Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis

Electronic medical record (EMR) is currently a popular topic in e-health. EMR includes the health-related information of patients and forms the main factor of e-health applications. Moreover, EMR contains the legal records that are created in the medical centre and ambulatory environments. These records serve as the data source for electronic health record. Although hospitals utilise the EMR system, healthcare professionals experience difficultly in trusting this system. Studies devoted to EMR acceptance in hospitals are lacking, particularly those on the EMR system in the contexts of privacy and security concerns based on multi-criteria perspective. Thus, the current study proposes a decision support examination framework on how individual, security and privacy determinants influence the acceptance and use of EMR. The proposed framework is based on a multi-criteria perspective derived from healthcare professionals in Malaysia as frame of reference. The framework comprises four phases. The sub-factors of individual, security and privacy determinants were investigated in the two initial phases. Thereafter, the sub-factors were identified with uniform multi-criteria perspective to establish a decision matrix. The decision matrix used individual uniform as basis to cluster the sub-factors and user perspectives. Subsequently, a new ‘multi-criteria decision-making (MCDM) approach’ was adopted. Integrated technique for order of preference by similarity (TOPSIS) and analytic hierarchy process (AHP) were used as bases in employing the MCDM approach to rank each group of factors. K-means clustering was also applied to identify the critical factors in each group. Healthcare professionals in Malaysia were selected as respondents and 100 questionnaires were distributed to those employed in 5 Malaysian public hospitals. A conceptual model adapted from Unified theory of acceptance and use of technology 2 (UTAUT2) was employed to clarify the connection between individual, privacy and security determinants and EMR system acceptance and use in the selected context. After collecting the data sets (363), structural equation modelling was used to analyse data related to EMR acceptance and use. Results are as follows. (1) Five determinants (i.e. data integrity, confidentiality, non-repudiation, facilitating conditions and effort expectancy) exerted an explicit and important positive effect on EMR acceptance and use. (2) Three determinants (i.e. unauthorised, error and secondary use) exerted a direct and significant negative effect on EMR acceptance and use. (3) Three other determinants (i.e. authentication, performance expectancy and habit) insignificantly affected the behavioural intention of healthcare experts in Malaysia to use EMR.

[1]  S. Kurnia,et al.  The Impact of Two-Factor Authentication Technology on the Adoption of Internet Banking , 2010, PACIS.

[2]  B. B. Zaidan,et al.  A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.

[3]  B. B. Zaidan,et al.  An Automated Anti-Pornography System using a Skin Detector Based on Artificial Intelligence: a Review , 2013, Int. J. Pattern Recognit. Artif. Intell..

[4]  David Chan,et al.  Open-source health information technology: A case study of electronic medical records , 2015 .

[5]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[6]  Parand Mansouri-Rad,et al.  Culture Matters: Factors Affecting the Adoption of Telemedicine , 2013, 2013 46th Hawaii International Conference on System Sciences.

[7]  Wan-Tzu Wong,et al.  The Effects of E-Learning System Service Quality and Users' Acceptance on Organizational Learning , 2011 .

[8]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[9]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[10]  B. B. Zaidan,et al.  Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[11]  Abdul Rahman Ahlan,et al.  User Acceptance of Health Information Technology (HIT) in Developing Countries: A Conceptual Model , 2014 .

[12]  B. B. Zaidan,et al.  Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.

[13]  Zhiping Walter,et al.  Physician acceptance of information technologies: Role of perceived threat to professional autonomy , 2008, Decis. Support Syst..

[14]  Napaporn Kripanont,et al.  Using a Technology Acceptance Model to Investigate Academic Acceptance of the Internet , 2014 .

[15]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[16]  B. B. Zaidan,et al.  Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.

[17]  Tiago Oliveira,et al.  Electronic Health Record Portals adoption: Empirical model based on UTAUT2 , 2018, Informatics for health & social care.

[18]  Nor Badrul Anuar,et al.  The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations , 2015, Comput. Methods Programs Biomed..

[19]  Margarita Pavlova,et al.  TVET as an important factor in country’s economic development , 2014, SpringerPlus.

[20]  B. B. Zaidan,et al.  Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.

[21]  Mun Y. Yi,et al.  Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..

[22]  Fazidah Othman,et al.  Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .

[23]  Paul H. P. Yeow,et al.  AIS Electronic , 2022 .

[24]  Susan Hilary Nielsen,et al.  The View from the Trenches: Satisfaction with eHealth systems by a group of health professionals , 2012, ACIS.

[25]  Mijin Noh,et al.  User Acceptance Model of Electronic Medical Record , 2016 .

[26]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[27]  Ahmed Wathik Naji,et al.  Optimizing security and flexibility by designing a high security system for e-government servers , 2009 .

[28]  E. B. Steen,et al.  The Computer-Based Patient Record: An Essential Technology for Health Care , 1992, Annals of Internal Medicine.

[29]  L. Gostin,et al.  Privacy and security of personal information in a new health care system. , 1993, JAMA.

[30]  A. A. Zaidan,et al.  An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users , 2011 .

[31]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[32]  B. B. Zaidan,et al.  Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture , 2014, Journal of Medical Systems.

[33]  M Reis,et al.  The funding system and incentives in Portuguese hospitals , 2010, BMC Health Services Research.

[34]  B. B. Zaidan,et al.  Challenges, Alternatives, and Paths to Sustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools , 2015, Journal of Medical Systems.

[35]  Norm Archer,et al.  Importance of Mobile Technology in Successful Adoption and Sustainability of a Chronic Disease Support System , 2014 .

[36]  B. B. Zaidan,et al.  Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.

[37]  Maryam Ahmadi,et al.  The effects of organizational contextual factors on physicians' attitude toward adoption of Electronic Medical Records , 2015, J. Biomed. Informatics.

[38]  A. A. Zaidan,et al.  "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[39]  Rozana Zakaria,et al.  Ranking the Macro-Level Critical Success Factors of Electronic Medical Record Adoption Using Fuzzy AHP Method , 2014 .

[40]  B. B. Zaidan,et al.  Computerized Algorithm for Fetal Heart Rate Baseline and Baseline Variability Estimation based on Distance Between Signal Average and a Value , 2011 .

[41]  Miss Laiha Mat Kiah Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .

[42]  Hong Cheong Looi,et al.  E-Commerce Adoption in Brunei Darussalam: A Quantitative Analysis of Factors Influencing Its Adoption , 2005, Commun. Assoc. Inf. Syst..

[43]  A. A. Zaidan,et al.  Securing peer-to-peer mobile communications using public key cryptography: New security strategy , 2011 .

[44]  A. A. Zaidan,et al.  Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .

[45]  B Taute DST-funded information security centre of competence , 2009 .

[46]  James A. Pappas A Revitalized Information Assurance Training Approach and Information Assurance Best Practice Rule Set , 2008 .

[47]  B. B. Zaidan,et al.  Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing , 2014, Journal of Medical Systems.

[48]  B. B. Zaidan,et al.  A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.

[49]  Sally Okun,et al.  Core Principles & Values of Effective Team-Based Health Care , 2012 .

[50]  R. V. Krejcie,et al.  Determining Sample Size for Research Activities , 1970 .

[51]  E. Vance Wilson,et al.  Modeling patients' acceptance of provider-delivered e-health. , 2004, Journal of the American Medical Informatics Association : JAMIA.

[52]  Thomas K. Burch,et al.  Demography in a new key: A theory of population theory , 2003 .

[53]  Alvaro Arenas,et al.  Developing Secure Chemical Programs with Aspects , 2007 .

[54]  Shuk Ying Ho,et al.  The Effects of Location Personalization on Integrity Trust and Integrity Distrust in Mobile Merchants , 2013, Int. J. Electron. Commer..

[55]  Fauziah Baharom,et al.  Developing an extended technology acceptance model: Doctor's acceptance of electronic medical records in Jordan , 2011 .

[56]  Xiaojun Zhang,et al.  'Just What the Doctor Ordered': A Revised UTAUT for EMR System Adoption and Use by Doctors , 2011, 2011 44th Hawaii International Conference on System Sciences.

[57]  B. B. Zaidan,et al.  Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..

[58]  Otieno George Ochieng,et al.  Factors Influencing Diffusion of Electronic Medical Records: A Case Study in Three Healthcare Institutions in Japan , 2006, Health information management : journal of the Health Information Management Association of Australia.

[59]  A. A. Zaidan,et al.  A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.

[60]  B. B. Zaidan,et al.  Towards on Develop a Framework for the Evaluation and Benchmarking of Skin Detectors Based on Artificial Intelligent Models Using Multi-Criteria Decision-Making Techniques , 2017, Int. J. Pattern Recognit. Artif. Intell..

[61]  B. B. Zaidan,et al.  Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..

[62]  Pi-Jung Hsieh,et al.  Physicians' acceptance of electronic medical records exchange: An extension of the decomposed TPB model with institutional trust and perceived risk , 2015, Int. J. Medical Informatics.

[63]  A. A. Zaidan,et al.  A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .

[64]  Bilal Zaidan,et al.  Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.

[65]  Miss Laiha Mat Kiah,et al.  Suitability of using SOAP protocol to secure electronic medical record databases transmission , 2010 .

[66]  J. Phelps,et al.  Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .

[67]  Bilal Ali Yaseen Al-Nassar,et al.  Healthcare professionals use Electronic Medical Records System (EMRs) in Jordan Hospitals , 2011 .

[68]  AnuarNor Badrul,et al.  The landscape of research on smartphone medical apps , 2015 .

[69]  K. Andriole Security of electronic medical information and patient privacy: what you need to know. , 2014, Journal of the American College of Radiology : JACR.

[70]  A. A. Zaidan,et al.  StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .

[71]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[72]  Kavoos Dindarloo,et al.  Physicians’ perception and attitude toward electronic medical record , 2014, SpringerPlus.

[73]  L. B. Harman,et al.  Electronic health records: privacy, confidentiality, and security. , 2012, The virtual mentor : VM.

[74]  B. B. Zaidan,et al.  A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..

[75]  A. A. Zaidan,et al.  A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations , 2018, Artificial Intelligence Review.

[76]  Zarinah Mohd Kasirun,et al.  On the capacity and security of steganography approaches: An overview , 2010 .

[77]  B. B. Zaidan,et al.  A Systematic Review for Human EEG Brain Signals Based Emotion Classification, Feature Extraction, Brain Condition, Group Comparison , 2018, Journal of Medical Systems.

[78]  Robert Ho,et al.  Handbook of Univariate and Multivariate Data Analysis and Interpretation with SPSS , 2006 .

[79]  Zarinah Mohd Kasirun,et al.  On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .

[80]  Y. Don,et al.  Preservice Teachers' Acceptance of Learning Management Software: An Application of the UTAUT2 Model. , 2013 .

[81]  B. B. Zaidan,et al.  Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.

[82]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[83]  B. B. Zaidan,et al.  MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network , 2014, Journal of Medical Systems.

[84]  Prodromos D. Chatzoglou,et al.  Using a modified technology acceptance model in hospitals , 2009, Int. J. Medical Informatics.

[85]  B. B. Zaidan,et al.  Technique for order performance by similarity to ideal solution for solving complex situations in multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers , 2017, Telecommunication Systems.

[86]  Mehrbakhsh Nilashi,et al.  Evaluating the Factors Affecting Adoption of Hospital Information System Using Analytic Hierarchy Process , 2015 .

[87]  A. A. Zaidan,et al.  Review of mobile short message service security issues and techniques towards the solution , 2011 .

[88]  B. B. Zaidan,et al.  Image skin segmentation based on multi-agent learning Bayesian and neural network , 2014, Eng. Appl. Artif. Intell..

[89]  Madhu C. Reddy,et al.  Evaluating collaborative features of critical care systems: A methodological study of information technology in surgical intensive care units , 2008, J. Biomed. Informatics.

[90]  A. A. Zaidan,et al.  A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..

[91]  B. B. Zaidan,et al.  Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations , 2018, Journal of Medical Systems.

[92]  Jamil Bojei,et al.  The effects of trust on online Malaysian students buying behavior , 2011 .

[93]  Omar Zakaria,et al.  An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography , 2011 .

