An insight into the adoption of accountable-eHealth systems: n empirical research model based on the Australian context
暂无分享,去创建一个
[1] Peter R. Croll,et al. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling , 2011, Int. J. Medical Informatics.
[2] Magid Igbaria,et al. The effects of self-efficacy on computer usage , 1995 .
[3] Chao-Min Chiu,et al. Internet self-efficacy and electronic service acceptance , 2004, Decis. Support Syst..
[4] Richard D. Johnson,et al. The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research , 1998, Inf. Syst. Res..
[5] Martin Wetzels,et al. A meta-analysis of the technology acceptance model: Investigating subjective norm and moderation effects , 2007, Inf. Manag..
[6] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[7] Fred D. Davis,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .
[8] Colin J. Fidge,et al. Access Control Requirements for Processing Electronic Health Records , 2007, Business Process Management Workshops.
[9] Magid Igbaria,et al. Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model , 1997, MIS Q..
[10] Graham Pervan,et al. ICT and OTs: A model of information and communication technology acceptance and utilisation by occupational therapists , 2007, Int. J. Medical Informatics.
[11] Frank Holloway. Confidentiality: threats and limits , 2004 .
[12] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[13] Renato Iannella,et al. Accountable-eHealth Systems: The Next Step Forward for Privacy , 2012 .
[14] I. Ajzen. The theory of planned behavior , 1991 .
[15] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[16] Brecht Claerhout,et al. Privacy protection for clinical and genomic data: The use of privacy-enhancing techniques in medicine , 2005, Int. J. Medical Informatics.
[17] Eric W. K. Tsang. Acquiring Knowledge by Foreign Partners from International Joint Ventures in a Transition Economy: Learning-by-Doing and Learning Myopia , 2002 .
[18] Sonja Wiley-Patton,et al. Does the extended technology acceptance model apply to physicians , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[19] Paul Jen-Hwa Hu,et al. Investigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories , 2002, Inf. Manag..
[20] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[21] Rohan Jayasuriya,et al. Determinants of microcomputer technology use: implications for education and training of health staff , 1998, Int. J. Medical Informatics.
[22] Michael R. Simonson,et al. Development of a Standardized Test of Computer Literacy and a Computer Anxiety Index , 1987 .
[23] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[24] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[25] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[26] Heshan Sun,et al. The role of moderating factors in user technology acceptance , 2006, Int. J. Hum. Comput. Stud..
[27] R. Heinssen,et al. Assessing computer anxiety: Development and validation of the Computer Anxiety Rating Scale , 1987 .
[28] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[29] Mark E. McMurtrey,et al. Introducing task-based general computer self-efficacy: An empirical comparison of three general self-efficacy instruments , 2007, Interact. Comput..
[30] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[31] E. Rogers. Diffusion of Innovations , 1962 .
[32] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[33] Deborah Compeau,et al. Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..
[34] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..