Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Autor: Ismail Bile Hassan, Masrah Azrifah Azmi Murad
Jazyk: angličtina
Rok vydání: 2014
Předmět:
DOI: 10.5281/zenodo.2666336
Popis: This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards health information application in Smart National Identity Card. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the factors of trust, perceived risk, Privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. Empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.
{"references":["Mahmut, T. (2011). Identifying Factors that facilitate the use of Multi-\nPurpose Smart Cards by University Students: An empirical\ninvestigation. Informatics institute. Ankara, Middle East Technical\nUniversity Master 99.","Fancher, C. (1997). \"In your pocket: smartcards.\" Spectrum, IEEE\n34(2)(47-53).","Yeow, P. H. P., Loo, W.H. (2009). \"Acceptability of ATM and transit\napplications embedded in multipurpose smart identity card: An\nexploratory study in Malaysia.\" International Journal of Electronic\nGovernment Research, 5 (2), 37-56 (IGI Publishing; Scopus journal).","Jim Briggs, J. B. (2001). Smart cards in health, Healthcare Computing\nGroup, University of Portsmouth, Portsmouth, PO1 3AE.","Loo W. H., Yeow, P.H.P., & Chong, S.C. (2011). \"Acceptability of\nMultipurpose Smart National Identity Card: An Empirical Study.\"\nJournal of Global Information Technology Management 14 (1), 35-58.\n(Thomson ISI journal).","Yeow, P. H. P., Loo, Wee Hong and Chong, Siong Choy (2007).\n\"Accepting Multipurpose \"Smart\" Identity Cards in a Developing\nCountry.\" Journal of Urban Technology 14: 1, 23 — 50.","Ghazali, D. B. \"More with Mykad.\"","Department, M. N. R. (2012). \"Available: http: //www.jpn.gov.my/en/\ninformasi/main-applications.\"","Mallika, K. (2011). Patient Acceptance Analysis on National ID Smart\nCard in Health Care Orgarnization Using a Thailand Hospital Example.\nSchool of Health Care Administration, Taipei Medical University.\nMaster 69.\n[10] Yeow P.H.P., Miller. (2005). \"The Attitude of Malaysians towards\nMyKad.\" Proceedings of the 4th International Conference on\nInformation Technology in Asia 2005 (CITA '05).\n[11] Aisha, F. B. (2011). Smart Card Systems: Managing Risks and\nModelling security protocols using systemc and Transaction level\nModeling School of electronic and Computer Science Southampton.\nPHD.\n[12] N. Anju Latha*, B. R. M., U. Sunitha (2012). \"Smart Card Based\nIntegrated Electronic Health. Record System for Clinical Practice.\"\nwww.ijacsa.thesai.org.\n[13] Sellappans, R., S. S. Chua, et al. (2013). \"Health innovation for patient\nsafety improvement.\" Australasian Medical Journal 6(1): 60-63.\n[14] Helen Cripps, C. S., Vesna Prijatelj (2012). Smart Health Care Cards:\nAre they applicable in the Australian context? 25th Bled eConference\neDependability: Reliable and Trustworthy eStructures, eProcesses,\neOperations and eServices for the Future Bled, Slovenia\nhttps://domino.fov.uni-mb.si/proceedings.nsf/0/.../P34_Cripps_43.pdf .\n[15] Rana (2012). Evaluating Suitability of Alternative Theoretical Paradigm\nfor Examining Citizen Adoption of E-Government, Information Systems\nEvaluation and integration group (ISEing), Brunel University, London,\nUnited Kingdom.\n[16] Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003).\n\"User Acceptance of Information Technology: Toward a Unified View.\"\nMIS Quarterly (27:3), pp. 425-478.\n[17] Davis, F. D. (1989). \"Perceived usefulness, perceived ease of use, and\nuser acceptance of information technology.