x201C;lack of originality&#x201D; or &#x201C;ambiguous responsibility&#x201D; may directly suppress their intention to use these tools. This result aligns with <xref ref-type="bibr" rid="ref81">Shin&#x2019;s (2021)</xref> assertion that &#x201C;AI-related ethical concerns can directly undermine user trust, thereby influencing decision-making,&#x201D; and resonates with findings by <xref ref-type="bibr" rid="ref100">Zhou et al. (2018)</xref> that &#x201C;AI usage in educational settings is more constrained by moral norms and expectations.</p>
<p>From a path coefficient perspective, the effect of PEC on BI was notably stronger than that of PS, PV, SE, and RE&#x2014;indicating that users&#x2019; risk cognition regarding the likelihood and severity of consequences often requires mediation through PEC to impact behavioral outcomes. In other words, PMT variables serve as upstream cognitive factors influencing PEC, rather than directly predicting behavioral intention. This structural relationship reinforces PEC&#x2019;s theoretical role as a mediator in ethical cognition and illustrates that educational users are more concerned with whether the technology is &#x201C;morally appropriate&#x201D; rather than merely &#x201C;risky.&#x201D; A similar structure was confirmed by <xref ref-type="bibr" rid="ref39">Jannat et al. (2024)</xref>, who found that PMT variables influence behavior primarily through ethical anxiety.</p>
<p>In addition, the moderating effect of MS on the PEC&#x202F;&#x2192;&#x202F;BI relationship was also empirically validated. Specifically, when MS was high, the negative effect of PEC on BI was significantly amplified; when MS was low, the effect was attenuated (supporting H14). This suggests that individuals respond differently to the same ethical issue, depending on their capacity to perceive value conflicts. High-MS individuals tend to internalize ethical concerns more strongly, translating them into avoidance behaviors (<xref ref-type="bibr" rid="ref85">Strahovnik, 2018</xref>). This result is consistent with <xref ref-type="bibr" rid="ref73">Rest et al.&#x2019;s (1999)</xref> moral development theory, which posits moral sensitivity as a prerequisite for moral judgment, and echoes <xref ref-type="bibr" rid="ref89">Vance et al.&#x2019;s (2012)</xref> empirical findings that individuals with higher MS are more prone to triggering behavioral defense mechanisms. Notably, compared with general cognitive variables in TAM and PMT, MS represents a relatively stable psychological trait, making its moderating effect more context-independent. In education&#x2014;where norms, fairness, and responsibility are highly emphasized&#x2014;such trait-level effects are particularly salient. For instance, teachers or postgraduate students typically exhibit a stronger awareness of academic norms, and thus tend to score higher on MS than undergraduate students. This difference may help explain the observed variation in the PEC&#x202F;&#x2192;&#x202F;BI inhibitory path across user subgroups. Taken together, PEC not only functions as an outcome of risk perception but also serves as a crucial bridge between moral judgment and behavioral response. Meanwhile, MS operates as a psychological threshold at the individual level&#x2014;only when users possess sufficient ethical awareness can the moral conflicts represented by PEC translate into behavioral inhibition (<xref ref-type="bibr" rid="ref20">Crowell et al., 2008</xref>). This finding further consolidates the moderating role of MS within the ethical pathway and adds depth to existing AI ethics adoption models.</p>
<p>Furthermore, our findings regarding the interplay between functional value and ethical concerns resonate with the broader discourse on AI-driven educational transformation. As noted by <xref ref-type="bibr" rid="ref63">Naidoo (2023)</xref> and <xref ref-type="bibr" rid="ref77">Rughini&#x0219; et al. (2025)</xref>, the sustainable integration of AI requires balancing technological advancement with human-centric ethical considerations. Our model provides empirical evidence for this balance by demonstrating that adoption is not a linear function of utility alone. Rather, it is the result of a dynamic trade-off: while PU drives the &#x2018;engine&#x2019; of adoption, PEC acts as a critical &#x2018;brake&#x2019;&#x2014;particularly for morally sensitive users. Therefore, achieving the sustainable transformation envisioned in recent scholarship depends on establishing a &#x2018;function-ethics equilibrium,&#x2019; where efficiency gains are matched by equally robust ethical safeguards RE to foster long-term trust.</p>
</sec>
<sec id="sec26">
<label>5.4</label>
<title>Practical implications</title>
<p>The findings of this study offer concrete guidelines for educational AIGC stakeholders. First, for platform designers, the significant impact of RE on lowering PEC suggests that &#x201C;visible ethical guardrails&#x201D; are essential. Since users&#x2019; trust relies heavily on external safeguards, designers should embed features such as real-time plagiarism checks, clear data usage transparency badges, and one-click citation generation directly into the interface. These design cues can psychologically reassure users that the system is governed by safe protocols, thereby mitigating ethical anxiety.</p>
<p>Second, for educators and policymakers, the moderating role of MS necessitates a differentiated approach to guidance. Our results show that users with high MS are more prone to avoiding AIGC due to ethical fears. For this group, institutions should provide clear &#x201C;safe-use lists&#x201D; and definitive integrity policies to alleviate their uncertainty. Conversely, for users with low MS who may not naturally perceive ethical risks, educational programs should focus on &#x201C;ethical awakening&#x201D;&#x2014;using case studies of AI misuse to heighten their sensitivity and prevent reckless adoption.</p>
<p>Third, regarding the link between risk perception and usefulness, developers must prioritize &#x201C;explainability&#x201D; to lower cognitive costs. Since high perceived severity reduces utility by forcing users to verify outputs, future tools should provide confidence scores or source attribution. This would reduce the &#x2018;cognitive verification cost,&#x2019; thereby enhancing both perceived usefulness and adoption intention.</p>
</sec>
<sec id="sec27">
<label>5.5</label>
<title>Limitations and directions for future research</title>
<p>Despite validating a dual-path model of AIGC adoption in education, this study has several limitations. First, the sample pooled university students, teachers, and platform employees. Although our regression analysis indicated no significant impact of occupation on behavioral intention, the sample size of specific subgroups was insufficient to conduct a rigorous Multi-Group Analysis (MGA) in SEM. Different stakeholders may indeed possess distinct ethical concerns. Future research should aim for larger, balanced sample sizes to systematically compare group differences and include broader user groups like K&#x2013;12 teachers or corporate professionals. Second, the cross-sectional design prevents analysis of behavioral change over time; longitudinal or experimental methods are recommended. Third, the model emphasizes individual cognition, overlooking macro-level influences such as social norms or institutional policies. Lastly, although reliability and validity were confirmed, construct applicability across cultural settings requires further validation. Future studies should explore broader contexts and adopt mixed methods to enrich theoretical and empirical contributions. Furthermore, methodological advancements in generative AI offer new avenues for instrument development. As noted in recent scholarship, Large Language Models (LLMs) show promise in automating the generation and cross-cultural adaptation of psychometric items (<xref ref-type="bibr" rid="ref30">Grobelny et al., 2025</xref>; <xref ref-type="bibr" rid="ref57">Marmolejo-Ramos et al., 2025</xref>). Future researchers could leverage these tools to further refine the validity and efficiency of scales used in educational technology acceptance.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="sec28">
<label>6</label>
<title>Conclusion</title>
<p>This study developed a dual-pathway model integrating TAM and PMT to examine the adoption of AIGC tools in education, incorporating PEC and MS as key variables. Results from 589 valid responses confirmed that both perceived usefulness and perceived ease of use significantly promote behavioral and continuance intentions. Meanwhile, threat and coping appraisals indirectly shape user behavior via functional and ethical evaluations. PEC exerted a strong negative effect on adoption, an effect significantly moderated by MS&#x2014;indicating that ethical concerns and individual sensitivity are critical factors in decision-making. Theoretically, this study extends TAM by integrating ethical cognition into sustainable adoption models. Practically, it offers actionable insights for improving AIGC platforms through enhanced usability, risk mitigation, and user-specific ethical strategies. These findings support the development of ethical, inclusive, and resilient educational technologies. Future research should explore longitudinal trends and cultural diversity to further enhance the sustainable and responsible integration of AIGC in education.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec29">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec sec-type="ethics-statement" id="sec30">
<title>Ethics statement</title>
<p>Ethical review and approval was not required for the study on human participants in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study.</p>
</sec>
<sec sec-type="author-contributions" id="sec31">
<title>Author contributions</title>
<p>TY: Writing &#x2013; original draft, Formal analysis, Methodology, Data curation, Conceptualization, Writing &#x2013; review &#x0026; editing. YT: Investigation, Writing &#x2013; original draft, Software, Methodology. QH: Resources, Writing &#x2013; original draft, Validation, Formal analysis. ZC: Software, Writing &#x2013; original draft, Visualization. RZ: Writing &#x2013; review &#x0026; editing, Funding acquisition, Supervision, Project administration.</p>
</sec>
<ack>
<title>Acknowledgments</title>
<p>The authors thank all the participants in this study for their time and willingness to share their experiences and feelings.</p>
</ack>
<sec sec-type="COI-statement" id="sec32">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec33">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec34">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Abbas</surname><given-names>M.</given-names></name> <name><surname>Jam</surname><given-names>F. A.</given-names></name> <name><surname>Khan</surname><given-names>T. I.</given-names></name></person-group> (<year>2024</year>). <article-title>Is it harmful or helpful? Examining the causes and consequences of generative AI usage among university students</article-title>. <source>Int. J. Educ. Technol. High. Educ.</source> <volume>21</volume>:<fpage>10</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s41239-024-00444-7</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Adjekum</surname><given-names>D.</given-names></name> <name><surname>Waller</surname><given-names>Z.</given-names></name> <name><surname>Keller</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). <article-title>An evaluation of artificial intelligence chatbots ethical use, attitudes towards technology, behavioral factors and student learning outcomes in collegiate aviation programs</article-title>. <source>Coll. Aviat. Rev. Int.</source> <volume>42</volume>, <fpage>84</fpage>&#x2013;<lpage>118</lpage>. doi: <pub-id pub-id-type="doi">10.22488/okstate.24.100239</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ajibade</surname><given-names>P.</given-names></name></person-group> (<year>2018</year>). <article-title>Technology acceptance model limitations and criticisms: exploring the practical applications and use in technology-related studies, mixed-method, and qualitative researches</article-title>. <source>Libr. Philos. Pract.</source> <volume>9</volume>, <fpage>1</fpage>&#x2013;<lpage>13</lpage>. Available at: <ext-link xlink:href="https://digitalcommons.unl.edu/libphilprac/1941/" ext-link-type="uri">https://digitalcommons.unl.edu/libphilprac/1941/</ext-link></mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ali</surname><given-names>I.</given-names></name> <name><surname>Warraich</surname><given-names>N. F.</given-names></name> <name><surname>Butt</surname><given-names>K.</given-names></name></person-group> (<year>2024</year>). <article-title>Acceptance and use of artificial intelligence and AI-based applications in education: a meta-analysis and future direction</article-title>. <source>Inf. Dev.</source> <volume>41</volume>, <fpage>859</fpage>&#x2013;<lpage>874</lpage>. doi: <pub-id pub-id-type="doi">10.1177/02666669241257206</pub-id>, <pub-id pub-id-type="pmid">41321435</pub-id></mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Al-Sharafi</surname><given-names>M. A.</given-names></name> <name><surname>Al-Qaysi</surname><given-names>N.</given-names></name> <name><surname>Iahad</surname><given-names>N. A.</given-names></name> <name><surname>Al-Emran</surname><given-names>M.</given-names></name></person-group> (<year>2021</year>). <article-title>Evaluating the sustainable use of mobile payment contactless technologies within and beyond the COVID-19 pandemic using a hybrid SEM-ANN approach</article-title>. <source>Int. J. Bank Mark.</source> <volume>40</volume>, <fpage>1071</fpage>&#x2013;<lpage>1095</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IJBM-07-2021-0291</pub-id></mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ardito</surname><given-names>C. G.</given-names></name></person-group> (<year>2025</year>). <article-title>Generative AI detection in higher education assessments</article-title>. <source>New Dir. Teach. Learn.</source> <volume>2025</volume>, <fpage>11</fpage>&#x2013;<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.1002/tl.20624</pub-id></mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ashford</surname><given-names>T.</given-names></name></person-group> (<year>2021</year>). <article-title>App-centric students and academic integrity: a proposal for assembling socio-technical responsibility</article-title>. <source>J. Acad. Ethics</source> <volume>19</volume>, <fpage>35</fpage>&#x2013;<lpage>48</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10805-020-09387-w</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ateeq</surname><given-names>A.</given-names></name> <name><surname>Alzoraiki</surname><given-names>M.</given-names></name> <name><surname>Milhem</surname><given-names>M.</given-names></name> <name><surname>Ateeq</surname><given-names>R. A.</given-names></name></person-group> (<year>2024</year>). <article-title>Artificial intelligence in education: implications for academic integrity and the shift toward holistic assessment</article-title>. <source>Front. Educ.</source> <volume>9</volume>:<fpage>1470979</fpage>. doi: <pub-id pub-id-type="doi">10.3389/feduc.2024.1470979</pub-id></mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ate&#x015F;</surname><given-names>H.</given-names></name> <name><surname>G&#x00FC;nd&#x00FC;zalp</surname><given-names>C.</given-names></name></person-group> (<year>2025</year>). <article-title>The convergence of GETAMEL and protection motivation theory: a study on augmented reality-based gamification adoption among science teachers</article-title>. <source>Educ. Inf. Technol.</source> <volume>30</volume>. doi: <pub-id pub-id-type="doi">10.1007/s10639-025-13480-1</pub-id></mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Azeem</surname><given-names>S.</given-names></name> <name><surname>Abbas</surname><given-names>M.</given-names></name></person-group> (<year>2025</year>). <article-title>Personality correlates of academic use of generative artificial intelligence and its outcomes: does fairness matter?</article-title> <source>Educ. Inf. Technol.</source> <volume>30</volume>. doi: <pub-id pub-id-type="doi">10.1007/s10639-025-13489-6</pub-id></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Block</surname><given-names>L. G.</given-names></name> <name><surname>Keller</surname><given-names>P. A.</given-names></name></person-group> (<year>1998</year>). <article-title>Beyond protection motivation: an integrative theory of health appeals</article-title>. <source>J. Appl. Soc. Psychol.</source> <volume>28</volume>, <fpage>1584</fpage>&#x2013;<lpage>1608</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1559-1816.1998.tb01691.x</pub-id></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Boerman</surname><given-names>S. C.</given-names></name> <name><surname>Kruikemeier</surname><given-names>S.</given-names></name> <name><surname>Zuiderveen Borgesius</surname><given-names>F. J.</given-names></name></person-group> (<year>2021</year>). <article-title>Exploring motivations for online privacy protection behavior: insights from panel data</article-title>. <source>Commun. Res.</source> <volume>48</volume>, <fpage>953</fpage>&#x2013;<lpage>977</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0093650218800915</pub-id></mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chan</surname><given-names>C. K. Y.</given-names></name></person-group> (<year>2023</year>). <article-title>A comprehensive AI policy education framework for university teaching and learning</article-title>. <source>Int. J. Educ. Technol. High. Educ.</source> <volume>20</volume>:<fpage>38</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s41239-023-00408-3</pub-id></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>X.</given-names></name> <name><surname>Hu</surname><given-names>Z.</given-names></name> <name><surname>Wang</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). <article-title>Empowering education development through AIGC: a systematic literature review</article-title>. <source>Educ. Inf. Technol.