메뉴 건너뛰기




Volumn 37, Issue 5, 2013, Pages

The role of privacy protection in healthcare information systems adoption

Author keywords

Healthcare information system; Information security literacy; Perceived security; Privacy protection; UTAUT

Indexed keywords

ARTICLE; COMPUTER SECURITY; CONFIDENTIALITY; CONVERGENT VALIDITY; DISCRIMINANT VALIDITY; ELECTRONIC DATA INTERCHANGE; ELECTRONIC MEDICAL RECORD; HEALTH CARE MANAGEMENT; HEALTH CARE SYSTEM; HEALTH INSURANCE; HEALTHCARE INFORMATION SYSTEM; HUMAN; HYPOTHESIS; KNOWLEDGE BASE; MEDICAL INFORMATION SYSTEM; PATIENT INFORMATION; PERCEPTION; PRIVACY; PRIVACY PROTECTION; BEHAVIOR;

EID: 84883449411     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-013-9966-z     Document Type: Article
Times cited : (44)

References (55)
  • 1
    • 84880754498 scopus 로고    scopus 로고
    • Dec. 30
    • McKelvey, V. "Spending more on in-home care." Dec. 30, 2011; http://www.aarp.org/relationships/caregiving/info-01-2010/spendingmore-on-in- home-care.html.
    • (2011) Spending More on In-Home Care
    • McKelvey, V.1
  • 2
    • 41149088350 scopus 로고    scopus 로고
    • Definition, structure, content, use and impacts of electronic health records: A review of the research literature
    • Häyrinen, K., Saranto, K., and Nykänen, P., Definition, structure, content, use and impacts of electronic health records: A review of the research literature. Int. J. Med. Inform. 77(5):291-304, 2008.
    • (2008) Int. J. Med. Inform. , vol.77 , Issue.5 , pp. 291-304
    • Häyrinen, K.1    Saranto, K.2    Nykänen, P.3
  • 3
    • 24044539547 scopus 로고    scopus 로고
    • The impact of electronic health records on time efficiency of physicians and nurses: A systematic review
    • Poissant, L., Pereira, J., Tamblyn, R., Kawasumi, Y., The impact of electronic health records on time efficiency of physicians and nurses: A systematic review. J. Am. Med. Assoc. 12(5):505-516, 2005.
    • (2005) J. Am. Med. Assoc , vol.12 , Issue.5 , pp. 505-516
    • Poissant, L.1    Pereira, J.2    Tamblyn, R.3    Kawasumi, Y.4
  • 4
    • 54949088198 scopus 로고    scopus 로고
    • The role of electronic medical record in care delivery in developing countries
    • Williams, F., and Boren, S. A., The role of electronic medical record in care delivery in developing countries. Int. J. Inf. Manag. 28(6):503-507, 2008.
    • (2008) Int. J. Inf. Manag. , vol.28 , Issue.6 , pp. 503-507
    • Williams, F.1    Boren, S.A.2
  • 5
    • 78049311663 scopus 로고    scopus 로고
    • The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects
    • Vishwanath, A., Singh, S. R., and Winkelstein, P., The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects. Int. J. Med. Inform. 79(11):778-791, 2010.
    • (2010) Int. J. Med. Inform. , vol.79 , Issue.11 , pp. 778-791
    • Vishwanath, A.1    Singh, S.R.2    Winkelstein, P.3
  • 6
    • 0034316957 scopus 로고    scopus 로고
    • Health care management and information systems security: Awareness, training or education?
    • Sokratis, K., Health care management and information systems security: Awareness, training or education? Int. J. Med. Inform. 60(2):129-135, 2000.
    • (2000) Int. J. Med. Inform. , vol.60 , Issue.2 , pp. 129-135
    • Sokratis, K.1
  • 7
    • 84856584399 scopus 로고    scopus 로고
    • Impact of health disclosure laws on health information exchanges
    • Adjerid, I., and Padman, R., Impact of health disclosure laws on health information exchanges. AMIA Annu. Symp. Proc. 2011:48-56, 2011.
    • (2011) AMIA Annu. Symp. Proc. , vol.2011 , pp. 48-56
    • Adjerid, I.1    Padman, R.2
  • 8
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • Al Ameen, M., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1):93-101, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.1 , pp. 93-101
    • Al Ameen, M.1    Liu, J.2    Kwak, K.3
  • 9
    • 78751705912 scopus 로고    scopus 로고
    • Aspects of privacy for electronic health records
    • Haas, S., Wohlgemuth, S., Echizen, I., et al., Aspects of privacy for electronic health records. Int. J. Med. Inform. 80(2):e26-e31, 2011.