\" MIS Quarterly 13(3): 319–\n340.\n[18] Ajzen, I. T. T. o. P. B.,\" Organizational Behavior and Human Decision\nProcesses (50:2), pp. 179-211. (1991). \"The Theory of Planned\nBehavior.\" Organizational Behavior and Human Decision Processes\n50(2): 179-211.\n[19] Taylor S, T. P. (1995). \"Decomposition and crossover effects in the\ntheory of planned behaviour: A study of consumer adoption.\"\nInternational Journal of Research in Marketing 12(2): 137-155.\n[20] Rogers, E. M. (2003). \"Diffusion of innovations (5th ed.).\" New York:\nFree Press.\n[21] Thompson Ronald L., C. A. H., Jane M. Howell. (1991). \"Personal\nComputing: Toward a Conceptual Model of Utilization.\" MIS Quarterly\n15.\n[22] Bandura, A. (1986). Social Foundations of Thought and Action: A\nSocial Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ.\n[23] Schaupp L.C. Carter L, M. M. E. (2010). \"E-file adoption: A study of\nU.S. taxpayers' intentions.\" Computers in Human Behavior 26(636-\n644).\n[24] Venkatesh Viswanath, J. Y. L. T., Xin Xu (2012). \"Consumer\nacceptance and use of information technology: extending the unified\ntheory of acceptance and use of technology.\" MIS Quarterly Vol. 36 No.\n1 pp. 157-178/March 2012.\n[25] Carter L., S. L. C., Hobbs J, Campbell R. (2011). \"The role of security\nand trust in the adoption of online tax filing'. Transforming\nGovernment: People, Process and Policy.\" Transforming Government:\nPeople, Process and Policy 5(4): 303-318.\n[26] Chan F.K.Y. Thong J.Y.L. Venkatesh, V. B., S.A. Hu, P.J-H and Tam,\nK.Y. (2010). \"Modeling Citizen Satisfaction with Mandatory Adoption\nof an E-Government Technology.\" Journal of the Association for\nInformation Systems 11(10): 519-549.\n[27] Van Dijk J.A.G.M. Peters O, E. W. (2008). \"Explaining the acceptance\nand use of government Internet services: A multivariate analysis of 2006\nsurvey data in the Netherlands.\" Government Information Quarterly 25:\n379-399.\n[28] Carter L, S. L. C. (2009). \"Relating Acceptance and Optimism to E-File\nAdoption.\" International Journal of Electronic Government Research\n5(3): 62-74.\n[29] Wang Y-S, S. Y.-W. (2009). \"Why do people use information kiosks: A\nvalidation of the Unified Theory of Acceptance and Use of Technology.\"\nGovernment Information Quarterly 26 158-165.\n[30] Dinev, T. (2006). \"Privacy calculus model in e-commerce\" European\nJournal of Information Systems.\n[31] H. Jeff Smith, T. D., Heng Xu (2011). \"Information Privacy Research:\nAn Interdisciplinary Review.\" MIS Quarterly 35(4): 989-1015.\n[32] Rindfleisch, T. C. (1997). \"Privacy, Information Technology, and Health\nCare.\" Communications of the ACM 40(8): 92-100.\n[33] Budnitz, M. E. (1998). \"Privacy Protection for Consumer Transactions\nin Electronic Commerce: Why Self-Regulation Is Inadequate \" South\nCarolina Law Review 49.\n[34] Wald, M. L. (2004). \"Threats and responses: The airlines; U.S. wants all\nair traveler files for security test.\" New York Times (September 22) 1.\n[35] David, D. (2013). Electronic Personal Health Records: A Matter of\nTrust. The School of Graduate Studies, McMaster University PhD: 149.\n[36] Willison, D. J., Schwartz, L., Abelson, J., Charles, C., Swinton, M.,\nNorthrup, D., & and L. Thabane (2007). \"Alternatives to Project-\nSpecific Consent for Access to Personal Information for Health\nResearch: What Is the Opinion of the Canadian\n[37] Mcknight DH, C. V., Kacmar C (2002). \"Developing and validating trust\nmeasures for e-commerce: an integrative typology.\" Information\nSystems Research 13(3), 334–359.\n[38] Willison, D. J., V. Steeves, C. Charles, L. Schwartz, J. Ranford, and J.\nC. G. Agarwal, L. Thabane. (2009). \" Consent for use of personal\ninformation for health research: Do people with potentially stigmatizing\nhealth conditions and the general public.\n[39] Coy, K. L. J. (2001). \"The current privacy environment: Implications for\nthird-party research.\" Continuing Ed. Health Professions 21(4): 203–\n214.\n[40] Mayer RC, D. J., Schoorman FD (1995). \"An integrative model of\norganizational trust.\" Acad Manage Rev 20:709-734.\n[41] Gefen D., K., E., Straub, D.W. (2003). \"Trust and TAM in online\nshopping: an integrated model.\" MIS Quarterly 27 (1): 51-90.\n[42] Rotter, L. B. (1971). \"Generalized expectations for interpersonal trust.\"\nAmerican Psychologist 26 (5): 443–452.\n[43] McKnight, D. H., Cummings, L.L., Chervany, N.L., (1998). \"Initial trust\nformation in new organizational relationships.\" Academy of\nManagement Review 23 (3): 473–490.\n[44] Naser, C., Alpert, S. A., (1999) Protecting the Privacy of Medical\nRecords: An Ethical Analysis. White Paper,National Coalition for\nPatient Rights, Lexington, MA.\n[45] Alpert, S. A. (1998). \"Health Care Information: Confidentiality, Access,\nand Good Practice, in Ethics, Computing, and Medicine: Informatics and\nthe Transformation of Health Care, K. W.Goodman (ed.), New York:.\"\nCambridge University Press, pp.: 75-101.\n[46] Yeow, P. H. P., et al. (2012). \"Ergonomics issues in national identity\ncard for homeland security, Applied Ergonomics.\"\nhttp://dx.doi.org/10.1016/j.apergo.2012.04.017.\n[47] Im, I., Kim, Y., Han H.-J. 2008. (2008). \"The Effects of Perceived Risk\nand Technology Type on Users' Acceptance of Technologies.\"\nInformation & Management 45(1): 1-9.\n[48] Ji-Hwan Lee, S. W. K., Chi Hoon Song (2010) The Effects of Trust and\nPerceived Risk on Users' Acceptance of ICT Services. KAIST Business\nSchool Working Paper Series Index:\n[49] Thiesse, F. (2007). \"RFID, privacy and the perception of risk: A\nstrategic framework.\" Journal of Strategic Information Systems 16: 214-\n232.\n[50] Lui, H. K., Jamieson R. (2003). Integrating Trust and Risk Perceptions\nin Business-to-Consumer Electronic Commerce with the Technology\nAcceptance Model. European Conference on Information System\n(ECIS), Naples.\n[51] Pavlou, P. (2003). \"Consumer acceptance of electronic commerce:\nintegrating trust and risk with the technology acceptance model.\"\nInternational Journal of Electronic Commerce 7 (3): 69–103.\n[52] Al-Sobhi F. Weerakkody, V. a. E.-H., R. (2011). \"The Relative\nImportance of Intermediaries in eGovernment Adoption: A study of\nSaudi Arabia.\" M. Janssen, H.J. Scholl, M.A. Wimmer, and Y-H. Tan\n(Eds.): EGOV 2011, LNCS 6846, 62-74.\n[53] Hussein R., M. N. A. A. R., Mahmud M, Aditiawarman U. (2010). \"G2C\nAdoption of E- Government in Malaysia: Trust, Perceived Risk and\nPolitical Self-Efficacy.\" International Journal of Electronic Government\nResearch 6(3): 57-72.\n[54] Chiang, L. (2009). \"Trust and security in the e-voting system'.\nElectronic Government.\" an International Journal 6(4): 343-360.\n[55] McLeod Jr. A.J, P. S. E. (2009). \"Security and Privacy Trust in EGovernment:\nUnderstanding System and Relationship Trust\nAntecedents.\" 42nd Hawaii International Conference on System\nSciences 1-10.\n[56] Smith, J. (2006). \"Determining Key Factors in E-Government\nInformation System Security.\" Information Systems Management 23-32.\n[57] France Be´langer, L. C. (2008). \"Trust and risk in e-government\nadoption.