</source> <volume>29</volume>, <fpage>17485</fpage>&#x2013;<lpage>17537</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10639-024-12549-7</pub-id></mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Chenoweth</surname><given-names>T.</given-names></name> <name><surname>Minch</surname><given-names>R.</given-names></name> <name><surname>Gattiker</surname><given-names>T.</given-names></name></person-group> <year>2009</year>. <article-title>Application of protection motivation theory to adoption of protective technologies</article-title>. in <conf-name>2009 42nd Hawaii international conference on system sciences</conf-name>, <fpage>1</fpage>&#x2013;<lpage>10</lpage>.</mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Chiu</surname><given-names>C.-K.</given-names></name> <name><surname>Kuo</surname><given-names>C.</given-names></name></person-group> <year>2007</year>. Understanding behavioral intention in IT ethics: an educational perspective. Available online at: <ext-link xlink:href="https://www.semanticscholar.org/paper/Understanding-Behavioral-Intention-in-IT-Ethics%3A-An-Chiu-Kuo/77c3d9fd9c56590a87c64b1bc6cb184c3ae17811?utm_source=consensus" ext-link-type="uri">https://www.semanticscholar.org/paper/Understanding-Behavioral-Intention-in-IT-Ethics%3A-An-Chiu-Kuo/77c3d9fd9c56590a87c64b1bc6cb184c3ae17811?utm_source=consensus</ext-link> (Accessed May 5, 2025).</mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cotton</surname><given-names>D. R. E.</given-names></name> <name><surname>Cotton</surname><given-names>P. A.</given-names></name> <name><surname>Shipway</surname><given-names>J. R.</given-names></name></person-group> (<year>2024</year>). <article-title>Chatting and cheating: ensuring academic integrity in the era of ChatGPT</article-title>. <source>Innov. Educ. Teach. Int.</source> <volume>61</volume>, <fpage>228</fpage>&#x2013;<lpage>239</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14703297.2023.2190148</pub-id></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Courneya</surname><given-names>K. S.</given-names></name> <name><surname>Hellsten</surname><given-names>L.-A. M.</given-names></name></person-group> (<year>2001</year>). <article-title>Cancer prevention as a source of exercise motivation: an experimental test using protection motivation theory</article-title>. <source>Psychol. Health Med.</source> <volume>6</volume>, <fpage>59</fpage>&#x2013;<lpage>64</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13548500125267</pub-id></mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Crompton</surname><given-names>H.</given-names></name> <name><surname>Burke</surname><given-names>D.</given-names></name></person-group> (<year>2024</year>). <article-title>The educational affordances and challenges of ChatGPT: state of the field</article-title>. <source>TechTrends</source> <volume>68</volume>, <fpage>380</fpage>&#x2013;<lpage>392</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11528-024-00939-0</pub-id></mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Crowell</surname><given-names>C. R.</given-names></name> <name><surname>Narvaez</surname><given-names>D.</given-names></name> <name><surname>Gomberg</surname><given-names>A.</given-names></name></person-group> (<year>2008</year>). &#x201C;<article-title>Moral psychology and information ethics: psychological distance and the components of moral behavior in a digital world</article-title>&#x201D; in eds. R. Luppicini and R. Adell. <source>Information security and ethics: concepts, methodologies, tools, and applications</source> (<publisher-loc>Hershey, PA</publisher-loc>: <publisher-name>IGI Global Scientific Publishing</publisher-name>), <fpage>3269</fpage>&#x2013;<lpage>3281</lpage>. doi: <pub-id pub-id-type="doi">10.4018/978-1-60566-022-6.ch045</pub-id></mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dai</surname><given-names>Z.</given-names></name></person-group> (<year>2024</year>). <article-title>Does AI Help? A Review of How AIGC Affects Design Education</article-title>. <volume>2</volume>:<fpage>5</fpage>.doi: <pub-id pub-id-type="doi">10.61173/pdymj625</pub-id></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Davis</surname><given-names>F. D.</given-names></name></person-group> (<year>1989</year>). <article-title>Perceived usefulness, perceived ease of use, and user acceptance of information technology</article-title>. <source>MIS Q.</source> <volume>13</volume>, <fpage>319</fpage>&#x2013;<lpage>340</lpage>. doi: <pub-id pub-id-type="doi">10.2307/249008</pub-id></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dodge</surname><given-names>C. E.</given-names></name> <name><surname>Fisk</surname><given-names>N.</given-names></name> <name><surname>Burruss</surname><given-names>G. W.</given-names></name> <name><surname>Moule</surname><given-names>R. K.</given-names></name> <name><surname>Jaynes</surname><given-names>C. M.</given-names></name></person-group> (<year>2023</year>). <article-title>What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory</article-title>. <source>Criminol. Public Policy</source> <volume>22</volume>, <fpage>849</fpage>&#x2013;<lpage>868</lpage>. doi: <pub-id pub-id-type="doi">10.1111/1745-9133.12641</pub-id></mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dwivedi</surname><given-names>Y. K.</given-names></name> <name><surname>Hughes</surname><given-names>L.</given-names></name> <name><surname>Ismagilova</surname><given-names>E.</given-names></name> <name><surname>Aarts</surname><given-names>G.</given-names></name> <name><surname>Coombs</surname><given-names>C.</given-names></name> <name><surname>Crick</surname><given-names>T.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>Artificial intelligence (AI): multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy</article-title>. <source>Int. J. Inf. Manag.</source> <volume>57</volume>:<fpage>101994</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2019.08.002</pub-id>, <pub-id pub-id-type="pmid">41377697</pub-id></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>ElKheshin</surname><given-names>S.</given-names></name> <name><surname>Saleeb</surname><given-names>N.</given-names></name></person-group> (<year>2020</year>). <article-title>Assessing the adoption of e-government using TAM model: case of Egypt</article-title>. <source>Int. J. Manag. Inf. Technol.</source> <volume>12</volume>, <fpage>1</fpage>&#x2013;<lpage>14</lpage>. doi: <pub-id pub-id-type="doi">10.5121/ijmit.2020.12101</pub-id></mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Floridi</surname><given-names>L.</given-names></name> <name><surname>Chiriatti</surname><given-names>M.</given-names></name></person-group> (<year>2020</year>). <article-title>GPT-3: its nature, scope, limits, and consequences</article-title>. <source>Minds Mach.</source> <volume>30</volume>, <fpage>681</fpage>&#x2013;<lpage>694</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11023-020-09548-1</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Floyd</surname><given-names>D. L.</given-names></name> <name><surname>Prentice-Dunn</surname><given-names>S.</given-names></name> <name><surname>Rogers</surname><given-names>R. W.</given-names></name></person-group> (<year>2000</year>). <article-title>A meta-analysis of research on protection motivation theory</article-title>. <source>J. Appl. Soc. Psychol.</source> <volume>30</volume>, <fpage>407</fpage>&#x2013;<lpage>429</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1559-1816.2000.tb02323.x</pub-id></mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ghimire</surname><given-names>A.</given-names></name> <name><surname>Edwards</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). <article-title>Generative AI adoption in classroom in context of technology acceptance model (TAM) and the innovation diffusion theory (IDT)</article-title>. <source>arXiv</source>. doi: <pub-id pub-id-type="doi">10.48550/arXiv.2406.15360</pub-id></mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gonz&#x00E1;lez-Ponce</surname><given-names>B. M.</given-names></name> <name><surname>Carmona-M&#x00E1;rquez</surname><given-names>J.</given-names></name> <name><surname>Pilatti</surname><given-names>A.</given-names></name> <name><surname>D&#x00ED;az-Batanero</surname><given-names>C.</given-names></name> <name><surname>Fern&#x00E1;ndez-Calder&#x00F3;n</surname><given-names>F.</given-names></name></person-group> (<year>2024</year>). <article-title>The protection motivation theory as an explanatory model for intention to use alcohol protective behavioral strategies related to the manner of drinking among young adults</article-title>. <source>Alcohol Alcohol.</source> <volume>59</volume>:<fpage>agae059</fpage>. doi: <pub-id pub-id-type="doi">10.1093/alcalc/agae059</pub-id>, <pub-id pub-id-type="pmid">39210657</pub-id></mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Grobelny</surname><given-names>J.