An insight into the adoption of accountable-eHealth systems: n empirical research model based on the Australian context

This paper provides a first look at the acceptance of Accountable-eHealth (AeH) systems–a new genre of eHealth systems designed to manage information privacy concerns that hinder the proliferation of eHealth. The underlying concept of AeH systems is appropriate use of information through after-the-fact accountability for intentional misuse of information by healthcare professionals. An online questionnaire survey was utilised for data collection from three educational institutions in Queensland, Australia. A total of 23 hypotheses relating to 9 constructs were tested using a structural equation modelling technique. The moderation effects on the hypotheses were also tested based on six moderation factors to understand their role on the designed research model. A total of 334 valid responses were received. The cohort consisted of medical, nursing and other health related students studying at various levels in both undergraduate and postgraduate courses. Hypothesis testing provided sufficient data to accept 7 hypotheses. The empirical research model developed was capable of predicting 47.3% of healthcare professionals’ perceived intention to use AeH systems. All six moderation factors showed significant influence on the research model. A validation of this model with a wider survey cohort is recommended as a future study.

[1]  Peter R. Croll,et al.  Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling , 2011, Int. J. Medical Informatics.

[2]  Magid Igbaria,et al.  The effects of self-efficacy on computer usage , 1995 .

[3]  Chao-Min Chiu,et al.  Internet self-efficacy and electronic service acceptance , 2004, Decis. Support Syst..

[4]  Richard D. Johnson,et al.  The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research , 1998, Inf. Syst. Res..

[5]  Martin Wetzels,et al.  A meta-analysis of the technology acceptance model: Investigating subjective norm and moderation effects , 2007, Inf. Manag..

[6]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[7]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .

[8]  Colin J. Fidge,et al.  Access Control Requirements for Processing Electronic Health Records , 2007, Business Process Management Workshops.

[9]  Magid Igbaria,et al.  Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model , 1997, MIS Q..

[10]  Graham Pervan,et al.  ICT and OTs: A model of information and communication technology acceptance and utilisation by occupational therapists , 2007, Int. J. Medical Informatics.

[11]  Frank Holloway Confidentiality: threats and limits , 2004 .

[12]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[13]  Renato Iannella,et al.  Accountable-eHealth Systems: The Next Step Forward for Privacy , 2012 .

[14]  I. Ajzen The theory of planned behavior , 1991 .

[15]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[16]  Brecht Claerhout,et al.  Privacy protection for clinical and genomic data: The use of privacy-enhancing techniques in medicine , 2005, Int. J. Medical Informatics.

[17]  Eric W. K. Tsang Acquiring Knowledge by Foreign Partners from International Joint Ventures in a Transition Economy: Learning-by-Doing and Learning Myopia , 2002 .

[18]  Sonja Wiley-Patton,et al.  Does the extended technology acceptance model apply to physicians , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[19]  Paul Jen-Hwa Hu,et al.  Investigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories , 2002, Inf. Manag..

[20]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[21]  Rohan Jayasuriya,et al.  Determinants of microcomputer technology use: implications for education and training of health staff , 1998, Int. J. Medical Informatics.

[22]  Michael R. Simonson,et al.  Development of a Standardized Test of Computer Literacy and a Computer Anxiety Index , 1987 .

[23]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[24]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[25]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.

[26]  Heshan Sun,et al.  The role of moderating factors in user technology acceptance , 2006, Int. J. Hum. Comput. Stud..

[27]  R. Heinssen,et al.  Assessing computer anxiety: Development and validation of the Computer Anxiety Rating Scale , 1987 .

[28]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[29]  Mark E. McMurtrey,et al.  Introducing task-based general computer self-efficacy: An empirical comparison of three general self-efficacy instruments , 2007, Interact. Comput..

[30]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[31]  E. Rogers Diffusion of Innovations , 1962 .

[32]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[33]  Deborah Compeau,et al.  Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..

[34]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..