\"Journal Strategic Information Systems\ndoi:10.1016/j.jsis.2007.12.002.\n[58] Ciborra C, N. D. D. (2005). \"Good Governance, Development Theory,\nand Aid Policy: Risks and Challenges of E-Government in Jordan.\"\nInformation Technology for Development 11(2): 141-159.\n[59] Colesca, S. E. (2009). \"Increasing E-Trust: A Solution to Minimize Risk\nin E-Government Adoption.\" Journal of Applied Quantitative Methods\n4(1): 31-44.\n[60] Lee S.M. Tan X, T. S. (2006). \"M-government, from rhetoric to reality:\nlearning from leading countries'. Electronic Government.\" An\nInternational Journal 3(2): 113-126.\n[61] Loukis E, C. Y. (2011). \"Why Do e-Government Projects Fail? Risk\nFactors of Large Information Systems Projects in the Greek Public\nsector.\" An International Comparison'. International Journal of\nElectronic Government Research 7(2): 59-77.\n[62] Taiwo, A. A., A. K. Mahmood, et al. (2012). User acceptance of\neGovernment: Integrating risk and trust dimensions with UTAUT\nmodel. Computer & Information Science (ICCIS), 2012 International\nConference on.\n[63] Yap Ai Kee, Y. C. N., Leau Yu Beng, and Tan Soo Fun (2012).\n\"Security Issues on Identity Card in Malaysia.\" IA CSIT International\nJournal of Engineering and Technology Vol. 4 (No. 5).\n[64] Bansal, G., F. M. Zahedi, D. Gefen (2010). \"The impact of personal\ndispositions on information sensitivity, privacy concern and trust in\ndisclosing health information online.\" Decision Support Systems 49(2):\n138-150.\n[65] Gilbert, D., Kelly, L. L., and Barton, M. (2003). \"Technophobia, gender\ninfluences and consumer decision-making for technology-related\nproducts.\" European Journal of Innovation Management, 6 (4), 253-263.\n[66] Wang, Y. S., Wang, Y. M., Lin, H. H., and Tang, T. I. (2003).\n\"Determinants of user acceptance of internet banking: An empirical study.\" International Journal of Service Industry Management, 14 (5),\n501-519.\n[67] Alshare, K. A., Freeze, R., Kwun, O. (2009). \"Student intention to use\nexpert systems: an exploratory study.\" J. Comput. Inf. Syst. 49 (4):\n105e113.\n[68] Simon, B., 2001. Knowledge media in education e a user acceptance in\nuniversities. and V. Master dissertation. Wirtschaftsuniversität Wien\n(2001). Knowledge media in education e a user acceptance in\nuniversities. Wirtschaftsuniversität Wien, Vienna. Master\n[69] Sun, H. (2003). An integrative analysis of TAM: toward a deeper\nunderstanding of technology acceptance model. Proceedings of the 9th\nAmerican Conference on Information Systems (the 9th AMCIS),\nTampa, Florida.\n[70] Bauer, R. A. (1960). Consumer behavior as risk-taking. In R. S.\nHancock (Ed.), Dynamic marketing for a changing world. Chicago,\nAmerican Marketing Association: 389-398.\n[71] Warkentin, M., Gefen, D., Pavlou, P., Rose, G. (2002). \"Encouraging\ncitizen adoption of e-government by building trust.\" Electronic Markets\n12 (3) 157–162.\n[72] Mauricio Featherman, P. A. P. (2003). \"Predicting e-services adoption: a\nperceived risk facets perspective.\" International Journal of Human-\nComputer Studies 59: 451-474.\n[73] Richards, R. J. (2012). A Study of the Intent to Fully Utilize Electronic\nPersonal Health\n[74] Xin Li, T. J. H., Joseph S. Valacich Bernama (2008). \"Why do we trust\nnew technology? A study of initial trust formation with organizational\ninformation systems.\" Strategic Information System 17(1): 39–71.\n[75] Wang, W., Benbasat, I. (2005). \"Trust in and adoption of online\nrecommendation agents.\" Journal of the Association for Information\nSystems 6(3): 72–101.