</given-names></name> <name><surname>Szyma&#x0144;ski</surname><given-names>K.</given-names></name> <name><surname>Strozyk</surname><given-names>Z.</given-names></name></person-group> (<year>2025</year>). <article-title>Act as an expert in psychometry. The evaluation of large language models utility in psychological tests cross-cultural adaptations</article-title>. <source>Acta Psychol.</source> <volume>261</volume>:<fpage>105813</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.actpsy.2025.105813</pub-id></mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Guo</surname><given-names>J.</given-names></name> <name><surname>Ma</surname><given-names>Y.</given-names></name> <name><surname>Li</surname><given-names>T.</given-names></name> <name><surname>Noetel</surname><given-names>M.</given-names></name> <name><surname>Liao</surname><given-names>K.</given-names></name> <name><surname>Greiff</surname><given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Harnessing artificial intelligence in generative content for enhancing motivation in learning</article-title>. <source>Learn. Individ. Differ.</source> <volume>116</volume>:<fpage>102547</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.lindif.2024.102547</pub-id></mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hedayati</surname><given-names>S.</given-names></name> <name><surname>Damghanian</surname><given-names>H.</given-names></name> <name><surname>Farhadinejad</surname><given-names>M.</given-names></name> <name><surname>Rastgar</surname><given-names>A. A.</given-names></name></person-group> (<year>2023</year>). <article-title>Meta-analysis on application of protection motivation theory in preventive behaviors against COVID-19</article-title>. <source>Int. J. Disaster Risk Reduct.</source> <volume>94</volume>:<fpage>103758</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijdrr.2023.103758</pub-id>, <pub-id pub-id-type="pmid">37359108</pub-id></mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hess</surname><given-names>T. J.</given-names></name> <name><surname>McNab</surname><given-names>A. L.</given-names></name> <name><surname>Basoglu</surname><given-names>K. A.</given-names></name></person-group> (<year>2014</year>). <article-title>Reliability generalization of perceived ease of use, perceived usefulness, and behavioral intentions1</article-title>. <source>MIS Q.</source> <volume>38</volume>, <fpage>1</fpage>&#x2013;<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.25300/MISQ/2014/38.1.01</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hsiao</surname><given-names>C.-H.</given-names></name> <name><surname>Tang</surname><given-names>K.-Y.</given-names></name></person-group> (<year>2024</year>). <article-title>Beyond acceptance: an empirical investigation of technological, ethical, social, and individual determinants of GenAI-supported learning in higher education</article-title>. <source>Educ. Inf. Technol.</source> <volume>30</volume>, <fpage>10725</fpage>&#x2013;<lpage>10750</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10639-024-13263-0</pub-id>, <pub-id pub-id-type="pmid">41378316</pub-id></mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hsu</surname><given-names>W.-L.</given-names></name> <name><surname>Silalahi</surname><given-names>A. D. K.</given-names></name></person-group> (<year>2024</year>). <article-title>Exploring the paradoxical use of ChatGPT in education: analyzing benefits, risks, and coping strategies through integrated UTAUT and PMT theories using a hybrid approach of SEM and fsQCA</article-title>. <source>Comput. Educ.: Artif. Intell.</source> <volume>7</volume>:<fpage>100329</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.caeai.2024.100329</pub-id></mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>S.</given-names></name> <name><surname>Wu</surname><given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Innovative applications of AIGC in television content generation</article-title>. <source>Trans. Soc. Sci. Educ. Humanit. Res.</source> <volume>9</volume>, <fpage>247</fpage>&#x2013;<lpage>252</lpage>. doi: <pub-id pub-id-type="doi">10.62051/ycajyq72</pub-id></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Imran</surname><given-names>M.</given-names></name> <name><surname>Almusharraf</surname><given-names>N.</given-names></name></person-group> (<year>2023</year>). <article-title>Analyzing the role of ChatGPT as a writing assistant at higher education level: a systematic review of the literature</article-title>. <source>Contemp. Educ. Technol.</source> <volume>15</volume>:<fpage>ep464</fpage>. doi: <pub-id pub-id-type="doi">10.30935/cedtech/13605</pub-id></mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Islam</surname><given-names>A. K. M. N.</given-names></name> <name><surname>Azad</surname><given-names>N.</given-names></name> <name><surname>M&#x00E4;ntym&#x00E4;ki</surname><given-names>M.</given-names></name> <name><surname>Islam</surname><given-names>S. M. S.</given-names></name></person-group> (<year>2014</year>). &#x201C;<article-title>TAM and E-learning adoption: a philosophical scrutiny of TAM, its limitations, and prescriptions for E-learning adoption research</article-title>&#x201D; in <source>Digital services and information intelligence</source>. eds. <person-group person-group-type="editor"><name><surname>Li</surname><given-names>H.</given-names></name> <name><surname>M&#x00E4;ntym&#x00E4;ki</surname><given-names>M.</given-names></name> <name><surname>Zhang</surname><given-names>X.</given-names></name></person-group> (<publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>164</fpage>&#x2013;<lpage>175</lpage>.</mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jannat</surname><given-names>T.</given-names></name> <name><surname>Arefin</surname><given-names>S.</given-names></name> <name><surname>Hosen</surname><given-names>M.</given-names></name> <name><surname>Omar</surname><given-names>N. A.</given-names></name> <name><surname>Al Mamun</surname><given-names>A.</given-names></name> <name><surname>Hoque</surname><given-names>M. E.</given-names></name></person-group> (<year>2024</year>). <article-title>Unlocking the link: protection motivation intention in ethics programs and unethical workplace behavior</article-title>. <source>Asian J. Bus. Ethics</source> <volume>13</volume>, <fpage>461</fpage>&#x2013;<lpage>488</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s13520-024-00218-4</pub-id></mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jelov&#x010D;an</surname><given-names>L.</given-names></name> <name><surname>Vrhovec</surname><given-names>S.</given-names></name> <name><surname>Miheli&#x010D;</surname><given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>Survey about cyberattack protection motivation in higher education: academics at Slovenian universities, 2017</article-title>. <source>arXiv</source>. doi: <pub-id pub-id-type="doi">10.48550/arXiv.2109.04132</pub-id></mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Jeong</surname><given-names>S.</given-names></name> <name><surname>Kim</surname><given-names>S.</given-names></name> <name><surname>Lee</surname><given-names>S.</given-names></name></person-group> (<year>2025</year>). &#x201C;<article-title>Effects of perceived ease of use and perceived usefulness of technology acceptance model on intention to continue using generative AI: focusing on the mediating effect of satisfaction and moderating effect of innovation resistance</article-title>&#x201D; in <source>Advances in conceptual modeling</source>. eds. <person-group person-group-type="editor"><name><surname>Saeki</surname><given-names>M.</given-names></name> <name><surname>Wong</surname><given-names>L.</given-names></name> <name><surname>Araujo</surname><given-names>J.</given-names></name> <name><surname>Ayora</surname><given-names>C.</given-names></name> <name><surname>Bernasconi</surname><given-names>A.</given-names></name> <name><surname>Buffa</surname><given-names>M.</given-names></name> <etal/></person-group>. (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer Nature Switzerland</publisher-name>), <fpage>99</fpage>&#x2013;<lpage>106</lpage>.</mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jose</surname><given-names>B.</given-names></name> <name><surname>Cherian</surname><given-names>J.</given-names></name> <name><surname>Verghis</surname><given-names>A. M.</given-names></name> <name><surname>Varghise</surname><given-names>S. M. S. M.</given-names></name> <name><surname>Joseph</surname><given-names>S.</given-names></name></person-group> (<year>2025</year>). <article-title>The cognitive paradox of AI in education: between enhancement and erosion</article-title>. <source>Front. Psychol.</source> <volume>16</volume>:<fpage>1550621</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2025.1550621</pub-id>, <pub-id pub-id-type="pmid">40297599</pub-id></mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>J&#x00FC;rgensmeier</surname><given-names>L.</given-names></name> <name><surname>Skiera</surname><given-names>B.</given-names></name></person-group> (<year>2024</year>). <article-title>Generative AI for scalable feedback to multimodal exercises</article-title>. <source>Int. J. Res. Mark.</source> <volume>41</volume>, <fpage>468</fpage>&#x2013;<lpage>488</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijresmar.2024.05.005</pub-id></mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Karran</surname><given-names>A. J.</given-names></name> <name><surname>Charland</surname><given-names>P.</given-names></name> <name><surname>Martineau</surname><given-names>J.-T.</given-names></name> <name><surname>Arana</surname><given-names>A. O. de G. L.</given-names><prefix>de</prefix></name> <name><surname>Lesage</surname><given-names>A.</given-names></name> <name><surname>Senecal</surname><given-names>S.</given-names></name> <etal/></person-group> <year>2024</year>). <article-title>Multi-stakeholder perspective on responsible artificial intelligence and acceptability in education</article-title>. <source>arXiv</source> doi: <pub-id pub-id-type="doi">10.48550/arXiv.2402.15027</pub-id></mixed-citation></ref>
<ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kasneci</surname><given-names>E.</given-names></name> <name><surname>Sessler</surname><given-names>K.</given-names></name> <name><surname>K&#x00FC;chemann</surname><given-names>S.</given-names></name> <name><surname>Bannert</surname><given-names>M.</given-names></name> <name><surname>Dementieva</surname><given-names>D.</given-names></name> <name><surname>Fischer</surname><given-names>F.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>ChatGPT for good? On opportunities and challenges of large language models for education</article-title>. <source>Learn. Individ. Differ.</source> <volume>103</volume>:<fpage>102274</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.lindif.2023.102274</pub-id></mixed-citation></ref>
<ref id="ref46"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kelly</surname><given-names>S.</given-names></name> <name><surname>Kaye</surname><given-names>S.-A.</given-names></name> <name><surname>Oviedo-Trespalacios</surname><given-names>O.</given-names></name></person-group> (<year>2023</year>). <article-title>What factors contribute to the acceptance of artificial intelligence? A systematic review</article-title>. <source>Telemat. Inform.</source> <volume>77</volume>:<fpage>101925</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.tele.2022.101925</pub-id></mixed-citation></ref>
<ref id="ref47"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Khosrow-Pour</surname><given-names>M.</given-names></name></person-group> (Ed.). (<year>2003</year>). <source>Information technology and organizations: trends, issues, challenges and solutions</source>. <publisher-loc>Hershey, PA</publisher-loc>: <publisher-name>Idea Group Inc (IGI)</publisher-name>. Available at: <ext-link xlink:href="https://books.google.com.cy/books?id=RGXEoPkZVacC&#x0026;printsec=copyright#v=onepage&#x0026;q&#x0026;f=false" ext-link-type="uri">https://books.google.com.cy/books?id=RGXEoPkZVacC&#x0026;printsec=copyright#v=onepage&#x0026;q&#x0026;f=false</ext-link></mixed-citation></ref>
<ref id="ref48"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kwon</surname><given-names>O.</given-names></name> <name><surname>Bae</surname><given-names>S.</given-names></name> <name><surname>Shin</surname><given-names>B.</given-names></name></person-group> (<year>2020</year>). Understanding the adoption intention of AI through the ethics lens. Hawaii Int. Conf. Syst. Sci. 2020 (HICSS-53). Available online at: <ext-link xlink:href="https://aisel.aisnet.org/hicss-53/ks/aspects_of_ai/3" ext-link-type="uri">https://aisel.aisnet.org/hicss-53/ks/aspects_of_ai/3</ext-link> (Accessed May 4, 2025).</mixed-citation></ref>
<ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>K.</given-names></name></person-group> (<year>2023</year>). <article-title>Determinants of college students&#x2019; actual use of AI-based systems: an extension of the technology acceptance model</article-title>. <source>Sustainability</source> <volume>15</volume>:<fpage>5221</fpage>. doi: <pub-id pub-id-type="doi">10.3390/su15065221</pub-id></mixed-citation></ref>
<ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>R.</given-names></name></person-group> (<year>2024</year>). <article-title>Research on blended teaching model in finance and economics education using AIGC technology</article-title>. <source>Commun. Educ. Rev.</source> <volume>5</volume>. doi: <pub-id pub-id-type="doi">10.37420/j.cer.2024.029</pub-id></mixed-citation></ref>
<ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>M.</given-names></name> <name><surname>Xie</surname><given-names>Q.</given-names></name> <name><surname>Enkhtur</surname><given-names>A.</given-names></name> <name><surname>Meng</surname><given-names>S.</given-names></name> <name><surname>Chen</surname><given-names>L.</given-names></name> <name><surname>Yamamoto</surname><given-names>B. A.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>A framework for developing university policies on generative AI governance: A cross-national comparative study</article-title>. <source>arXiv</source>. doi: <pub-id pub-id-type="doi">10.48550/arXiv.2504.02636</pub-id></mixed-citation></ref>
<ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>Y.</given-names></name> <name><surname>Li</surname><given-names>Q.</given-names></name> <name><surname>Edu</surname><given-names>T.</given-names></name> <name><surname>Negricea</surname><given-names>I. C.</given-names></name></person-group> (<year>2023</year>). <article-title>Exploring the continuance usage intention of travel applications in the case of Chinese tourists</article-title>. <source>J. Hosp. Tour. Res.</source> <volume>47</volume>, <fpage>6</fpage>&#x2013;<lpage>32</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1096348020962553</pub-id></mixed-citation></ref>
<ref id="ref53"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>H.</given-names></name> <name><surname>Wang</surname><given-names>Y.</given-names></name> <name><surname>Fan</surname><given-names>W.</given-names></name> <name><surname>Liu</surname><given-names>X.</given-names></name> <name><surname>Li</surname><given-names>Y.</given-names></name> <name><surname>Jain</surname><given-names>S.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>Trustworthy AI: a computational perspective</article-title>. <source>arXiv</source>. doi: <pub-id pub-id-type="doi">10.48550/arXiv.2107.06641</pub-id></mixed-citation></ref>
<ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lo</surname><given-names>C. K.</given-names></name></person-group> (<year>2023</year>). <article-title>What is the impact of ChatGPT on education? A rapid review of the literature</article-title>. <source>Educ. Sci.</source> <volume>13</volume>:<fpage>410</fpage>. doi: <pub-id pub-id-type="doi">10.3390/educsci13040410</pub-id></mixed-citation></ref>
<ref id="ref55"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lu</surname><given-names>H.</given-names></name> <name><surname>He</surname><given-names>L.</given-names></name> <name><surname>Yu</surname><given-names>H.</given-names></name> <name><surname>Pan</surname><given-names>T.</given-names></name> <name><surname>Fu</surname><given-names>K.</given-names></name></person-group> (<year>2024</year>). <article-title>A study on teachers&#x2019; willingness to use generative AI technology and its influencing factors: based on an integrated model</article-title>. <source>Sustainability</source> <volume>16</volume>:<fpage>7216</fpage>. doi: <pub-id pub-id-type="doi">10.3390/su16167216</pub-id></mixed-citation></ref>
<ref id="ref56"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mahapatra</surname><given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Impact of ChatGPT on ESL students&#x2019; academic writing skills: a mixed methods intervention study</article-title>. <source>Smart Learn. Environ.</source> <volume>11</volume>:<fpage>9</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s40561-024-00295-9</pub-id></mixed-citation></ref>
<ref id="ref57"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Marmolejo-Ramos</surname><given-names>F.</given-names></name> <name><surname>Bulut</surname><given-names>O.</given-names></name> <name><surname>Anuncia&#x00E7;&#x00E1;o</surname><given-names>L.</given-names></name> <name><surname>Marques</surname><given-names>L.</given-names></name> <name><surname>Barthakur</surname><given-names>A.</given-names></name> <name><surname>Kundrat</surname><given-names>J.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>From human artefact to machine output: automating the &#x201C;art&#x201D; of psychological measurement</article-title>. <source>J. Psychol. AI</source> <volume>1</volume>:<fpage>2561692</fpage>. doi: <pub-id pub-id-type="doi">10.1080/29974100.2025.2561692</pub-id></mixed-citation></ref>
<ref id="ref58"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Masry Herzallah</surname><given-names>A.</given-names></name> <name><surname>Makaldy</surname><given-names>R.</given-names></name></person-group> (<year>2025</year>). <article-title>Technological self-efficacy and sense of coherence: key drivers in teachers&#x2019; AI acceptance and adoption</article-title>. <source>Comput. Educ. Artif. Intell.</source> <volume>8</volume>:<fpage>100377</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.caeai.2025.100377</pub-id></mixed-citation></ref>
<ref id="ref59"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McIntire</surname><given-names>A.</given-names></name> <name><surname>Calvert</surname><given-names>I.</given-names></name> <name><surname>Ashcraft</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). <article-title>Pressure to plagiarize and the choice to cheat: toward a pragmatic reframing of the ethics of academic integrity</article-title>. <source>Educ. Sci.</source> <volume>14</volume>:<fpage>244</fpage>. doi: <pub-id pub-id-type="doi">10.3390/educsci14030244</pub-id></mixed-citation></ref>
<ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mondal</surname><given-names>H.</given-names></name> <name><surname>Mondal</surname><given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>ChatGPT in academic writing: maximizing its benefits and minimizing the risks</article-title>. <source>Indian J. Ophthalmol.</source> <volume>71</volume>, <fpage>3600</fpage>&#x2013;<lpage>3606</lpage>. doi: <pub-id pub-id-type="doi">10.4103/ijo.ijo_718_23</pub-id>, <pub-id pub-id-type="pmid">37991290</pub-id></mixed-citation></ref>
<ref id="ref61"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Morales-Garc&#x00ED;a</surname><given-names>W. C.</given-names></name> <name><surname>Sairitupa-Sanchez</surname><given-names>L. Z.</given-names></name> <name><surname>Morales-Garc&#x00ED;a</surname><given-names>S. B.</given-names></name> <name><surname>Morales-Garc&#x00ED;a</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>Adaptation and psychometric properties of a brief version of the general self-efficacy scale for use with artificial intelligence (GSE-6AI) among university students</article-title>. <source>Front. Educ.</source> <volume>9</volume>:<fpage>1293437</fpage>. doi: <pub-id pub-id-type="doi">10.3389/feduc.2024.1293437</pub-id></mixed-citation></ref>
<ref id="ref62"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Mower</surname><given-names>D. S.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Increasing the moral sensitivity of professionals</article-title>&#x201D; in <source>Ethics across the curriculum&#x2014;pedagogical perspectives</source>. eds. <person-group person-group-type="editor"><name><surname>Englehardt</surname><given-names>E. E.</given-names></name> <name><surname>Pritchard</surname><given-names>M. S.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>73</fpage>&#x2013;<lpage>88</lpage>.</mixed-citation></ref>
<ref id="ref63"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Naidoo</surname><given-names>D. T.</given-names></name></person-group> (<year>2023</year>). <article-title>Integrating TAM and IS success model: exploring the role of blockchain and AI in predicting learner engagement and performance in e-learning</article-title>. <source>Front. Comput. Sci.</source> <volume>5</volume>:<fpage>1227749</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fcomp.2023.1227749</pub-id></mixed-citation></ref>
<ref id="ref64"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nguyen</surname><given-names>A.</given-names></name> <name><surname>Ngo</surname><given-names>H. N.</given-names></name> <name><surname>Hong</surname><given-names>Y.</given-names></name> <name><surname>Dang</surname><given-names>B.</given-names></name> <name><surname>Nguyen</surname><given-names>B.-P. T.</given-names></name></person-group> (<year>2023</year>). <article-title>Ethical principles for artificial intelligence in education</article-title>. <source>Educ. Inf. Technol.</source> <volume>28</volume>, <fpage>4221</fpage>&#x2013;<lpage>4241</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10639-022-11316-w</pub-id>, <pub-id pub-id-type="pmid">36254344</pub-id></mixed-citation></ref>
<ref id="ref65"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nguyen</surname><given-names>H. T.</given-names></name> <name><surname>Tang</surname><given-names>C. W.</given-names></name></person-group> (<year>2022</year>). <article-title>Students&#x2019; intention to take e-learning courses during the COVID-19 pandemic: a protection motivation theory perspective</article-title>. <source>Int. Rev. Res. Open Distrib. Learn.</source> <volume>23</volume>, <fpage>21</fpage>&#x2013;<lpage>42</lpage>. doi: <pub-id pub-id-type="doi">10.19173/irrodl.v23i3.6178</pub-id></mixed-citation></ref>
<ref id="ref66"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nikolic</surname><given-names>S.</given-names></name> <name><surname>Wentworth</surname><given-names>I.</given-names></name> <name><surname>Sheridan</surname><given-names>L.</given-names></name> <name><surname>Moss</surname><given-names>S.</given-names></name> <name><surname>Duursma</surname><given-names>E.</given-names></name> <name><surname>Jones</surname><given-names>R. A.</given-names></name> <etal/></person-group>. (<year>2024</year>). <article-title>A systematic literature review of attitudes, intentions and behaviours of teaching academics pertaining to AI and generative AI (GenAI) in higher education: an analysis of GenAI adoption using the UTAUT framework</article-title>. <source>Australas. J. Educ. Technol.</source> <volume>40</volume>, <fpage>56</fpage>&#x2013;<lpage>75</lpage>. doi: <pub-id pub-id-type="doi">10.14742/ajet.9643</pub-id></mixed-citation></ref>
<ref id="ref67"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ocen</surname><given-names>S.</given-names></name> <name><surname>Elasu</surname><given-names>J.</given-names></name> <name><surname>Aarakit</surname><given-names>S. M.</given-names></name> <name><surname>Olupot</surname><given-names>C.</given-names></name></person-group> (<year>2025</year>). <article-title>Artificial intelligence in higher education institutions: review of innovations, opportunities and challenges</article-title>. <source>Front. Educ.</source> <volume>10</volume>:<fpage>1530247</fpage>. doi: <pub-id pub-id-type="doi">10.3389/feduc.2025.1530247</pub-id></mixed-citation></ref>
<ref id="ref68"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Osman</surname><given-names>Z.</given-names></name> <name><surname>Yatam</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>Enhancing artificial intelligence-enabled transformation acceptance among employees of higher education institutions</article-title>. <source>Int. J. Acad. Res. Account. Finance Manag. Sci.</source> <volume>14</volume>, <fpage>289</fpage>&#x2013;<lpage>303</lpage>. doi: <pub-id pub-id-type="doi">10.6007/IJARAFMS/v14-i2/21322</pub-id>, <pub-id pub-id-type="pmid">41317454</pub-id></mixed-citation></ref>
<ref id="ref69"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Park</surname><given-names>J.</given-names></name> <name><surname>Yun</surname><given-names>J.</given-names></name> <name><surname>Chang</surname><given-names>W.</given-names></name></person-group> (<year>2024</year>). <article-title>Intention to adopt services by AI avatar: a protection motivation theory perspective</article-title>. <source>J. Retail. Consum. Serv.</source> <volume>80</volume>:<fpage>103929</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jretconser.2024.103929</pub-id></mixed-citation></ref>
<ref id="ref70"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Plata</surname><given-names>S.</given-names></name> <name><surname>De Guzman</surname><given-names>M. A.</given-names></name> <name><surname>Quesada</surname><given-names>A.</given-names></name></person-group> (<year>2023</year>). <article-title>Emerging research and policy themes on academic integrity in the age of chat GPT and generative AI/sterling plata, maria ana de guzman and arthea quesada</article-title>. <source>Asian J. Univ. Educ.</source> <volume>19</volume>, <fpage>743</fpage>&#x2013;<lpage>758</lpage>. doi: <pub-id pub-id-type="doi">10.24191/ajue.v19i4.24697</pub-id></mixed-citation></ref>
<ref id="ref71"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Rahman</surname><given-names>N.</given-names></name></person-group> (<year>2018</year>). Toward understanding PU and PEOU of technology acceptance model. Student Research Symposium. Available online at: <ext-link xlink:href="https://pdxscholar.library.pdx.edu/studentsymposium/2018/Presentations/3" ext-link-type="uri">https://pdxscholar.library.pdx.edu/studentsymposium/2018/Presentations/3</ext-link> (Accessed May 5, 2025).</mixed-citation></ref>