    • (2011) Int. J. Med. Inform. , vol.80 , Issue.2
    • Haas, S.1    Wohlgemuth, S.2    Echizen, I.3
  • 10
    • 84865238396 scopus 로고    scopus 로고
    • Impact of hipaa provisions on the stock market value of healthcare institutions, and information security and other information technology firms
    • Khansa, L., Cook, D. F., James, T., et al., Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Comput. Secur. 31(6):750-770, 2012.
    • (2012) Comput. Secur. , vol.31 , Issue.6 , pp. 750-770
    • Khansa, L.1    Cook, D.F.2    James, T.3
  • 11
    • 79960507876 scopus 로고    scopus 로고
    • A novel key management solution for reinforcing compliance with hipaa privacy/security regulations
    • Lee, C. D., Ho, K. I. J., and Lee, W. B., A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 15(4):550-556, 2011.
    • (2011) IEEE Trans. Inf. Technol. Biomed. , vol.15 , Issue.4 , pp. 550-556
    • Lee, C.D.1    Ho, K.I.J.2    Lee, W.B.3
  • 12
    • 84863552500 scopus 로고    scopus 로고
    • Strategies formaintaining patient privacy in i2b2
    • Murphy, S.N., Gainer, V., Mendis,M., et al., Strategies formaintaining patient privacy in i2b2. J. Am. Med. Assoc. 18(SUPPL. 1):103-108, 2011.
    • (2011) J. Am. Med. Assoc. , vol.18 , Issue.SUPPL. 1 , pp. 103-108
    • Murphy, S.N.1    Gainer, V.2    Mendis, M.3
  • 13
    • 84877107710 scopus 로고    scopus 로고
    • Security requirements for themedical information used by u-healthcare medical equipment
    • Son, J.,Kim, S., Park, G., et al., Security requirements for themedical information used by U-Healthcare medical equipment. Int. J. Secur. Appl. 7(1):169-180, 2013.
    • (2013) Int. J. Secur. Appl. , vol.7 , Issue.1 , pp. 169-180
    • Son, J.1    Kim, S.2    Park, G.3
  • 14
    • 84876521582 scopus 로고    scopus 로고
    • Privacy and security solutions for interoperable health information exchange
    • Sunil Kumar, C., Samy Durai, A., and Vinotha, S. R., Privacy and security solutions for interoperable health information exchange. Int. J. Med. Eng. Inform. 5(2):137-144, 2013.
    • (2013) Int. J. Med. Eng. Inform. , vol.5 , Issue.2 , pp. 137-144
    • Sunil Kumar, C.1    Samy Durai, A.2    Vinotha, S.R.3
  • 16
    • 80055093994 scopus 로고    scopus 로고
    • Sensor network security for pervasive e-health
    • Garcia-Morchon, O., Falck, T., and Wehrle, K., Sensor network security for pervasive e-health. Sec Commun. Networks 4(11):1257-1273, 2011.
    • (2011) Sec Commun. Networks , vol.4 , Issue.11 , pp. 1257-1273
    • Garcia-Morchon, O.1    Falck, T.2    Wehrle, K.3
  • 17
    • 84867301818 scopus 로고    scopus 로고
    • A privacy-strengthened scheme for e-healthcare monitoring system
    • Huang, C., Lee, H., and Lee, D. H., A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5):2959-2971, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.5 , pp. 2959-2971
    • Huang, C.1    Lee, H.2    Lee, D.H.3
  • 18
    • 84872483621 scopus 로고    scopus 로고
    • On the security of a dynamic id-based authentication scheme for telecare medical information systems
    • Lin, H. Y., "On the security of a dynamic ID-based authentication scheme for telecare medical information systems," J. Med. Syst., vol. 37, no. 2, 2013.
    • (2013) J. Med. Syst. , vol.37 , pp. 2
    • Lin, H.Y.1
  • 19
    • 84864952425 scopus 로고    scopus 로고
    • Secure remote health monitoring with unreliable mobile devices
    • Shin, M., "Secure remote health monitoring with unreliable mobile devices," Journal of Biomedicine and Biotechnology, vol. 2012, 2012.
    • (2012) Journal of Biomedicine and Biotechnology , vol.2012
    • Shin, M.1
  • 20
    • 79952064844 scopus 로고    scopus 로고
    • Securing access to healthcare
    • Ting, D., Securing access to healthcare. Biom. Technol. Today 2011(2):10-11, 2011.
