265
Views
0
CrossRef citations to date
0
Altmetric
Articles

Understanding the Users’ Intention to Use the Three-Factor Authentication for Preserving the Privacy of Patient Data

ORCID Icon & ORCID Icon

References

  • Aggelidis, V. P., & Chatzoglou, P. D. (2009). Using a modified technology acceptance model in hospitals. International Journal of Medical Informatics, 78(2), 115–126. https://doi.org/10.1016/j.ijmedinf.2008.06.006
  • Audet, A.-M., Doty, M. M., Peugh, J., Shamasdin, J., Zapert, K., & Schoenbaum, S. (2004). Information technologies: When will they make it into physicians’ black bags? Medscape General Medicine, 6(4), 2–112.
  • Bagozzi, R. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8(4), 244–254. https://doi.org/10.17705/1jais.00122
  • Belanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. The Journal of Strategic Information Systems, 17(2), 165–176. https://doi.org/10.1016/j.jsis.2007.12.002
  • Bitner, M. J., Brown, S. W., & Meuter, M. L. (2000). Technology infusion in service encounters. Journal of the Academy of Marketing Science, 28(1), 138–149. https://doi.org/10.1177/0092070300281013
  • Burt, C. W., & Sisk, J. E. (2005). Which physicians and practices are using electronic medical records? Health Affairs, 24(5), 1334–1343. https://doi.org/10.1377/hlthaff.24.5.1334
  • Chau, P. Y. (2001). Influence of computer attitude and self-efficacy on IT usage behavior. Journal of End User Computing, 13, 26–33.
  • Chau, P. Y. K., & Hu, P. J. H. (2002). Investigating healthcare professionals’ decisions to accept telemedicine technology: An empirical test of competing theories. Information & Management, 39(4), 297–311. https://doi.org/10.1016/S0378-7206(01)00098-2
  • Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046
  • Chismar, W., & Wiley-Patton, S. (2002). Does the extended technology acceptance model apply to physicians. In: Proceedings of the 36th Hawaii International Conference on System Sciences (Vol. 6, pp. 160–167).
  • Chuttur, M. (2009). Overview of the technology acceptance model: Origins, developments and future directions. Indiana University.
  • Compeau, D. R., & Higgins, C. A. (1995, June). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189–211. https://doi.org/10.2307/249688
  • Curry, S. J. (2007). E-Health research and healthcare delivery: Beyond intervention effectiveness. American Journal of Preventive Medicine, 32(5), S127–S130. https://doi.org/10.1016/j.amepre.2007.01.026
  • Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  • Davis, F. D., & Venkatesh, V. (1996, July). A critical assessment of potential measurement biases in the technology acceptance model: Three experiments. International Journal of Human-Computer Studies, 45(1), 19–45. https://doi.org/10.1006/ijhc.1996.0040
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982
  • Dhagarra, D., Goswami, M., & Kumar, G. (2020). Impact of trust and privacy concerns on technology acceptance in healthcare: An indian perspective. International Journal of Medical Informatics, 141, 104164. https://doi.org/10.1016/j.ijmedinf.2020.104164
  • Faqih, K. M. S., & Jaradat, M. R. M. (2015). Mobile healthcare adoption among patients in a developing country environment: Exploring the influence of age and gender differences. International Business Research, 8(9), 142–174. https://doi.org/10.5539/ibr.v8n9p142
  • Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451–474. https://doi.org/10.1016/S1071-5819(03)00111-3
  • Gefen, D. (2000). E-commerce. The role of familiarity and trust. Omega, 28(6), 725–737. https://doi.org/10.1016/S0305-0483(00)00021-9
  • Ha, S., & Stoel, L. (2009). Consumer e-shopping acceptance: Antecedents in a technology acceptance model. Journal of Business Research, 62(5), 565–571. https://doi.org/10.1016/j.jbusres.2008.06.016
  • Hamid, A. Abd., Razak, F. Z. A., Bakar, A. A., & Abdullah, W. S. W. (2016). The effects of perceived usefulness and perceived ease of use on continuance intention to use e-government. Procedia Economics and Finance, 35, 644–649.
  • Handi, H., Hendratono, T., Purwanto, E., & Ihalauw, J. J. O. I. (2018). The effect of E-WOM and perceived value on the purchase decision of foods by using the go-food application as mediated by trust. Quality Innovation Prosperity, 22(2), 112–127. https://doi.org/10.12776/qip.v22i2.1062
  • Hoque, M. R., Bao, Y., & Sorwar, G. (2017). Investigating factors influencing the adoption of e-Health in developing countries: A patient's perspective. Informatics for Health and Social Care, 42(1), 1–17. https://doi.org/10.3109/17538157.2015.1075541
  • Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91–112. https://doi.org/10.1080/07421222.1999.11518247
  • Hung, S.-Y., Yu, W.-J., Tsai, M.-F., & Yen, D. C. (2013). What drives physicians’ intention to use electronic medical record system: the roles of perceived service level, computer self-efficacy, and perceived risk [Paper presentation]. Pacific Asia Conference on Information System, January.
  • Jahangir, N., & Begum, N. (2008). The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking. African Journal of Business Management, 2, 32–40.
  • Jan, A. U., & Contreras, V. (2011). Technology acceptance model for the use of information technology in universities. Computers in Human Behavior, 27(2), 845–851. https://doi.org/10.1016/j.chb.2010.11.009
  • Jayabalan, M., & O’Daniel, T. (2019). A study on authentication factors in electronic health records. Journal of Applied Technology and Innovation, 3.
  • Jha, A. K., Bates, D. W., Jenter, C., Orav, E. J., Zheng, J., Cleary, P., & Simon, S. R. (2009). Electronic health records: Use, barriers and satisfaction among physicians who care for black and Hispanic patients. Journal of Evaluation in Clinical Practice, 15(1), 158–163. https://doi.org/10.1111/j.1365-2753.2008.00975.x
  • Kamal, S. A., Shafiq, M., & Kakria, P. (2020). Investigating acceptance of telemedicine services through an extended technology acceptance model (TAM). Technology in Society, 60, 101212. https://doi.org/10.1016/j.techsoc.2019.101212
  • Kaplan, L. B., Szybillo, G. J., & Jacoby, J. (1972). The components of perceived risk. Proceedings of the Annual Conference of the Association for Consumer Research, 10, 382–393.
  • Kaplan, L. B., Szybillo, G. J., & Jacoby, J. (1974). Components of perceived risk in product purchase: A cross-validation. Journal of Applied Psychology, 59(3), 287–291. https://doi.org/10.1037/h0036657
  • Kardas, G., & Tunali, E. T. (2006). Design and implementation of a smart card based healthcare information system. Computer Methods and Programs in Biomedicine, 81(1), 66–78. https://doi.org/10.1016/j.cmpb.2005.10.006
  • Kasilingam, D. L. (2020). Understanding the attitude and intention to use smartphone chatbots for shopping. Technology in Society, 62, 101280–101280. https://doi.org/10.1016/j.techsoc.2020.101280
  • Kassirer, J. P. (2000, November–December). Patients, physicians, and the Internet. Health Affairs, 19(6), 115–123. https://doi.org/10.1377/hlthaff.19.6.115
  • Khorrami-Arani, O. (2001, January). Researching computer self-efficacy. International Educational Journal, 4.
  • Kim, C., Mirusmonov, M., & Lee, I. (2010). An empirical examination of factors influencing the intention to use mobile payment. Computers in Human Behavior, 26(3), 310–322. https://doi.org/10.1016/j.chb.2009.10.013
  • King, W. R., & He, J. (2006). A meta-analysis of the technology acceptance model. Information & Management, 43(6), 740–755. https://doi.org/10.1016/j.im.2006.05.003
  • Kleist, V. F. (2007). Building technologically based online trust: Can the biometrics industry deliver the online trust silver bullet? Information Systems Management, 24(4), 319–329. https://doi.org/10.1080/10580530701586045
  • Koller, M. (1988). Risk as a determinant of trust. Basic and Applied Social Psychology, 9(4), 265–276. https://doi.org/10.1207/s15324834basp0904_2
  • Kuo, K. M., Chen, Y. C., Talley, P. C., & Huang, C. H. (2018). Continuance compliance of privacy policy of electronic medical records: The roles of both motivation and habit. BMC Medical Informatics and Decision Making, 18(1), 135–135. https://doi.org/10.1186/s12911-018-0722-7
  • Lakshmi Devasena, C. (2018). Three-factor authentication for fortified login to ensure privacy preservation and improved security. International Journal of Applied Engineering Research, 13, 7576–7579.
  • Lanseng, E., & Andreassen, T. W. (2007). Electronic healthcare: A study of people’s readiness and attitude toward performing self diagnosis. International Journal of Service Industry Management, 18(4), 394–417. https://doi.org/10.1108/09564230710778155
  • Lee, M. K. O., & Turban, E. (2001). A trust model for consumer internet shopping. International Journal of Electronic Commerce, 6(1), 75–91. https://doi.org/10.1080/10864415.2001.11044227
  • Lee, M.-C. (2009). Factors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130–141. https://doi.org/10.1016/j.elerap.2008.11.006
  • Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International Journal of Medical Informatics, 88, 8–17. https://doi.org/10.1016/j.ijmedinf.2015.12.010
  • Lin, F., Fofanah, S. S., & Liang, D. (2011). Assessing citizen adoption of e-government initiatives in Gambia: A validation of the technology acceptance model in information systems success. Government Information Quarterly, 28(2), 271–279. https://doi.org/10.1016/j.giq.2010.09.004
  • Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification on the construct and an integrative framework for research. Information Systems Research, 9(2), 126–163. https://doi.org/10.1287/isre.9.2.126
  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3–4), 297–323. https://doi.org/10.1016/S0963-8687(02)00020-3
