Security/Privacy Perceptions in Patient Use of Online Medical Records: Study From a Large National Survey

被引:0
作者
Mukhopadhyay, Surma [1 ]
Basak, Ramsankar [2 ]
Reithel, Brian J. [3 ]
机构
[1] Longwood Univ, Farmville, VA USA
[2] Univ N Carolina, Chapel Hill, NC 27515 USA
[3] Univ Mississippi, Management Informat Syst, Sch Business Adm, University, MS 38677 USA
关键词
Data Breach; Electronic Health Records; Health Information; Information Security; National Survey; Online Medical Records; Patient; Privacy; Technology Acceptance; Vulnerability; ELECTRONIC HEALTH RECORDS; INFORMATION-TECHNOLOGY; PERCEIVED USEFULNESS; DIGITAL DIVIDE; ADOPTION; PRIVACY; ACCEPTANCE; SERVICES; ENCOURAGEMENT; ACTIVATION;
D O I
10.4018/IJHISI.295816
中图分类号
R-058 [];
学科分类号
摘要
Data breaches expose individuals to economic, mental, and social trauma. Electronic health information of individuals not only includes reports of medical diagnosis, medication histories, but also comprises personally identifiable information (PII) (e.g, birth date). The authors examined the association of vulnerability perception-defined as privacy or security breach concerns-and provider encouragement with the use of online medical records (OMR) and moderating effects of provider encouragement and age in the relationship between vulnerability and usage. Data came from a national population-based survey, the Health Information National Trends Survey (HINTS). This study included 1,770 adult individuals, many of whom are chronic disease patients or cancer survivors. The majority of these subjects did report use of OMR. This research found security/privacy-related vulnerability and provider encouragement significantly predict patients' use of OMR. Healthcare providers and developers should work with patients to mitigate concerns and enable patients to derive benefits from using online medical records.
引用
收藏
页数:18
相关论文
共 60 条
  • [1] PERCEIVED USEFULNESS, EASE OF USE, AND USAGE OF INFORMATION TECHNOLOGY - A REPLICATION
    ADAMS, DA
    NELSON, RR
    TODD, PA
    [J]. MIS QUARTERLY, 1992, 16 (02) : 227 - 247
  • [2] Agarwal R, 2006, ADV MANAG INFORM SYS, V6, P357
  • [3] THE THEORY OF PLANNED BEHAVIOR
    AJZEN, I
    [J]. ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) : 179 - 211
  • [4] American Hospital Association (AHA), 2016, TREND REP
  • [5] American Medical Association (AMA), 2017, TREND REP
  • [6] Patient activation and use of an electronic patient portal
    Ancker, Jessica S.
    Osorio, Snezana N.
    Cheriff, Adam
    Cole, Curtis L.
    Silver, Michael
    Kaushal, Rainu
    [J]. INFORMATICS FOR HEALTH & SOCIAL CARE, 2015, 40 (03) : 254 - 266
  • [7] Why we need a new definition of information security
    Anderson, JM
    [J]. COMPUTERS & SECURITY, 2003, 22 (04) : 308 - 313
  • [8] Angst CM, 2009, MIS QUART, V33, P339
  • [9] Appari Ajit, 2010, International Journal of Internet and Enterprise Management, V6, P279, DOI 10.1504/IJIEM.2010.035624
  • [10] Personal health records: a scoping review
    Archer, N.
    Fevrier-Thomas, U.
    Lokker, C.
    McKibbon, K. A.
    Straus, S. E.
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2011, 18 (04) : 515 - 522