    • (2011) Biom. Technol. Today , vol.2011 , Issue.2 , pp. 10-11
    • Ting, D.1
  • 21
    • 84868158297 scopus 로고    scopus 로고
    • Secure electronic healthcare records management in wireless environments
    • Belsis, P., Skourlas, C., and Gritzalis, S., Secure electronic healthcare records management in wireless environments. J. Inform. Technol. Res. 4(4):1-17, 2011.
    • (2011) J. Inform. Technol. Res. , vol.4 , Issue.4 , pp. 1-17
    • Belsis, P.1    Skourlas, C.2    Gritzalis, S.3
  • 22
    • 79952466879 scopus 로고    scopus 로고
    • Privilege management infrastructure for virtual organizations in healthcare grids
    • Calvillo, J., Román, I., Rivas, S., et al., Privilege management infrastructure for virtual organizations in healthcare grids. IEEE Trans. Inf. Technol. Biomed. 15(2):316-323, 2011.
    • (2011) IEEE Trans. Inf. Technol. Biomed. , vol.15 , Issue.2 , pp. 316-323
    • Calvillo, J.1    Román, I.2    Rivas, S.3
  • 23
    • 80053461711 scopus 로고    scopus 로고
    • Experience-based access management: A life-cycle framework for identity and access management systems
    • Gunter, C., Liebovitz, D., and Malin, B., Experience-based access management: A life-cycle framework for identity and access management systems. IEEE Secur. Priv. 9(5):48-55, 2011.
    • (2011) IEEE Secur. Priv. , vol.9 , Issue.5 , pp. 48-55
    • Gunter, C.1    Liebovitz, D.2    Malin, B.3
  • 24
    • 79951680016 scopus 로고    scopus 로고
    • Patient-centric authorization framework for electronic healthcare services
    • Jin, J., Ahn, G. J., Hu, H., et al., Patient-centric authorization framework for electronic healthcare services. Comput. Secur. 30(2-3):116-127, 2011.
    • (2011) Comput. Secur. , vol.30 , Issue.2-3 , pp. 116-127
    • Jin, J.1    Ahn, G.J.2    Hu, H.3
  • 25
    • 84870552425 scopus 로고    scopus 로고
    • Purpose based access control for privacy protection in e-healthcare services
    • Sun, L., Wang, H., Soar, J., et al., Purpose based access control for privacy protection in E-Healthcare services. J. Softw. 7(11):2443-2449, 2012.
    • (2012) J. Softw. , vol.7 , Issue.11 , pp. 2443-2449
    • Sun, L.1    Wang, H.2    Soar, J.3
  • 26
    • 84876796310 scopus 로고    scopus 로고
    • U-healthcare system: State-of-The-Art review and challenges,"
    • Touati, F., and Tabish, R., "U-healthcare system: State-of-The-Art review and challenges," J. Med. Syst., vol. 37, no. 3, 2013.
    • (2013) J. Med. Syst. , vol.37 , pp. 3
    • Touati, F.1    Tabish, R.2
  • 27
    • 84871908002 scopus 로고    scopus 로고
    • Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations
    • Ge, Y., Ahn, D. K., Unde, B., et al., Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations. J. Am. Med. Assoc. 20(1):157-163, 2013.
    • (2013) J. Am. Med. Assoc. , vol.20 , Issue.1 , pp. 157-163
    • Ge, Y.1    Ahn, D.K.2    Unde, B.3
  • 28
    • 84869457294 scopus 로고    scopus 로고
    • Personal health records: New means to safely handle health data?
    • Semor, I. C., Alemán, J. L. F., and Toval, A., Personal health records: New means to safely handle health data? Computer 45(11):27-33, 2012.
    • (2012) Computer , vol.45 , Issue.11 , pp. 27-33
    • Semor, I.C.1    Alemán, J.L.F.2    Toval, A.3
  • 29
    • 84874392848 scopus 로고    scopus 로고
    • Behavior-based access control for distributed healthcare systems
    • Yarmand, M. H., Sartipi, K., and Down, D. G., Behavior-based access control for distributed healthcare systems. J. Comput. Secur. 21(1):1-39, 2013.
    • (2013) J. Comput. Secur , vol.21 , Issue.1 , pp. 1-39
    • Yarmand, M.H.1    Sartipi, K.2    Down, D.G.3
  • 30
    • 79954599450 scopus 로고    scopus 로고
    • Personal health records: Consumer attitudes toward privacy and security of their personal health information
    • Beranek Lafky, D., and Horan, T. A., Personal health records: Consumer attitudes toward privacy and security of their personal health information. Health Inform. J. 17(1):63-71, 2011.
    • (2011) Health Inform. J. , vol.17 , Issue.1 , pp. 63-71
    • Beranek Lafky, D.1    Horan, T.A.2
  • 31
    • 53149096568 scopus 로고    scopus 로고
    • Understanding purchasing behaviors in virtual economy: Consumer behavior of virtual currency in web2.0 communities
    • Shin, D., Understanding purchasing behaviors in virtual economy: Consumer behavior of virtual currency in Web2.0 communities. Interact. Comput. 20(4):433-446, 2008.
    • (2008) Interact. Comput. , vol.20 , Issue.4 , pp. 433-446
    • Shin, D.1
  • 32
    • 84877778249 scopus 로고    scopus 로고
    • A pre-control systemto edit contents with an extended sanitizable signature
    • Inamura,M., Saito, A., and Iwamura, K., A pre-control systemto edit contents with an extended sanitizable signature. IEEJ Trans. Electron. Inf. Syst. 133(4):802-815, 2013.
    • (2013) IEEJ Trans. Electron. Inf. Syst , vol.133 , Issue.4 , pp. 802-815
    • Inamura, M.1    Saito, A.2    Iwamura, K.3
  • 33
    • 80053495106 scopus 로고    scopus 로고
    • Provably security identity-based sanitizable signature scheme without random oracles
    • Ming, Y., Shen, X., and Peng, Y., Provably security identity-based sanitizable signature scheme without random oracles. J. Softw. 6(10):1890-1897, 2011.
    • (2011) J. Softw. , vol.6 , Issue.10 , pp. 1890-1897
    • Ming, Y.1    Shen, X.2    Peng, Y.3
  • 35
    • 84890069861 scopus 로고
    • Information technology-security techniques-entity authentication mechanisms; part 3; entity authentication using a public key algorithm
    • ISO/IEC-9798-3
    • ISO/IEC-9798-3, "Information technology-Security techniques-Entity authentication mechanisms; Part 3; Entity authentication using a public key algorithm " International Organization for Standardization, 1-9, 1993.
    • (1993) International Organization for Standardization , pp. 1-9
  • 36
    • 78649395496 scopus 로고    scopus 로고
    • Identity-based sanitizable signature scheme in the standard model
    • Ming, Y., Shen, X., and Peng, Y., Identity-based sanitizable signature scheme in the standard model. Commun. Comput. Inf. Science 105 (Part 1):9-16, 2010.
    • (2010) Commun. Comput. Inf. Science , vol.105 , Issue.PART 1 , pp. 9-16
    • Ming, Y.1    Shen, X.2    Peng, Y.3
  • 38
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V.,Morris,M. G., Davis, G. B., et al., User acceptance of information technology: Toward a unified view. MIS Q. 27(3):425-478, 2003.
    • (2003) MIS Q. , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3
  • 39
    • 77955228405 scopus 로고    scopus 로고
    • Integrating ttf and utaut to explain mobile banking user adoption
    • Zhou, T., Lu, Y., and Wang, B., Integrating TTF and UTAUT to explain mobile banking user adoption. Comput. Hum. Behav. 26(4):760-767, 2010.
    • (2010) Comput. Hum. Behav , vol.26 , Issue.4 , pp. 760-767
    • Zhou, T.1    Lu, Y.2    Wang, B.3
  • 40
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F. D., Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3):319-339, 1989.
    • (1989) MIS Q. , vol.13 , Issue.3 , pp. 319-339
    • Davis, F.D.1
  • 41
    • 77956617049 scopus 로고    scopus 로고
    • The acceptance and use of customer relationship management (crm) systems: An empirical study of distribution service industry in taiwan
    • Pai, J.-C., and Tu, F.-M., The acceptance and use of customer relationship management (CRM) systems: An empirical study of distribution service industry in Taiwan. Expert Syst. Appl. 38(1):579-584, 2011.
    • (2011) Expert Syst. Appl , vol.38 , Issue.1 , pp. 579-584
    • Pai, J.-C.1    Tu, F.-M.2
  • 42
    • 34247352463 scopus 로고    scopus 로고
    • Explaining information technology usage: A test of competing models
    • Premkumar, G., and Bhattacherjee, A., Explaining information technology usage: A test of competing models. OMEGA Int. J. Manag. Sci. 36:64-75, 2008.
    • (2008) OMEGA Int. J. Manag. Sci. , vol.36 , pp. 64-75
    • Premkumar, G.1    Bhattacherjee, A.2
  • 43
    • 84907076915 scopus 로고
    • Students and housewives:differences in susceptibility to reference group influence
    • Park, C.W., and Lessing, V. P., Students and housewives:Differences in susceptibility to reference group influence. J. Consum. Res. 4(2):102-110, 1977.
