Smart services in healthcare: A risk-benefit-analysis of pay-as-you-live services from customer perspective in Germany

The recent boom in wearable technologies generates enormous vital data sets, which are the ideal starting point for new service offers by Big Data Analytics. In a Pay-As-You-Live (PAYL) service, insured track activities, transfer current data on the lifestyles of users, who receive rewards from their insurance companies. The aim of this study is to investigate the readiness of customers to adopt PAYL services using wearable technology by comparing perceived privacy risks and perceived benefits. The research model is developed on a basis of a literature review and expert interviews. By conducting an online survey involving 353 participants, a structural equation modelling approach is used to test the research model. The results show that current privacy risk factors dominate the perceived value of an individual to use PAYL services. Insurance companies, service providers and manufacturers of wearables must therefore primarily work together and offer solutions for greater data security and data protection before focusing on gamification and functional congruence.

[1]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[2]  I. Ajzen The theory of planned behavior , 1991 .

[3]  Donghua Tao,et al.  Intention to Use and Actual Use of Electronic Information Resources: Further Exploring Technology Acceptance Model (TAM) , 2009, AMIA.

[4]  Gülden Turhan,et al.  An assessment towards the acceptance of wearable technology to consumers in Turkey: the application to smart bra and t-shirt products , 2013 .

[5]  Yiwen Gao,et al.  International Journal of Medical Informatics , 2016 .

[6]  Manmeet Mahinderjit Singh,et al.  WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS , 2016 .

[7]  Dong-Hee Shin,et al.  An acceptance model for smart watches: Implications for the adoption of future wearable technology , 2015, Internet Res..

[8]  Jan Marco Leimeister,et al.  Digital services for consumers , 2014, Electron. Mark..

[9]  Yiwen Gao,et al.  An empirical study of wearable technology acceptance in healthcare , 2015, Ind. Manag. Data Syst..

[10]  Sumeet Gupta,et al.  Value-based Adoption of Mobile Internet: An empirical investigation , 2007, Decis. Support Syst..

[11]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[12]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[13]  Anol Bhattacherjee,et al.  Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..

[14]  Hsu-Shih Shih,et al.  A Study of the Acceptance of Wearable Technology for Consumers -An Analytical Network Process Perspective , 2014 .

[15]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[16]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[17]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[18]  Dan J. Kim An Investigation on the New Mobile Service/Technology Adoption , 2005, AMCIS.

[19]  Student Demetra Lupu-Visanescu CONCISE CHARACTERIZATION OF THE EVOLUTION AND BEARINGS OF WORLD-WIDE ECONOMY AND THEIR INFLUENCE OVER THE MOBILITY OF TRADING COMPANIES , 2009 .

[20]  Moez Limayem,et al.  Force of Habit and Information Systems Usage: Theory and Initial Validation , 2003, J. Assoc. Inf. Syst..

[21]  W. Chutimaskul,et al.  Factors influencing the Thai elderly intention to use smartphone for e-Health services , 2012, 2012 IEEE Symposium on Humanities, Science and Engineering Research.

[22]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[23]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[24]  Nadine Guhr,et al.  Mobile Applications and Access to Personal Information: A Discussion of Users' Privacy Concerns , 2013, ICIS.

[25]  Glen Allmendinger,et al.  Four strategies for the age of smart services. , 2005, Harvard business review.

[26]  M. Fishbein A theory of reasoned action: some applications and implications. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[27]  Philipp Mayring Qualitative Inhaltsanalyse : Grundlagen und Techniken , 2003 .

[28]  Keng-Boon Ooi,et al.  What catalyses mobile apps usage intention: an empirical analysis , 2015, Ind. Manag. Data Syst..

[29]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[30]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[31]  Richard Baskerville,et al.  Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..

[32]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[33]  Heshan Sun,et al.  Understanding User Revisions When Using Information Systems Features: Adaptive System Use and Triggers , 2012, MIS Q..

[34]  Munkee Choi,et al.  User acceptance of wearable devices: An extended perspective of perceived value , 2016, Telematics Informatics.

[35]  F. Bookstein,et al.  Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory: , 1982 .

[36]  Narcis Eduard Mitu,et al.  Development Directions Of Services And Products In Insurances , 2007 .

[37]  Nils Urbach,et al.  Quantify-me: Consumer Acceptance of Wearable Self-tracking Devices , 2016, ECIS.

[38]  Nabil Ahmed Sultan,et al.  Reflective thoughts on the potential and challenges of wearable technology for healthcare provision and medical education , 2015, Int. J. Inf. Manag..

[39]  Ananthanarayanan Parasuraman,et al.  An Updated and Streamlined Technology Readiness Index , 2015 .

[40]  Lucy E. Dunne,et al.  A survey of the historical scope and current trends of wearable technology applications , 2016, SEMWEB.

[41]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[42]  W. Peng,et al.  Keep Using My Health Apps: Discover Users' Perception of Health and Fitness Apps with the UTAUT2 Model. , 2015, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[43]  Mary Beth Rosson,et al.  Measuring Mobile Users' Concerns for Information Privacy , 2012, ICIS.

[44]  Ching-Fu Chen Investigating structural relationships between service quality, perceived value, satisfaction, and behavioral intentions for air passengers: Evidence from Taiwan , 2008 .

[45]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[46]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[47]  Fuyuan Xu,et al.  An Empirical Study on Factors Influencing Consumers' Initial Trust in Wearable Commerce , 2016, J. Comput. Inf. Syst..

[48]  Adamantios Diamantopoulos,et al.  Advancing formative measurement models , 2008 .

[49]  Eric McAdams,et al.  Wearable sensor systems: The challenges , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[50]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[51]  Claus-Peter H. Ernst,et al.  The Influence of Privacy Risk on Smartwatch Usage , 2016, AMCIS.

[52]  Rainer Alt,et al.  Electronic Markets on customer-orientation , 2016, Electron. Mark..

[53]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[54]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[55]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[56]  V. Zeithaml Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence: , 1988 .

[57]  Jason Bennett Thatcher,et al.  Conceptualizing models using multidimensional constructs: a review and guidelines for their use , 2012, Eur. J. Inf. Syst..

[58]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[59]  Joseph Wei,et al.  How Wearables Intersect with the Cloud and the Internet of Things : Considerations for the developers of wearables. , 2014, IEEE Consumer Electronics Magazine.

[60]  Straub,et al.  Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .