The Role of Privacy Protection in Healthcare Information Systems Adoption

Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users’ privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

[1]  Chien-Ding Lee,et al.  A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations , 2011, IEEE Transactions on Information Technology in Biomedicine.

[2]  Long Nguyen,et al.  ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer , 2010 .

[3]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[4]  Akira Saito,et al.  拡張墨塗り署名を用いたコンテンツ編集事前制御システム;拡張墨塗り署名を用いたコンテンツ編集事前制御システム;A Pre-Control System to Edit Contents with an Extended Sanitizable Signature , 2013 .

[5]  Lei-da Chen,et al.  Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution , 2005 .

[6]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[7]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[8]  Arun Vishwanath,et al.  The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects , 2010, Int. J. Medical Informatics.

[9]  Klaus Wehrle,et al.  Sensor network security for pervasive e-health , 2011, Secur. Commun. Networks.

[10]  José Luis Fernández Alemán,et al.  Personal Health Records: New Means to Safely Handle Health Data? , 2012, Computer.

[11]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[12]  Carl A. Gunter,et al.  Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems , 2011, IEEE Security & Privacy.

[13]  Sokratis K. Katsikas Health care management and information systems security: awareness, training or education? , 2000, Int. J. Medical Informatics.

[14]  Dong Hoon Lee,et al.  A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.

[15]  Kaija Saranto,et al.  Definition, structure, content, use and impacts of electronic health records: A review of the research literature , 2008, Int. J. Medical Informatics.

[16]  Gail-Joon Ahn,et al.  Patient-centric authorization framework for electronic healthcare services , 2011, Comput. Secur..

[17]  C. Whan Park,et al.  Students and Housewives: Differences in Susceptibility to Reference Group Influence , 1977 .

[18]  Jung-Chi Pai,et al.  The acceptance and use of customer relationship management (CRM) systems: An empirical study of distribution service industry in Taiwan , 2011, Expert Syst. Appl..

[19]  Ahmad-Reza Sadeghi,et al.  Securing the Access to Electronic Health Records on Mobile Phones , 2011, BIOSTEC.

[20]  Minho Shin Secure Remote Health Monitoring with Unreliable Mobile Devices , 2012, Journal of biomedicine & biotechnology.

[21]  Pil Joong Lee,et al.  Sanitizable Signatures Reconsidered , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[22]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[23]  Kamran Sartipi,et al.  Behavior-based access control for distributed healthcare systems , 2013 .

[24]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[25]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[26]  Donghee Don Shin Understanding purchasing behaviors in a virtual economy: Consumer behavior involving virtual currency in Web 2.0 communities , 2008 .

[27]  Yang Ming,et al.  Identity-Based Sanitizable Signature Scheme in the Standard Model , 2010, ICICA.

[28]  Vallabh Sambamurthy,et al.  Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..

[29]  Tao Zhou,et al.  Integrating TTF and UTAUT to explain mobile banking user adoption , 2010, Comput. Hum. Behav..

[30]  J. Jeffrey Carr,et al.  Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations , 2013, J. Am. Medical Informatics Assoc..

[31]  Laura M. Roa,et al.  Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids , 2009, IEEE Transactions on Information Technology in Biomedicine.

[32]  Suzanne Austin Boren,et al.  The role of electronic medical record in care delivery in developing countries , 2008, Int. J. Inf. Manag..

[33]  Dong-Hee Shin,et al.  Towards an understanding of the consumer acceptance of mobile wallet , 2009, Comput. Hum. Behav..

[34]  Isaac S. Kohane,et al.  Strategies for maintaining patient privacy in i2b2 , 2011, J. Am. Medical Informatics Assoc..

[35]  David Ting Securing access to healthcare , 2011 .

[36]  Thomas A. Horan,et al.  Personal health records , 2011, Health Informatics J..

[37]  Stefanos Gritzalis,et al.  Secure Electronic Healthcare Records Management in Wireless Environments , 2011, J. Inf. Technol. Res..

[38]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[39]  Farid Touati,et al.  U-Healthcare System: State-of-the-Art Review and Challenges , 2013, Journal of Medical Systems.

[40]  Hua Wang,et al.  Purpose Based Access Control for Privacy Protection in E-Healthcare Services , 2012, J. Softw..

[41]  Lara Khansa,et al.  Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms , 2012, Comput. Secur..

[42]  Han-Yu Lin,et al.  On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.

[43]  Jihun Cha,et al.  Security Requirements for the Medical Information Used by U- Healthcare Medical Equipment , 2013 .

[44]  Jochen Wirtz,et al.  Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective , 2007 .

[45]  Robyn Tamblyn,et al.  Review Paper: The Impact of Electronic Health Records on Time Efficiency of Physicians and Nurses: A Systematic Review , 2005, J. Am. Medical Informatics Assoc..

[46]  Yang Ming,et al.  Provably Security Identity-based Sanitizable Signature Scheme Without Random Oracles , 2011, J. Softw..

[47]  Anol Bhattacherjee,et al.  Explaining information technology usage: A test of competing models☆ , 2008 .

[48]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[49]  Bernd W. Wirtz,et al.  Understanding consumer acceptance of mobile payment services: An empirical analysis , 2010, Electron. Commer. Res. Appl..

[50]  Rema Padman,et al.  Impact of health disclosure laws on health information exchanges. , 2011, AMIA ... Annual Symposium proceedings. AMIA Symposium.

[51]  North Dakota,et al.  Adoption of Electronic Health Records in , 2013 .

[52]  S. R. Vinotha,et al.  Privacy and security solutions for interoperable health information exchange , 2013, Int. J. Medical Eng. Informatics.

[53]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.