[94]  David Nzuki,et al.  Determinants of Electronic Health in Developing Countries , 2014 .

[95]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[96]  B. B. Zaidan,et al.  Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review , 2018, Journal of Medical Systems.

[97]  Othman Omran Khalifa,et al.  A review on multimedia communications cryptography , 2011 .

[98]  Mojtaba Alizadeh,et al.  Evaluating the Critical Factors for Electronic Medical Record Adoption Using Fuzzy Approaches , 2014 .

[99]  Sooyoung Yoo,et al.  Analysis of the factors influencing healthcare professionals’ adoption of mobile electronic medical record (EMR) using the unified theory of acceptance and use of technology (UTAUT) in a tertiary hospital , 2015, BMC Medical Informatics and Decision Making.

[100]  B. B. Zaidan,et al.  Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[101]  Fong-Lin Jang,et al.  Patients’ Acceptance towards a Web-Based Personal Health Record System: An Empirical Study in Taiwan , 2013, International journal of environmental research and public health.

[102]  Abdullah Gani Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .

[103]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .

[104]  A. A. Zaidan,et al.  An evaluation and selection problems of OSS-LMS packages , 2016, SpringerPlus.

[105]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[106]  Fan-Yun Pai,et al.  Applying the Technology Acceptance Model to the introduction of healthcare information systems , 2011 .

[107]  A. Boonstra,et al.  Barriers to the acceptance of electronic medical records by physicians from systematic review to taxonomy and interventions , 2010, BMC health services research.

[108]  B. B. Zaidan,et al.  Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related "Big Data" Using Body Sensors information and Communication Technology , 2018, Journal of Medical Systems.

[109]  Junseok Hwang,et al.  Information Security Policy Decision Making: An Analytic Hierarchy Process Approach , 2009, Asia International Conference on Modelling and Simulation.

[110]  A. A. Zaidan,et al.  New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .

[111]  J. Hair Multivariate data analysis : a global perspective , 2010 .

[112]  I-Chiu Chang,et al.  Physicians' acceptance of pharmacokinetics-based clinical decision support systems , 2007, Expert Syst. Appl..

[113]  Dibyendu Aich Secure Query Processing by Blocking SQL Injection , 2009 .

[114]  B. B. Zaidan,et al.  Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization “Large Scales Data” Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology , 2018, Journal of Medical Systems.

[115]  Mihyar Hesson,et al.  Online security evaluation process for new e-services , 2007, Bus. Process. Manag. J..

[116]  Sri Hartati,et al.  Development of user acceptance model for electronic medical record system , 2015, 2015 International Conference on Information Technology Systems and Innovation (ICITSI).

[117]  Kuang-Ming Kuo,et al.  How Do Patients Respond to Violation of Their Information Privacy? , 2014, Health information management : journal of the Health Information Management Association of Australia.

[118]  A. A. Zaidan,et al.  A methodology for football players selection problem based on multi-measurements criteria analysis , 2017 .

[119]  Fazida Othman,et al.  An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.

[120]  Nor Badrul Anuar,et al.  The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks , 2016, Pervasive Mob. Comput..

[121]  Alla Keselman,et al.  Developing informatics tools and strategies for consumer-centered health communication. , 2008, Journal of the American Medical Informatics Association : JAMIA.

[122]  B. B. Zaidan,et al.  A review of disability EEG based wheelchair control system: Coherent taxonomy, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..

[123]  Mehrbakhsh Nilashi,et al.  Ranking the Micro Level Critical Factors of Electronic Medical Records Adoption Using Topsis Method , 2013 .

[124]  R. Jayawardena,et al.  Validity of a food frequency questionnaire to assess nutritional intake among Sri Lankan adults , 2016, SpringerPlus.

[125]  B. B. Zaidan,et al.  Intrusion Detection System: Overview , 2010, ArXiv.

[126]  Kok Wei Khong,et al.  Integrating Health Belief Model and Technology Acceptance Model: An Investigation of Health-Related Internet Use , 2015, Journal of medical Internet research.

[127]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[128]  A. A. Zaidan,et al.  High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .

[129]  Janita F. J. Vos,et al.  Implementing electronic health records in hospitals: a systematic literature review , 2014, BMC Health Services Research.

[130]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[131]  Bakheet Aldosari,et al.  Nurses' attitude, acceptance and use of Electronic Medical Records (EMR) in King AbdulAziz Medical City (KAMC) in Riyadh, Saudi Arabia , 2014 .

[132]  B. B. Zaidan,et al.  Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.

[133]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[134]  Sharon S. Choi,et al.  Implementing electronic medical record systems in developing countries. , 2005, Informatics in primary care.

[135]  HaiqiAhmed Open source EMR software , 2014 .

[136]  H. AHMADI,et al.  Ranking the Meso Level Critical Factors of Electronic Medical Records Adoption Using Fuzzy Topsis Method , 2016, Current health sciences journal.

[137]  Li-Min Lin,et al.  Testing the technology acceptance model for evaluating healthcare professionals' intention to use an adverse event reporting system. , 2007, International journal for quality in health care : journal of the International Society for Quality in Health Care.

[138]  Evangelos Triantaphyllou,et al.  Multi-Criteria Decision Making: An Operations Research Approach , 1998 .

[139]  Dennis Lupiana,et al.  Challenges to E-healthcare adoption in developing countries: A case study of Tanzania , 2009, 2009 First International Conference on Networked Digital Technologies.

[140]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[141]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[142]  A. A. Zaidan,et al.  Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review , 2013 .

[143]  Mihail Cocosila,et al.  Adoption of mobile ICT for health promotion: an empirical investigation , 2010, Electron. Mark..

[144]  B. B. Zaidan,et al.  Open source EMR software: Profiling, insights and hands-on analysis , 2014, Comput. Methods Programs Biomed..

[145]  A. Zarrad,et al.  A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records , 2014 .

[146]  A. A. Zaidan,et al.  Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .

[147]  Tiago Oliveira,et al.  Electronic Health Record Patient Portal Adoption by Health Care Consumers: An Acceptance Model and Survey , 2016, Journal of medical Internet research.

[148]  R. Haynes,et al.  Effects of computer-based clinical decision support systems on physician performance and patient outcomes: a systematic review. , 1998, JAMA.

[149]  Martina Ziefle,et al.  Perception of privacy and security for acceptance of E-health technologies: Exploratory analysis for diverse user groups , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[150]  Vichita Vathanophas,et al.  Information Technology Acceptance in healthcare service: The study of Electronic Medical Record (EMR) in Thailand , 2010, PICMET 2010 TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH.

[151]  Nor Hazana Abdullah,et al.  Implementation and acceptance of hospital information system , 2013 .

[152]  Syed Wafa,et al.  The Effect of Perceived Risk on the Intention to Use E-commerce: The Case of Algeria , 2009 .

[153]  Randy V. Bradley,et al.  Global Diffusion of the Internet X: The Diffusion of Telemedicine in Ethiopia: Potential Benefits, Present Challenges, and Potential Factors , 2006, Commun. Assoc. Inf. Syst..

[154]  B. B. Zaidan,et al.  A distributed framework for health information exchange using smartphone technologies , 2017, J. Biomed. Informatics.

[155]  Jerome Kabakyenga,et al.  Drugs for some but not all: inequity within community health worker teams during introduction of integrated community case management , 2014, BMC Health Services Research.

[156]  A. A. Zaidan,et al.  A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .

[157]  B. B. Zaidan,et al.  Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[158]  B. B. Zaidan,et al.  A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction , 2017, J. Circuits Syst. Comput..

[159]  Hamid A. Jalab,et al.  A new system for hidden data within header space for EXE-File using object oriented technique , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[160]  Omar F. El-Gayar,et al.  EXAMINING HEALTHCARE PROFESSIONALS' ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT , 2008 .

[161]  B. B. Zaidan,et al.  Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..

[162]  A. A. Zaidan,et al.  Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .

[163]  O. M. Enaizan,et al.  Privacy and Security Concern for Electronic Medical Record Acceptance and Use: State of the Art , 2017 .

[164]  A. A. Zaidan,et al.  Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .

[165]  A. A. Zaidan,et al.  High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.