  • Mehmood, Z., Ghani, A., Chen, G., & Alghamdi, A. S. (2019). Authentication and secure key management in e-health services: A robust and efficient protocol using biometrics. IEEE Access, 7, 113385–113397. https://doi.org/10.1109/ACCESS.2019.2935313
  • Mitchell, V. (1999). Consumer perceived risk: Conceptualisations and models. European Journal of Marketing, 33(1/2), 163–195. https://doi.org/10.1108/03090569910249229
  • Murray, E., Lo, B., Pollack, L., Donelan, K., Catania, J., Lee, K., Zapert, K., & Turner, R. (2003). The impact of health information on the internet on health care and the physician-patient relationship: National US survey among 1.050 US physicians. Journal of Medical Internet Research, 5(3), e17. https://doi.org/10.2196/jmir.5.3.e17
  • Ngugi, B., Kamis, A., & Tremaine, M. (2011). Intention to use biometric systems. e-Service Journal, 7, 20–46. https://doi.org/10.2979/eservicej.7.3.20
  • Octari, V., & Purwanto, E. (2017). The role of Guanxi and Xinyong on the relationship between supplier and retailer among Chinese entrepreneurs in Bekasi City, Indonesia. International Journal of Information, Business and Management, 9, 22–36.
  • Ortega-Egea, J. M., & Román-González, M. V. (2011). Explaining physicians’ acceptance of EHCR systems: An extension of TAM with trust and risk factors. Computers in Human Behaviour, 27, 319–332.
  • Pare, G., Sicotte, C., & Jacques, H. (2006). The effects of creating psychological ownership on physicians’ acceptance of clinical information systems. Journal of American Medical Informatics Association, 13, 195–205.
  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce. integrating trust and risk with the technology acceptance model. International Journal of Electronics and Communications, 7, 101–134.
  • Pikkarainen, T., Pikkarainen, K., Karjaluoto, H., & Pahnila, S. (2004, July). Consumer acceptance of online banking: An extension of the technology acceptance model. Internet Research, 14(3), 224–235. https://doi.org/10.1108/10662240410542652
  • Purwanto, E., & Budiman, V. (2020). Applying the technology acceptance model to investigate the intention to use e-health: A conceptual framework. Technology Reports of Kansai University, 62, 245–259.
  • Raafat George Saad (2007). Dimensions of perceived usefulness: Toward enhanced assessment. Decision Sciences Journal of Innovative Education, 5, 289–310.
  • Renuka, K., Kumari, S., & Li, X. (2019). Design of a secure three-factor authentication scheme for smart healthcare. Journal of Medical Systems, 43(5), 1–12. https://doi.org/10.1007/s10916-019-1251-3
  • Ruppel, C., Underwood-Queen, L., & Harrington, S. J. (2003). e-Commerce: The roles of trust, security, and type of e-commerce involvement. e-Service Journal, 2, 25–45. https://doi.org/10.2979/esj.2003.2.2.25
  • Sankaranarayanan, J., & Sallach, R. E. (2014). Rural patients' access to mobile phones and willingness to receive mobile phone-based pharmacy and other health technology services: A pilot study. Telemedicine Journal and e-Health, 20(2), 182–185. https://doi.org/10.1089/tmj.2013.0150
  • Sheppard, B. H., Hartwick, J., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future-research. Journal of Consumer Research, 15(3), 325–343. https://doi.org/10.1086/209170
  • Stone, R. N., & Gronhaug, K. (1993). Perceived risk: Further considerations for the marketing discipline. European Journal of Marketing, 27(3), 39–50. https://doi.org/10.1108/03090569310026637
  • Suh, B., & Han, I. (2003). The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronics and Communications, 7, 135–161.
  • Taherdoost, H. (2018). A review of technology acceptance and adoption models and theories. Procedia Manufacturing, 22, 960–967. https://doi.org/10.1016/j.promfg.2018.03.137
  • Thulare, T., Herselman, M., & Botha, A. (2020). A scoping review on identifying aspects of data integrity in health information systems for South Africa. In Advances in Big Data, Computing and Data Communication Systems (icABCD 2020), September.
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. https://doi.org/10.1287/mnsc.46.2.186.11926
  • Wu, J.-H., Shen, W.-S., Lin, L.-M., Greenes, R. A., & Bates, D. W. (2008). Testing the technology acceptance model for evaluating healthcare professionals' intention to use an adverse event reporting system. International Journal for Quality in Health Care, 20(2), 123–129. https://doi.org/10.1093/intqhc/mzm074
  • Yi, M. Y., Jackson, J. D., Park, J. S., & Probst, J. C. (2006). Understanding information technology acceptance by individual professionals: Toward an integrative view. Information & Management, 43(3), 350–363. https://doi.org/10.1016/j.im.2005.08.006
  • Zeithaml, V. A., Parasuraman, A., & Malhotra, A. (2002). Service quality delivery through web sites: A critical review of extant knowledge. Journal of the Academy of Marketing Science, 30(4), 362–375. https://doi.org/10.1177/009207002236911

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.