<ref id="ref72"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rav&#x0161;elj</surname><given-names>D.</given-names></name> <name><surname>Ker&#x017E;i&#x010D;</surname><given-names>D.</given-names></name> <name><surname>Toma&#x017E;evi&#x010D;</surname><given-names>N.</given-names></name> <name><surname>Umek</surname><given-names>L.</given-names></name> <name><surname>Brezovar</surname><given-names>N.</given-names></name> <name><surname>Iahad</surname><given-names>N. A.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>Higher education students&#x2019; perceptions of ChatGPT: a global study of early reactions</article-title>. <source>PLoS One</source> <volume>20</volume>:<fpage>e0315011</fpage>. doi: <pub-id pub-id-type="doi">10.1371/journal.pone.0315011</pub-id>, <pub-id pub-id-type="pmid">39908277</pub-id></mixed-citation></ref>
<ref id="ref73"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rest</surname><given-names>J. R.</given-names></name> <name><surname>Narvaez</surname><given-names>D.</given-names></name> <name><surname>Thoma</surname><given-names>S. J.</given-names></name> <name><surname>Bebeau</surname><given-names>M. J.</given-names></name></person-group> (<year>1999</year>). <article-title>DIT2: devising and testing a revised instrument of moral judgment</article-title>. <source>J. Educ. Psychol.</source> <volume>91</volume>, <fpage>644</fpage>&#x2013;<lpage>659</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0022-0663.91.4.644</pub-id></mixed-citation></ref>
<ref id="ref74"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Reynolds</surname><given-names>S. J.</given-names></name></person-group> (<year>2008</year>). <article-title>Moral attentiveness: who pays attention to the moral aspects of life?</article-title> <source>J. Appl. Psychol.</source> <volume>93</volume>, <fpage>1027</fpage>&#x2013;<lpage>1041</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0021-9010.93.5.1027</pub-id>, <pub-id pub-id-type="pmid">18808223</pub-id></mixed-citation></ref>
<ref id="ref75"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rhim</surname><given-names>J.</given-names></name> <name><surname>Lee</surname><given-names>J.-H.</given-names></name> <name><surname>Chen</surname><given-names>M.</given-names></name> <name><surname>Lim</surname><given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>A deeper look at autonomous vehicle ethics: an integrative ethical decision-making framework to explain moral pluralism</article-title>. <source>Front. Robot. AI</source> <volume>8</volume>:<fpage>632394</fpage>. doi: <pub-id pub-id-type="doi">10.3389/frobt.2021.632394</pub-id>, <pub-id pub-id-type="pmid">34017859</pub-id></mixed-citation></ref>
<ref id="ref76"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ruan</surname><given-names>W.</given-names></name> <name><surname>Kang</surname><given-names>S.</given-names></name> <name><surname>Song</surname><given-names>H.</given-names></name></person-group> (<year>2020</year>). <article-title>Applying protection motivation theory to understand international tourists&#x2019; behavioural intentions under the threat of air pollution: a case of Beijing, China</article-title>. <source>Curr. Issues Tour.</source> <volume>23</volume>, <fpage>2027</fpage>&#x2013;<lpage>2041</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13683500.2020.1743242</pub-id></mixed-citation></ref>
<ref id="ref77"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rughini&#x0219;</surname><given-names>C.</given-names></name> <name><surname>Vulpe</surname><given-names>S.-N.</given-names></name> <name><surname>&#x021A;urcanu</surname><given-names>D.</given-names></name> <name><surname>Rughini&#x0219;</surname><given-names>R.</given-names></name></person-group> (<year>2025</year>). <article-title>AI at the knowledge gates: institutional policies and hybrid configurations in universities and publishers</article-title>. <source>Front. Comput. Sci.</source> <volume>7</volume>:<fpage>1608276</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fcomp.2025.1608276</pub-id></mixed-citation></ref>
<ref id="ref78"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sain</surname><given-names>Z. H.</given-names></name> <name><surname>Lawal</surname><given-names>U. S.</given-names></name></person-group> (<year>2024</year>). <article-title>Morality in higher education&#x2019;s AI integration: examining ethical stances on implementation</article-title>. <source>J. Educ. Manag. Res.</source> <volume>3</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.61987/jemr.v3i1.351</pub-id></mixed-citation></ref>
<ref id="ref79"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Scherer</surname><given-names>R.</given-names></name> <name><surname>Siddiq</surname><given-names>F.</given-names></name> <name><surname>Tondeur</surname><given-names>J.</given-names></name></person-group> (<year>2019</year>). <article-title>The technology acceptance model (TAM): a meta-analytic structural equation modeling approach to explaining teachers&#x2019; adoption of digital technology in education</article-title>. <source>Comput. Educ.</source> <volume>128</volume>, <fpage>13</fpage>&#x2013;<lpage>35</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.compedu.2018.09.009</pub-id></mixed-citation></ref>
<ref id="ref80"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sher</surname><given-names>M.-L.</given-names></name> <name><surname>Talley</surname><given-names>P. C.</given-names></name> <name><surname>Yang</surname><given-names>C.-W.</given-names></name> <name><surname>Kuo</surname><given-names>K.-M.</given-names></name></person-group> (<year>2017</year>). <article-title>Compliance with electronic medical records privacy policy: an empirical investigation of hospital information technology staff</article-title>. <source>Inquiry</source> <volume>54</volume>. doi: <pub-id pub-id-type="doi">10.1177/0046958017711759</pub-id></mixed-citation></ref>
<ref id="ref81"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Shin</surname><given-names>D.</given-names></name></person-group> (<year>2021</year>). <article-title>The effects of explainability and causability on perception, trust, and acceptance: implications for explainable AI</article-title>. <source>Int. J. Hum.-Comput. Stud.</source> <volume>146</volume>:<fpage>102551</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhcs.2020.102551</pub-id></mixed-citation></ref>
<ref id="ref82"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Shrivastava</surname><given-names>P.</given-names></name></person-group> (<year>2025</year>). <article-title>Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors</article-title>. <source>Front. Artif. Intell.</source> <volume>8</volume>:<fpage>1565927</fpage>. doi: <pub-id pub-id-type="doi">10.3389/frai.2025.1565927</pub-id>, <pub-id pub-id-type="pmid">40357449</pub-id></mixed-citation></ref>
<ref id="ref83"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Smutny</surname><given-names>P.</given-names></name> <name><surname>Schreiberova</surname><given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Chatbots for learning: a review of educational chatbots for the facebook messenger</article-title>. <source>Comput. Educ.</source> <volume>151</volume>:<fpage>103862</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.compedu.2020.103862</pub-id></mixed-citation></ref>
<ref id="ref84"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sommestad</surname><given-names>T.</given-names></name> <name><surname>Karlz&#x00E9;n</surname><given-names>H.</given-names></name> <name><surname>Hallberg</surname><given-names>J.</given-names></name></person-group> (<year>2015</year>). <article-title>A meta-analysis of studies on protection motivation theory and information security behaviour</article-title>. <source>Int. J. Inf. Secur. Priv.</source> <volume>9</volume>, <fpage>26</fpage>&#x2013;<lpage>46</lpage>. doi: <pub-id pub-id-type="doi">10.4018/IJISP.2015010102</pub-id></mixed-citation></ref>
<ref id="ref85"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Strahovnik</surname><given-names>V.</given-names></name></person-group> (<year>2018</year>). <article-title>Ethical education and moral theory</article-title>. <source>Metod. Ogl.</source> <volume>25</volume>, <fpage>11</fpage>&#x2013;<lpage>29</lpage>. doi: <pub-id pub-id-type="doi">10.21464/mo.25.2.1</pub-id></mixed-citation></ref>
<ref id="ref86"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Su</surname><given-names>D. N.</given-names></name> <name><surname>Truong</surname><given-names>T. M.</given-names></name> <name><surname>Luu</surname><given-names>T. T.</given-names></name> <name><surname>Huynh</surname><given-names>H. M. T.</given-names></name> <name><surname>O&#x2019;Mahony</surname><given-names>B.</given-names></name></person-group> (<year>2022</year>). <article-title>Career resilience of the tourism and hospitality workforce in the COVID-19: the protection motivation theory perspective</article-title>. <source>Tour. Manag. Perspect.</source> <volume>44</volume>:<fpage>101039</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.tmp.2022.101039</pub-id></mixed-citation></ref>
