Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards health information application in Smart National Identity Card. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the factors of trust, perceived risk, Privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. Empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT) model, UTAUT2 model, Smart National Identity Card (SNIC), Health information application, Privacy Calculus Model (PCM).

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1097042

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3011

References:


[1] Mahmut, T. (2011). Identifying Factors that facilitate the use of Multi- Purpose Smart Cards by University Students: An empirical investigation. Informatics institute. Ankara, Middle East Technical University Master 99.
[2] Fancher, C. (1997). "In your pocket: smartcards." Spectrum, IEEE 34(2)(47-53).
[3] Yeow, P. H. P., Loo, W.H. (2009). "Acceptability of ATM and transit applications embedded in multipurpose smart identity card: An exploratory study in Malaysia." International Journal of Electronic Government Research, 5 (2), 37-56 (IGI Publishing; Scopus journal).
[4] Jim Briggs, J. B. (2001). Smart cards in health, Healthcare Computing Group, University of Portsmouth, Portsmouth, PO1 3AE.
[5] Loo W. H., Yeow, P.H.P., & Chong, S.C. (2011). "Acceptability of Multipurpose Smart National Identity Card: An Empirical Study." Journal of Global Information Technology Management 14 (1), 35-58. (Thomson ISI journal).
[6] Yeow, P. H. P., Loo, Wee Hong and Chong, Siong Choy (2007). "Accepting Multipurpose “Smart” Identity Cards in a Developing Country." Journal of Urban Technology 14: 1, 23 — 50.
[7] Ghazali, D. B. "More with Mykad."
[8] Department, M. N. R. (2012). "Available: http: //www.jpn.gov.my/en/ informasi/main-applications.”
[9] Mallika, K. (2011). Patient Acceptance Analysis on National ID Smart Card in Health Care Orgarnization Using a Thailand Hospital Example. School of Health Care Administration, Taipei Medical University. Master 69.
[10] Yeow P.H.P., Miller. (2005). "The Attitude of Malaysians towards MyKad." Proceedings of the 4th International Conference on Information Technology in Asia 2005 (CITA ’05).
[11] Aisha, F. B. (2011). Smart Card Systems: Managing Risks and Modelling security protocols using systemc and Transaction level Modeling School of electronic and Computer Science Southampton. PHD.
[12] N. Anju Latha*, B. R. M., U. Sunitha (2012). "Smart Card Based Integrated Electronic Health. Record System for Clinical Practice." www.ijacsa.thesai.org.
[13] Sellappans, R., S. S. Chua, et al. (2013). "Health innovation for patient safety improvement." Australasian Medical Journal 6(1): 60-63.
[14] Helen Cripps, C. S., Vesna Prijatelj (2012). Smart Health Care Cards: Are they applicable in the Australian context? 25th Bled eConference eDependability: Reliable and Trustworthy eStructures, eProcesses, eOperations and eServices for the Future Bled, Slovenia https://domino.fov.uni-mb.si/proceedings.nsf/0/.../P34_Cripps_43.pdf .
[15] Rana (2012). Evaluating Suitability of Alternative Theoretical Paradigm for Examining Citizen Adoption of E-Government, Information Systems Evaluation and integration group (ISEing), Brunel University, London, United Kingdom.
[16] Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003). "User Acceptance of Information Technology: Toward a Unified View." MIS Quarterly (27:3), pp. 425-478.
[17] Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and user acceptance of information technology.” MIS Quarterly 13(3): 319– 340.
[18] Ajzen, I. T. T. o. P. B.,” Organizational Behavior and Human Decision Processes (50:2), pp. 179-211. (1991). "The Theory of Planned Behavior." Organizational Behavior and Human Decision Processes 50(2): 179-211.
[19] Taylor S, T. P. (1995). "Decomposition and crossover effects in the theory of planned behaviour: A study of consumer adoption." International Journal of Research in Marketing 12(2): 137-155.
[20] Rogers, E. M. (2003). "Diffusion of innovations (5th ed.)." New York: Free Press.
[21] Thompson Ronald L., C. A. H., Jane M. Howell. (1991). "Personal Computing: Toward a Conceptual Model of Utilization." MIS Quarterly 15.
[22] Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ.
[23] Schaupp L.C. Carter L, M. M. E. (2010). "E-file adoption: A study of U.S. taxpayers’ intentions." Computers in Human Behavior 26(636- 644).
[24] Venkatesh Viswanath, J. Y. L. T., Xin Xu (2012). "Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology." MIS Quarterly Vol. 36 No. 1 pp. 157-178/March 2012.
[25] Carter L., S. L. C., Hobbs J, Campbell R. (2011). "The role of security and trust in the adoption of online tax filing’. Transforming Government: People, Process and Policy." Transforming Government: People, Process and Policy 5(4): 303-318.
[26] Chan F.K.Y. Thong J.Y.L. Venkatesh, V. B., S.A. Hu, P.J-H and Tam, K.Y. (2010). "Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology." Journal of the Association for Information Systems 11(10): 519-549.
[27] Van Dijk J.A.G.M. Peters O, E. W. (2008). "Explaining the acceptance and use of government Internet services: A multivariate analysis of 2006 survey data in the Netherlands." Government Information Quarterly 25: 379-399.
[28] Carter L, S. L. C. (2009). "Relating Acceptance and Optimism to E-File Adoption." International Journal of Electronic Government Research 5(3): 62-74.
[29] