68
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Will They Adopt? Effects of Privacy and Accuracy

&
Pages 20-29 | Received 30 Jun 2009, Accepted 14 Jan 2010, Published online: 11 Dec 2015

References

  • Agarwal, R. and Karahanna, E. “Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage,” MIS Quarterly, (24:4), 2000, 665–694.
  • Agarwal, R, Sambamurthy, V., and Stair, R.M. “Research Report: The Evolving Relationship between General and Specific Computer Self-Efficacy — An Empirical Assessment,” Information Systems Research, (11:4), 2000, 418–430.
  • Ajzen I and Fishbein, M. Understanding Attitudes and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, NJ, 1980.
  • Ammenwerth, E., Mansmann, U., Iller, C. and Eichstadter, R. “Factors affecting and affected by user acceptance of computer-based nursing documentation: Results of a two- year study,” Journal of the American Medical Informatics Association, (10:1), 2002, 69–84.
  • Bandura, A. “Self-Efficacy Mechanism in Human Agency”, American Psychologist, (37:2), 1982, 122–147.
  • Berner, K. “Ethical and Legal Issues in the Use of Health Information Technology to Improve Patient Safety,” HEC Forum, (20:3), 2008, 243–258.
  • Bhattacherjee, A. and Hikmet, N. “Reconceptualizing Organizational Support and Its Effect on Information Technology Usage: Evidence from the Health Care Sector,” Journal of Computer Information Systems, (48:4), 2008, 69–76.
  • Bhattacherjee, A., Perols, J., and Sanford, C. “Information Technology Continuance: A Theoretic Extension and Empirical Test,” Journal of Computer Information Systems, (49:1), 2008, 17–26.
  • Compeau, D.R. and Higgins, C.A. “A Social Cognitive Theory Perspective on Individual Reactions to Computing Technology,” Proceedings of the Twelfth International Conference on Information Systems, December 16-18, (editors, Jan DeGross, et al.), 1991, 187–198.
  • Compeau, D.R. and Higgins, C.A. “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, (19:2), 1995, 189–211.
  • Curran, M., and Curran, K. “The ethics of information,” JONA, (21:1), 1991, 47–49.
  • Davis, F.D. “Perceived usefulness, perceived ease of use and user acceptance of information technology,” MIS Quarterly, (13:3), 1989, 319–340.
  • Davis, F.D. “User acceptance of information technology: System characteristics, user perceptions and behavioral impacts,” International Journal of Man-Machine Studies, (38:3) 1993, 475–487.
  • Dennis, K.E., Sweeney, P.M., MacDonald, L.P., and Morse, N.A. “Point of Care Technology: Impact on people and paperwork,” Nursing Economics, (11:4), 1993, 229–237, 248.
  • Dillon, T.W., McDowell, D, Salimian, F., and Conklin, D. “Perceived ease of use and usefulness of bedside-computer systems,” Computers in Nursing, (16:3), 1998, 151–156.
  • Dillon, T.W. Blankenship, R. and Crews, T. “Nursing attitudes and images of electronic patient records,” CIN: Computers, Informatics, Nursing, (23:3), 2005, 139–145.
  • Dillon, T.W., Lending, D., Crews, T.R., and Blankenship, R. “Nursing Self-efficacy of an Integrated Clinical and Administrative Information System,” CIN: Computers, Informatics, Nursing, (21:4), 2003, 198–205.
  • Ertmer, P.A., Evenbeck, E., Cennamo, K.S., and Lehman, J.D. “Enhancing Self-Efficacy for Computer Technologies Through the Use of Positive Classroom Experiences,” Educational Technology Research and Development, (42:3), 1994, 45–62.
  • Fagan, M.H., Neill, S. and Wooldridge, B.R. “An Empirical Investigation into the Relationship between Computer SelfEfficacy, Anxiety, Experience, Support and Usage,” Journal of Computer Information Systems, (44:2), 2003-2004, 95–104.
  • Fletcher, M. and Connolly, C. “Health Groups Pledge Cost Control,” The Washington Post, May 11, 2009, page A-1.
  • Gosten, L.O. and Nass, S. “Reforming the HIPAA Privacy Rule: safeguarding privacy and promoting research,” Journal of the American Medical Association (JAMA), 2009 Apr 1; (301:13), 2009, 1373–5.
  • Happ, B.A. “The effect of point of care technology on the quality of patient care,” Proceedings of the Seventeenth Annual Symposium on Computer Applications in Medical Care, 1993, 183–187.
  • Henderson, R.D., Deane, F.P., and Ward, M.J. “Occupational differences in computer-related anxiety: Implications for the implementation of a computerized patient management information system,” Behaviour & Information Technology, (14:1), 1995, 23–31.
  • Henry, J.W. and Stone, R.W. “A structural equation model of end-user satisfaction with a computer-based medical information system,” Information Resources Management Journal, (7:3), 1994, 21–33.
  • Henry, J.W. and Stone, R.W. “Computer Self-Efficacy and Outcome Expectancy: The Effects on the End-User's Job Satisfaction,” Computer Personnel, (16:4), 1995, 15–34.
