Role of Trust in Privacy Assurance and Perceived Disease Severity on Personal Health Information Disclosure

The benefits of digitization of personal health information have been identified in many studies (Anderson and Agarwal 2011; Glaser et al. 2008; Noffsinger and Chin 2000). The studies suggest that such digitization can reduce medical errors and costs, improve patient safety and public health monitoring efficiency, and etc. However, the impact of healthcare privacy breaches on behavioral reactions is not well known although this phenomenon is an important source of healthcare privacy concern. Hence, this study attempts to examine the influence of healthcare privacy breach on health information disclosure, and the moderating role of trust in privacy assurance and perceived disease severity in healthcare privacy invasion context. To achieve these goals, we adopt communication privacy management theory, and privacy calculus. A scenario-based survey method is employed to explore the influence of privacy breaches. Several theoretical contributions and managerial implications are discussed.

[1]  Tao Zhou,et al.  Examining continuous usage of location-based services from the perspective of perceived justice , 2013, Inf. Syst. Frontiers.

[2]  JinKyu Lee,et al.  The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet , 2012, Inf. Syst. Frontiers.

[3]  H. Raghav Rao,et al.  An Exploration of the Impact of Information Privacy Invasion , 2012, ICIS.

[4]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[5]  Ritu Agarwal,et al.  The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..

[6]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[7]  Natasha F. Veltri,et al.  Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[8]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[9]  D. Bates,et al.  Patients’ Attitudes Toward Electronic Health Information Exchange: Qualitative Study , 2009, Journal of medical Internet research.

[10]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[11]  Jie Li,et al.  Factors Influencing the Consumers' Willingness to Buy in E-Commerce , 2009, 2009 International Conference on E-Business and Information System Security.

[12]  John Glaser,et al.  White Paper: Advancing Personalized Health Care through Health Information Technology: An Update from the American Health Information Community's Personalized Health Care Workgroup , 2008, J. Am. Medical Informatics Assoc..

[13]  Keng Siau,et al.  An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns , 2008, J. Assoc. Inf. Syst..

[14]  R. Kush,et al.  Electronic health records, medical research, and the Tower of Babel. , 2008, The New England journal of medicine.

[15]  Joseph A. Cazier,et al.  The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies , 2008, Commun. Assoc. Inf. Syst..

[16]  Sandra Petronio,et al.  Translational Research Endeavors and the Practices of Communication Privacy Management , 2007 .

[17]  M. Dimatteo,et al.  Health Beliefs, Disease Severity, and Patient Adherence: A Meta-Analysis , 2007, Medical care.

[18]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[19]  Miriam J. Metzger Communication Privacy Management in Electronic Commerce , 2007, J. Comput. Mediat. Commun..

[20]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[21]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[22]  Mary Ann Eastlick,et al.  Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment , 2006 .

[23]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[24]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[25]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[26]  David W. Bates,et al.  White Paper: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption , 2006, J. Am. Medical Informatics Assoc..

[27]  W. Chismar,et al.  Online self-disclosure: model for the use of internet-based technologies in collecting sensitive health information , 2006 .

[28]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[29]  Paul A. Pavlou,et al.  Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..

[30]  G. Loewenstein,et al.  Hot-cold empathy gaps and medical decision making. , 2005, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[31]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[32]  James Blustein,et al.  A Personal Information and Knowledge Infrastructure Integrator , 2004, J. Digit. Inf..

[33]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[34]  Joey F. George,et al.  The theory of planned behavior and Internet purchasing , 2004, Internet Res..

[35]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[36]  Marc L. Resnick,et al.  Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features in an Online Web Store , 2003, Int. J. Hum. Comput. Interact..

[37]  P. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003 .

[38]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[39]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[40]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[41]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[42]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[43]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[44]  Christopher K. Hsee,et al.  Risk as Feelings , 2001, Psychological bulletin.

[45]  P. Sztompka Trust: A Sociological Theory , 2000 .

[46]  R Noffsinger,et al.  Improving the delivery of care and reducing healthcare costs with the digitization of information. , 2000, Journal of healthcare information management : JHIM.

[47]  H. Giles,et al.  (Mis)communicating Across Boundaries , 1998 .

[48]  H. Masur,et al.  The impact of disease severity on the informed consent process in clinical research. , 1996, The American journal of medicine.

[49]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[50]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[51]  S. Petronio Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .

[52]  A. Giddens The consequences of modernity , 1990 .

[53]  R. Mason Four ethical issues of the information age , 1986 .

[54]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .