Abstract
Community-based healthcare information systems (HIS) are developed to cope with the demand for home healthcare. However, the issue of privacy protection in HIS adoption has not been given sufficient attention. This study is to propose a privacy‐enhanced framework and to investigate the role of privacy protection in HIS adoption. Our research model extends the unified theory of acceptance and use of technology by considering perceived security and information security literacy. Our experimental HIS is implemented according to our proposed privacy‐enhanced framework which integrates healthcare applications and privacy protection mechanisms. The former includes health management, physiological monitoring, healthcare education, and healthcare consulting modules. The latter contains secure transmission, privacy protection and access control modules. Analyses indicate that user adoption of HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption.
Chapter PDF
Similar content being viewed by others
Keywords
References
McKelvey, V.: Spending More on In-Home Care (2010), http://www.aarp.org/relationships/caregiving/info-01-2010/spending-more-on-in-home-care.html
Häyrinen, K., Saranto, K., Nykänen, P.: Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics 77(5), 291–304 (2008)
Poissant, L., et al.: The Impact of Electronic Health Records on Time Efficiency of Physicians and Nurses: A Systematic Review. Journal of the American Medical Informatics Association 12(5), 505–516 (2005)
Williams, F., Boren, S.A.: The role of electronic medical record in care delivery in developing countries. International Journal of Information Management 28(6), 503–507 (2008)
Vishwanath, A., Singh, S.R., Winkelstein, P.: The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects. International Journal of Medical Informatics 79(11), 778–791 (2010)
Sokratis, K.: Health care management and information systems security: awareness, training or education. International Journal of Medical Informatics 60(2), 129–135 (2000)
Shin, D.: Understanding purchasing behaviors in virtual economy: Consumer behavior of virtual currency in Web2.0 communities. Interacting with Computers 20(4), 433–446 (2008)
Venkatesh, V., et al.: User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425–478 (2003)
Zhou, T., Lu, Y., Wang, B.: Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior 26(4), 760–767 (2010)
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13(3), 319–339 (1989)
Pai, J.C., Tu, F.M.: The acceptance and use of customer relationship management (CRM) systems: An empirical study of distribution service industry in Taiwan. Expert Systems with Applications 38(1), 579–584 (2011)
Premkumar, G., Bhattacherjee, A.: Explaining information technology usage: a test of competing models. Omega: International Journal of Management Science 36, 64–75 (2008)
Park, C.W., Lessing, V.P.: Students and housewives: differences in susceptibility to reference group influence. Journal of Consumer Research 4(2), 102–110 (1977)
Karahanna, E., Straub, D.W., Chervany, N.L.: Information technology adoption across time: across-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly 23(2), 183–213 (1999)
Lewis, W., Agarwal, R., Sambamurthy, V.: Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly 27(4), 657–678 (2003)
Taylor, S., Todd, P.A.: Understanding information technology usage: A test of competing models. Information Systems Research 6(2), 144–176 (1995)
Corey, M.A., Agarwal, R.: Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuation. MIS Quarterly 33(2), 339–370 (2009)
Dewan, S., Chen, L.: Mobile payment adoption in the US: A cross-industry cross-platform solution. Journal of Information Privacy and Security 1(2), 4–28 (2005)
Lwin, M., Wirtz, J., Williams, J.D.: Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science 35(4), 572–585 (2007)
Shin, D.: Towards an understanding of the consumer acceptance of mobile wallet. Computers in Human Behavior 25(6), 1343–1354 (2009)
Wilson, M., Stine, K., Bowen, P.: National Institute of Standards and Technology (NIST) Special Publication 800-16: “Information Technology Security Training Requirements: A Role- and Performance-Based Model (Draft)” (2009), http://csrc.nist.gov/publications/drafts/800-16-rev1/Draft-SP800-16-Rev1.pdf
Lin, I.L., Liu, M.D.: An Investigation of High School Teachers’ Cyber Security Literacy in Taiwan. In: Taiwan Academic Network Conference (TANET 2007) (2007)
ISO/IEC-9798-3, Information technology—Security techniques—Entity authentication mechanisms; Part 3; Entity authentication using a public key algorithm in International Organization for Standardization (1993)
Ming, Y., Shen, X., Peng, Y.: Identity-Based Sanitizable Signature Scheme in the Standard Model. Communications in Computer and Information Science 105, 9–16 (2010)
Ferraiolo, D.F., Kuhn, D.R.: Role Based Access Control. In: 15th National Computer Security Conference, pp. 554–563 (1992)
Nunnally, J.C.: Psychometric Theory, 2nd edn. McGrawHill, New York (1978)
Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39–50 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hsu, CL., Lee, MR. (2013). User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy. In: Stephanidis, C., Antona, M. (eds) Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life. UAHCI 2013. Lecture Notes in Computer Science, vol 8011. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39194-1_53
Download citation
DOI: https://doi.org/10.1007/978-3-642-39194-1_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39193-4
Online ISBN: 978-3-642-39194-1
eBook Packages: Computer ScienceComputer Science (R0)