Overcoming Personal Barriers to Adoption When Technology Enables Information to Be Available to Others

Electronic health records constitute a significant technological advance in the way medical information is stored, communicated, and processed by the multiple parties involved in the delivery of health care. However, there is widespread concern that privacy issues may impede the diffusion of this technology. In this study, we integrate the Concern For Information Privacy (CFIP) construct with the Elaboration Likelihood Model (ELM) to examine attitude persuasion regarding the use of EHRs when concerns about privacy of information are present in patients. We draw from attitude and attitude persuasion literatures to develop our hypotheses that individuals can be persuaded to support the use of EHRs, even in the presence of significant privacy concerns, if appropriate messages about the value of EHRs are imparted to the recipient. Using a novel experimental methodology, we randomly assign two different types of respondents(high and low involvement) to two different treatments (strong and weak argument quality) and assess the impact of CFIP on the relationship between these variables and attitude change. We find that an individual's CFIP interacts with argument quality and issue involvement to affect attitudes toward the use of EHRs (three-way interaction term is significant (F(7,329)=5.63, p

[1]  H. Simon,et al.  Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .

[2]  J. Cacioppo,et al.  Personal involvement as a determinant of argument based persuasion , 1981 .

[3]  Izak Benbasat,et al.  Trust-Related Arguments in Internet Stores: A Framework for Evaluation , 2003, J. Electron. Commer. Res..

[4]  J. Cacioppo,et al.  Issue involvement can increase or decrease persuasion by enhancing message-relevant cognitive responses. , 1979 .

[5]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[6]  S. Chaiken,et al.  Audience response as a heuristic cue in persuasion. , 1987, Journal of personality and social psychology.

[7]  Blair T. Johnson,et al.  Effects of involvement on persuasion: a meta-analysis , 1989 .

[8]  Francis J. Di Vesta,et al.  A developmental study of the semantic structures of children , 1966 .

[9]  Leandre R. Fabrigar,et al.  Conceptual and Methodological Issues in the Elaboration Likelihood Model of Persuasion: A Reply to the Michigan State Critics , 1993 .

[10]  K. Stamm,et al.  The Relationship of Attitudinal Components to Trust in Media , 1994 .

[11]  S. Chaiken,et al.  Communication modality as a determinant of message persuasiveness and message comprehensibility. , 1976 .

[12]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[13]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[14]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[15]  John T. Cacioppo,et al.  Involvement and Persuasion: Tradition Versus Integration , 1990 .

[16]  Laura J Gurak,et al.  Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace and the Clipper Chip , 1997 .

[17]  J. Cacioppo,et al.  Attitudes and Persuasion: Classic and Contemporary Approaches , 1981 .

[18]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[19]  W. No,et al.  Internet Privacy Research: Framework, Review and Opportunities , 2006 .

[20]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[21]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[22]  Amy Butros,et al.  Research Paper: Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience , 2002, J. Am. Medical Informatics Assoc..

[23]  H. Triandis Attitude and attitude change , 1971 .

[24]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[25]  C. Jack Friedman,et al.  Objective Measurement of Social Role Concepts via the Semantic Differential , 1964 .

[26]  T. Bodenheimer,et al.  Electronic technology: a spark to revitalize primary care? , 2003, JAMA.

[27]  E. Berscheid,et al.  Privacy: A hidden variable in experimental social psychology. , 1977 .

[28]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[29]  Andrzej Zybertowicz,et al.  Conceptual and Methodological Issues , 2000 .

[30]  J D Cantor,et al.  msJAMA. Privacy protections for cybercharts: an update on the law. , 2001, JAMA.

[31]  T. Graeff,et al.  Collecting and using personal data: consumers’ awareness and concerns , 2002 .

[32]  John T. Cacioppo,et al.  The Elaboration Likelihood Model of Persuasion , 1986, Advances in Experimental Social Psychology.

[33]  T. Millon,et al.  Personality and social psychology , 2003 .

[34]  Stephanie Watts,et al.  Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption , 2003, Inf. Syst. Res..

[35]  W. Crano,et al.  Attitudes and persuasion. , 2006, Annual review of psychology.

[36]  J. N. Bassili Meta-judgmental versus operative indexes of psychological attributes: The case of measures of attitude strength. , 1996 .

[37]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[38]  J. Cacioppo,et al.  Source factors and the elaboration likelihood model of persuasion , 1984 .

[39]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[40]  Duane T. Wegener,et al.  The elaboration likelihood model: Current status and controversies. , 1999 .

[41]  K. Sheehan,et al.  Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns , 1999 .

[42]  R. Petty Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .

[43]  P. Corey,et al.  Incidence of Adverse Drug Reactions in Hospitalized Patients , 2012 .

[44]  J. W. DeCew,et al.  Uneasy Access: Privacy for Women in a Free Society , 1988 .

[45]  E. Rogers Diffusion of Innovations , 1962 .

[46]  Ronald M. Lee,et al.  A logic programming framework for planning and simulation , 1986 .

[47]  R. Apsler,et al.  Warning, personal involvement, and attitude change. , 1968, Journal of personality and social psychology.

[48]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[49]  S. Alpert,et al.  Protecting Medical Privacy: Challenges in the Age of Genetic Information , 2003 .

[50]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[51]  Anol Bhattacherjee,et al.  Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..

[52]  E H Shortliffe,et al.  The evolution of electronic medical records. , 1999, Academic medicine : journal of the Association of American Medical Colleges.

[53]  J. Krosnick,et al.  The causes and consequences of attitude importance. , 1995 .

[54]  John T. Cacioppo,et al.  The effects of a salient self-schema on the evaluation of proattitudinal editorials: Top-down versus bottom-up message processing , 1982 .

[55]  P. K. Kannan,et al.  The customer economics of internet privacy , 2002 .

[56]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[57]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[58]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[59]  J. Cacioppo,et al.  Central and Peripheral Routes to Advertising Effectiveness: The Moderating Role of Involvement , 1983 .

[60]  Franziska Marquart,et al.  Communication and persuasion : central and peripheral routes to attitude change , 1988 .

[61]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[62]  Martin Fishbein,et al.  Acceptance yielding and impact: cognitive processes in persuasion. , 1981 .

[63]  R. E. Burnkrant,et al.  Effects of the use of introductory rhetorical questions versus statements on information processing. , 1984 .

[64]  J. Cacioppo,et al.  The Effects of Involvement on Responses to Argument Quantity and Quality: Central and Peripheral Routes to Persuasion , 1984 .

[65]  Shuk Ying Ho,et al.  Web Personalization as a Persuasion Strategy: An Elaboration Likelihood Model Perspective , 2005, Inf. Syst. Res..

[66]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[67]  Barbara L. Gross,et al.  What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies , 2003 .

[68]  Paul L. Sauer,et al.  The combined influence hypothesis: Central and peripheral antecedents of attitude toward the ad , 1995 .