[166]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[167]  K. Lohr,et al.  Health Data in the Information Age , 1994 .

[168]  Ali Garavand,et al.  Factors Affecting in Adoption and Use of Electronic Medical Record Based on Unified Theory of Acceptance and Use of Technology in Iran , 2017 .

[169]  V. Venkatesh,et al.  Unified Theory of Acceptance and Use of Technology: U.S. Vs. China , 2010 .

[170]  T. Saaty,et al.  Why the magic number seven plus or minus two , 2003 .

[171]  Y. S. Feruza,et al.  IT Security Review: Privacy, Protection, Access Control, Assurance and System Security , 2007 .

[172]  A. A. Zaidan,et al.  Security improvement of credit card online purchasing system , 2011 .

[173]  A. A. Zaidan,et al.  Study on open source learning management systems: A survey, profile, and taxonomy , 2015 .

[174]  Guy Paré,et al.  Determinants of Internet use as a preferred source of information on personal health , 2008, Int. J. Medical Informatics.

[175]  K. Selvi,et al.  FAST SVMS FOR POWER QUALITY DATA MINING , 2009 .

[176]  Md Rafiqul Islam,et al.  "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[177]  B. B. Zaidan,et al.  Secure Topology for Electronic Medical Record Transmissions , 2010 .

[178]  B. B. Zaidan,et al.  Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.

[179]  Tiago Oliveira,et al.  Electronic Health Record Portal Adoption by Health Care Consumers - Proposal of a New Adoption Model , 2014, WEBIST.

[180]  Rainu Kaushal,et al.  Physicians and electronic health records: a statewide survey. , 2007, Archives of internal medicine.

[181]  Othman Omran Khalifa,et al.  Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .

[182]  Randolph C. Barrows,et al.  Review: Privacy, Confidentiality, and Electronic Medical Records , 1996, J. Am. Medical Informatics Assoc..

[183]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[184]  B. B. Zaidan,et al.  MOGSABAT: a metaheuristic hybrid algorithm for solving multi-objective optimisation problems , 2018, Neural Computing and Applications.

[185]  Aduwati Sali,et al.  Multi-complex attributes analysis for optimum GPS baseband receiver tracking channels selection , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).

[186]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[187]  Dário Elias,et al.  a new marketing archetype for the information age, applied to the adoption of oral contraceptives and other drugs by end-users" , 2013 .

[188]  B. B. Zaidan,et al.  New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.

[189]  B. B. Zaidan,et al.  A security framework for mHealth apps on Android platform , 2018, Comput. Secur..

[190]  F. M. Jumaah,et al.  Decision-making solution based multi-measurement design parameter for optimization of GPS receiver tracking channels in static and dynamic real-time positioning multipath environment , 2018 .

[191]  U. Sekaran,et al.  Research Methods for Business : A Skill Building Approach (5th Edition) , 1992 .

[192]  A. A. Zaidan,et al.  Investigate the Capability of Applying Hidden Data in Text File: An Overview , 2010 .

[193]  B. B. Zaidan,et al.  An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1 , 2013, Journal of Medical Systems.

[194]  Mansooreh Mollaghasemi,et al.  Technical Briefing: Making Multiple-Objective Decisions , 1996 .

[195]  Hsin-Ginn Hwang,et al.  The Differing Privacy Concerns Regarding Exchanging Electronic Medical Records of Internet Users in Taiwan , 2012, Journal of Medical Systems.

[196]  Mikko T. Siponen,et al.  Integrating Habit into UTAUT: The Chinese eBay Case , 2011, Pac. Asia J. Assoc. Inf. Syst..

[197]  Jinsheng Roan,et al.  Barriers to Physicians’ Adoption of Healthcare Information Technology: An Empirical Study on Multiple Hospitals , 2012, Journal of Medical Systems.

[198]  A. A. Zaidan,et al.  Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions , 2018 .

[199]  B. B. Zaidan,et al.  Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[200]  Pradeep Kumar Ray,et al.  A taxonomy of antecedents to user adoption of health information systems: A synthesis of thirty years of research , 2015, J. Assoc. Inf. Sci. Technol..