  • Hinson, D. K., Huether, S.E., Blaufuss, J.A., Neiswanger, M., Tinker, A., Meyer, K.J., and Jensen, R. “Measuring the impact of a clinical nursing information system on a nursing unit,” Proceedings of the Seventeenth Annual Symposium on Computer Applications in Medical Care, 1993, 203–210.
  • Hollenback, J.R. and Williams, C.R. “Turnover Functionality versus Turnover Frequency: A Note on Work Attitudes and Organizational Effectiveness,” Journal of Applied Psychology, (73:4), 1996, 647–656.
  • HIPAA, The Privacy Rule, HIPAA, http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html, accessed May 12, 2009.
  • Huston, T. “Security Issues for Implementation of E- Medical Records,” Communications of the ACM, (44:9), 2001, p. 89–94.
  • Khalifa, M. and Shen, K.N. “Drivers for Transactional B2C M-Commerce Adoption: Extended Theory of Planned Behavior,” Journal of Computer Information Systems, (48:3), 2008, 111–117.
  • Khoumbati, K. and Themistocleous, M. “Evaluating Integration Approaches Adopted by HealthCare Organizations,” Journal of Computer Information Systems, (47:2), 2006-2007, 20–27.
  • Kilbridge, P. “The cost of HIPAA compliance,” New England Journal of Medicine, (348:15), 2003, 1423–1424.
  • Korzaan, M.L. and Boswell, K.T. “The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions,” Journal of Computer Information Systems, (48:4), 2008, 15–24.
  • Leino-Kilpi, H.; Välimäki, M; Dassen, T; Gasull, M.; Lemonidou, C.; Scott, A.; and Arndt, M. “Privacy: a review of the literature,” International Journal of Nursing Studies, (38:6), 2000, 663–671.
  • Lending, D. and Dillon, T.W. “The effects of confidentiality on nursing self-efficacy with information systems,” International Journal of Health Information Systems and Informatics, (2:3), 2007. 49–64.
  • Marakas, G.M., Yi, M.Y., and Johnson, R.D. “The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research,” Information Systems Research, (9:2), 1998, 126–163.
  • Marr, P., Duthie, E., Glassman, K., Janovas, D., Kelly, J., Graham, E., Kovner, C., Rienzi, A., Roberts, N., and Schick, D. “Bedside Terminals and quality of nursing documentation,” Computers in Nursing, (11:4), 1993, 176–182.
  • McDowell, D., Dillon, T.W., Salimian, F., and Conklin, D. “A preliminary study: Capturing Perceived Accuracy and Confidentiality of traditional and computerized patient records,” Proceedings of Association for Information Systems, August 1998.
  • McDowell, D.E., Dillon, T.W., and Lending, D. “Perceived quality benefits influenced by usefulness and documentation accuracy of information systems,” CIN: Computers, Informatics, Nursing, (26:6), 2008, 350–357.
  • Nahm, R. and Poston, I. “Measurement of the effects of an integrated Point-of Care computer system on Quality of Nursing Documentation and Patient Satisfaction,” Computers in Nursing, (18:5), 2000, 220–229.
  • Nauright, L.P. and Simpson R. “Benefits of hospital information systems as seen by front-line nurses and general hospital staff,” JONA, (24:4S), 1994, 26–32.
  • Ogletree, S.M. and Williams, S.W. “Sex and Sex-Typing Effects on Computer Attitudes and Aptitude,” Sex Roles, (23:11/12), 1990, 703–712.
  • Pearson, J.M. and Pearson, A.M. “An Exploratory Study Into Determinning the Relative Importance of Key Criteria in Web Usability: A Multi-criteria Approach,” Journal of Computer Information Systems, (48:4), 2008, 115–127.
  • Raghupathi, W, and Tan, J. “Strategic IT Applications in Health Care,” Communications of the ACM, (45:12), 2002, 56–61.
  • Rittman, M. R., and Gorman, R. H. “Computerized databases: privacy issues in the development of the Nursing Minimum Data Set,” Computers in Nursing, (10:1), 1992, 14–18.
  • Sheng, H.; Nah, F.F.; and Siau, K. “An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns,” Journal of the Association for Information Systems, (9:6), 2008, 344–376.
  • Tafti, M.H.A. and Shirani, A.I. “Patterns of use and prospects for adoption of the Internet technology: An empirical study,” The Journal of Computer Information Systems, (38:1), 1997, 104–111.
  • Timmons, S. Nurses resisting information technology. Nursing Inquiry, (10:4), 2003, 257–269.
  • Venkatesh, V. “Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model,” Information Systems Research, (11:4), 2000, 342–365.
  • Venkatesh, V, and Davis, F.D. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science, (46:2), 2000, 186–204.
  • White, G.L., Shah, J.R., Cook, J.R., and Mendez, F. “Relationship between Information Privacy Concerns and Computer Self-Efficacy,” International Journal of Technology and Human Interaction, (4:2), 2008, 52–82.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.