<ref id="ref87"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Sukirman</surname><given-names>S.</given-names></name> <name><surname>Setiawan</surname><given-names>A.</given-names></name> <name><surname>Chamsudin</surname><given-names>A.</given-names></name> <name><surname>Yuliana</surname><given-names>I.</given-names></name> <name><surname>Wantoro</surname><given-names>J.</given-names></name></person-group> <year>2024</year>. <article-title>Exploring student perceptions and acceptance of ChatGPT in enhanced AI-assisted learning</article-title>. <conf-name>2024 international conference Smart Computer IOT Machine Learning (SIML)</conf-name>, <fpage>291</fpage>&#x2013;<lpage>296</lpage>.</mixed-citation></ref>
<ref id="ref88"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Susnjak</surname><given-names>T.</given-names></name> <name><surname>McIntosh</surname><given-names>T. R.</given-names></name></person-group> (<year>2024</year>). <article-title>ChatGPT: the end of online exam integrity?</article-title> <source>Educ. Sci.</source> <volume>14</volume>:<fpage>656</fpage>. doi: <pub-id pub-id-type="doi">10.3390/educsci14060656</pub-id></mixed-citation></ref>
<ref id="ref89"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Vance</surname><given-names>A.</given-names></name> <name><surname>Siponen</surname><given-names>M.</given-names></name> <name><surname>Pahnila</surname><given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>Motivating IS security compliance: insights from habit and protection motivation theory</article-title>. <source>Inf. Manag.</source> <volume>49</volume>, <fpage>190</fpage>&#x2013;<lpage>198</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.im.2012.04.002</pub-id></mixed-citation></ref>
<ref id="ref90"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>H.</given-names></name> <name><surname>Zhang</surname><given-names>J.</given-names></name> <name><surname>Luximon</surname><given-names>Y.</given-names></name> <name><surname>Qin</surname><given-names>M.</given-names></name> <name><surname>Geng</surname><given-names>P.</given-names></name> <name><surname>Tao</surname><given-names>D.</given-names></name></person-group> (<year>2022</year>). <article-title>The determinants of user acceptance of mobile medical platforms: an investigation integrating the TPB, TAM, and patient-centered factors</article-title>. <source>Int. J. Environ. Res. Public Health</source> <volume>19</volume>:<fpage>10758</fpage>. doi: <pub-id pub-id-type="doi">10.3390/ijerph191710758</pub-id>, <pub-id pub-id-type="pmid">36078473</pub-id></mixed-citation></ref>
<ref id="ref91"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname><given-names>N.</given-names></name> <name><surname>Wang</surname><given-names>K.-J.</given-names></name> <name><surname>Lin</surname><given-names>C.-Y.</given-names></name></person-group> (<year>2022</year>). <article-title>Technology acceptance model for lawyer robots with AI: a quantitative survey</article-title>. <source>Int. J. Soc. Robot.</source> <volume>14</volume>, <fpage>1043</fpage>&#x2013;<lpage>1055</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s12369-021-00850-1</pub-id></mixed-citation></ref>
<ref id="ref92"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yakubu</surname><given-names>M. N.</given-names></name> <name><surname>David</surname><given-names>N.</given-names></name> <name><surname>Abubakar</surname><given-names>N. H.</given-names></name></person-group> (<year>2025</year>). <article-title>Students&#x2019; behavioural intention to use content generative AI for learning and research: a UTAUT theoretical perspective</article-title>. <source>Educ. Inf. Technol.</source> <volume>30</volume>, <fpage>17969</fpage>&#x2013;<lpage>17994</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10639-025-13441-8</pub-id></mixed-citation></ref>
<ref id="ref93"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Y.</given-names></name></person-group> (<year>2024</year>). <article-title>Influences of digital literacy and moral sensitivity on artificial intelligence ethics awareness among nursing students</article-title>. <source>Healthcare</source> <volume>12</volume>:<fpage>2172</fpage>. doi: <pub-id pub-id-type="doi">10.3390/healthcare12212172</pub-id>, <pub-id pub-id-type="pmid">39517384</pub-id></mixed-citation></ref>
<ref id="ref94"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yilmaz</surname><given-names>R.</given-names></name> <name><surname>Karaoglan Yilmaz</surname><given-names>F. G.</given-names></name></person-group> (<year>2023</year>). <article-title>The effect of generative artificial intelligence (AI)-based tool use on students&#x2019; computational thinking skills, programming self-efficacy and motivation</article-title>. <source>Comput. Educ. Artif. Intell.</source> <volume>4</volume>:<fpage>100147</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.caeai.2023.100147</pub-id></mixed-citation></ref>
<ref id="ref95"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Zarifis</surname><given-names>A.</given-names></name> <name><surname>Efthymiou</surname><given-names>L.</given-names></name></person-group> (<year>2022</year>) <article-title>The four business models for AI adoption in education: giving leaders a destination for the digital transformation journey</article-title>, in <conf-name>2022 IEEE global engineering education conference (EDUCON)</conf-name>, <fpage>1868</fpage>&#x2013;<lpage>1872</lpage>.</mixed-citation></ref>
<ref id="ref96"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zawacki-Richter</surname><given-names>O.</given-names></name> <name><surname>Mar&#x00ED;n</surname><given-names>V. I.</given-names></name> <name><surname>Bond</surname><given-names>M.</given-names></name> <name><surname>Gouverneur</surname><given-names>F.</given-names></name></person-group> (<year>2019</year>). <article-title>Systematic review of research on artificial intelligence applications in higher education &#x2013; where are the educators?</article-title> <source>Int. J. Educ. Technol. High. Educ.</source> <volume>16</volume>:<fpage>39</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s41239-019-0171-0</pub-id></mixed-citation></ref>
<ref id="ref97"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Zhai</surname><given-names>X.</given-names></name></person-group> (<year>2022</year>). <source>ChatGPT user experience: Implications for education</source>. Available at: <ext-link xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4312418" ext-link-type="uri">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4312418</ext-link></mixed-citation></ref>
<ref id="ref98"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname><given-names>X.</given-names></name> <name><surname>Han</surname><given-names>X.</given-names></name> <name><surname>Dang</surname><given-names>Y.</given-names></name> <name><surname>Meng</surname><given-names>F.</given-names></name> <name><surname>Guo</surname><given-names>X.</given-names></name> <name><surname>Lin</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>User acceptance of mobile health services from users&#x2019; perspectives: the role of self-efficacy and response-efficacy in technology acceptance</article-title>. <source>Inform. Health Soc. Care</source> <volume>42</volume>, <fpage>194</fpage>&#x2013;<lpage>206</lpage>. doi: <pub-id pub-id-type="doi">10.1080/17538157.2016.1200053</pub-id>, <pub-id pub-id-type="pmid">27564428</pub-id></mixed-citation></ref>
<ref id="ref99"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>H.</given-names></name> <name><surname>Li</surname><given-names>Y.</given-names></name></person-group> (<year>2023</year>). <article-title>ChatGPT/AIGC and modernization of education governance: also on the transformation of education governance in the digital era</article-title>. <source>J. East China Norm. Univ.</source> <volume>41</volume>:<fpage>36</fpage>. doi: <pub-id pub-id-type="doi">10.16382/j.cnki.1000-5560.2023.07.004</pub-id></mixed-citation></ref>
<ref id="ref100"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>W.</given-names></name> <name><surname>Tsiga</surname><given-names>Z.</given-names></name> <name><surname>Li</surname><given-names>B.</given-names></name> <name><surname>Zheng</surname><given-names>S.</given-names></name> <name><surname>Jiang</surname><given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>What influence users&#x2019; e-finance continuance intention? The moderating role of trust</article-title>. <source>Ind. Manag. Data Syst.</source> <volume>118</volume>, <fpage>1647</fpage>&#x2013;<lpage>1670</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IMDS-12-2017-0602</pub-id></mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3160782/overview">Shujin Zhong</ext-link>, University of North Florida, United States</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/37355/overview">Fernando Marmolejo-Ramos</ext-link>, Flinders University, Australia</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1578203/overview">Alex Zarifis</ext-link>, University of Southampton, United Kingdom</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3264908/overview">Mohammad Mominur Rahman</ext-link>, Hamad bin Khalifa University, Qatar</p>
</fn>
</fn-group>
</back>
</article>