    • (1977) J. Consum. Res , vol.4 , Issue.2 , pp. 102-110
    • Park, C.W.1    Lessing, V.P.2
  • 44
    • 0001094004 scopus 로고    scopus 로고
    • Information technology adoption across time: Across-sectional comparison of pre-Adoption and post-Adoption beliefs
    • Karahanna, E., Straub, D. W., and Chervany, N. L., Information technology adoption across time: Across-sectional comparison of pre-Adoption and post-Adoption beliefs. MIS Q. 23(2):183-213, 1999.
    • (1999) MIS Q. , vol.23 , Issue.2 , pp. 183-213
    • Karahanna, E.1    Straub, D.W.2    Chervany, N.L.3
  • 45
    • 9744226442 scopus 로고    scopus 로고
    • Sources of influence on beliefs about information technology use: An empirical study of knowledge workers
    • Lewis, W., Agarwal, R., and Sambamurthy, V., Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Q. 27(4):657-678, 2003.
    • (2003) MIS Q. , vol.27 , Issue.4 , pp. 657-678
    • Lewis, W.1    Agarwal, R.2    Sambamurthy, V.3
  • 46
    • 73549120882 scopus 로고
    • Understanding information technology usage: A test of competing models
    • Taylor, S., and Todd, P. A., Understanding information technology usage: A test of competing models. Inf. Syst. Res. 6(2):144-176, 1995.
    • (1995) Inf. Syst. Res. , vol.6 , Issue.2 , pp. 144-176
    • Taylor, S.1    Todd, P.A.2
  • 47
    • 66449136652 scopus 로고    scopus 로고
    • Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuation
    • Corey,M. A., and Agarwal, R., Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuation. MIS Q. 33(2):339-370, 2009.
    • (2009) MIS Q. , vol.33 , Issue.2 , pp. 339-370
    • Corey, M.A.1    Agarwal, R.2
  • 48
    • 36049013776 scopus 로고    scopus 로고
    • Mobile payment adoption in the us: Acrossindustry cross-platform solution
    • Dewan, S., and Chen, L.,Mobile payment adoption in the US: Acrossindustry cross-platform solution. J. Inf. Priv. Secur. 1(2):4-28, 2005.
    • (2005) J. Inf. Priv. Secur. , vol.1 , Issue.2 , pp. 4-28
    • Dewan, S.1    Chen, L.2
  • 49
    • 84991310025 scopus 로고    scopus 로고
    • Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective
    • Lwin, M., Wirtz, J., and Williams, J. D., Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective. J. Acad. Mark. Sci. 35(4):572-585, 2007.
    • (2007) J. Acad. Mark. Sci. , vol.35 , Issue.4 , pp. 572-585
    • Lwin, M.1    Wirtz, J.2    Williams, J.D.3
  • 50
    • 69549091696 scopus 로고    scopus 로고
    • Towards an understanding of the consumer acceptance of mobile wallet
    • Shin, D., Towards an understanding of the consumer acceptance of mobile wallet. Comput. Hum. Behav. 25(6):1343-1354, 2009.
    • (2009) Comput. Hum. Behav. , vol.25 , Issue.6 , pp. 1343-1354
    • Shin, D.1
  • 52
    • 84892591605 scopus 로고    scopus 로고
    • An investigation of high school teachers' cyber security literacy in taiwan
    • Taipei, Taiwan
    • Lin, I. L., and Liu,M. D., "An investigation of high school teachers' cyber security literacy in Taiwan," in Taiwan Academic Network Conference (TANET 2007), Taipei, Taiwan, 2007.
    • (2007) Taiwan Academic Network Conference (TANET 2007
    • Lin, I.L.1    Liu, M.D.2
  • 53
    • 84859888115 scopus 로고    scopus 로고
    • Understanding consumer 2acceptance of mobile payment services: An empirical analysis
    • Schierz, P. G., Schilke, O., andWirtz, B.W., Understanding consumer 2acceptance of mobile payment services: An empirical analysis. Electron. Commer. Res. Appl. 9(3):209-216, 2010.
    • (2010) Electron. Commer. Res. Appl. , vol.9 , Issue.3 , pp. 209-216
    • Schierz, P.G.1    Schilke, O.2    Wirtz, B.W.3
  • 55
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., and Larcker, D. F., Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1):39-50, 1981.
    • (1981) J. Mark. Res. , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.