\n[76] McKnight, D. H. (2005). \"Trust in information technology.\" The\nBlackwell Encyclopedia of Management. Blackwell, Maiden, MA, 329–\n331.\n[77] Angst, C. M. a. R. A. (2009). \"Adoption of electronic health records in\nthe presence of privacy concerns: The elaboration likelihood model and\nindividual persuasion.\" MIS Quarterly 33(2): 339-370.\n[78] Chellappa, R. K., Sin, R. G. (2005). \"Personalization Versus Privacy: An\nEmpirical Examination of the Online Consumer's Dilemma.\"\nInformation Technology and Management 6(2): 181-202.\n[79] Donna, M. (2003). \"Evaluating Electronic Commerce Acceptance with\nthe Technology Acceptance Model.\" Journal of Computer Information\nSystems 44(2), 2003, 49-57.\n[80] Gefen, D., and Straub, D. (1997). \"Gender Differences in the Perception\nand Use of E-mail: An Extension to the Technology Acceptance Model.\"\nMIS Quarterly 21(4), 389-400.\n[81] Vijayasarathy, L. R. (2004). \"Predicting Consumer Intentions to Use\nOnline Shopping: The Case for an Augmented Technology Acceptance\nModel.\" Information and Management 41(6), 747-762.\n[82] Loo, W. H., Yeow, P.H.P. & Chong, S.C. (2009). \"User acceptance of\nMalaysian government multipurpose smartcard applications.\"\nGovernment Information Quarterly, 26, 358-367. (Publisher: Elsevier;\nThomson ISI).\n[83] Venkatesh, V., Morris, M.G. (2000). \"Why Don't Men Ever Stop to Ask\nfor Directions? Gender, Social Influence, and Their Role in Technology\nAcceptance and Usage Behaviour.\" MIS Quarterly, 24(1) 2000, 115-\n139.\n[84] Al-Gahtani, S. S., Hubona, G.S., and Wang, J. (2007). \"Information\nTechnology (IT) in Saudi Arabia: Culture and the Acceptance and Use\nof IT.\" Information and Management, 44(8), 681-691.\n[85] Yuen, Y. Y., Yeow, P.H.P., Lim, N., and Saylani, N. (2010). \"Internet\nBanking Adoption: Comparing Developed and Developing Countries.\"\nJournal of Computer Information Systems 51(1), 52-61.\n[86] Limayem, M., Hirt, S. G., and Cheung, C. M. K. (2007). \"How Habit\nLimits the Predictive Power of Intentions: The Case of IS Continuance.\"\nMIS Quarterly (31:4), pp. 705-737.\n[87] Kim, S. S., Malhotra, N. K., and Narasimhan, S. (2005). \"Two\nCompeting Perspectives on Automatic Use: A Theoretical and Empirical\nComparison.\" Information Systems Research (16:4), pp. 418-432.\n[88] Brown, S. A., and Venkatesh, V. (2005). \"Model of Adoption of\nTechnology in the Household: A Baseline Model Test and Extension\nIncorporating Household Life Cycle.\" MIS Quarterly 29(4): 399-426.\n[89] Van der Heijden, H. (2004). \"User Acceptance of Hedonic Information\nSystems.\" MIS Quarterly 28 (4): 695-704.\n[90] Thong J. Y. L., H., S. J., Tam, K. Y. (2006). \"The Effects of Post-\nAdoption Beliefs on the Expectation Confirmation Model for\nInformation Technology Continuance\" International Journal of Human-\nComputer Studies 64(9): 799-810.\n[91] Chan, K. Y., Gong, M., Xu, Y., Thong, J. Y. L. (2008). Examining User\nAcceptance of SMS: An Empirical Study in China and Hong Kong. 12th\nPacific Asia Conference on Information System. Suzhou, China.\n[92] Dodds, W. B., Monroe, K. B., and Grewal, D. (1991). \"Effects of Price,\nBrand, and Store Information on Buyers.\" Journal of Marketing\nResearch (28:3), pp. 307-3 19.\n[93] Nisakorn Phichitchaisopa, T. N. (2013). \"Factors Affecting the Adoption\nof Healthcare Information Technology\" EXCLI Journal 12(ISSN 1611-\n2156): 413-436.\n[94] Davis, F. D. (1989). \"Perceived usefulness, perceived ease of use, and\nuser acceptance of information technology. .\" MIS Quarterly 13(3): 319–\n340."]}
Databáze: OpenAIRE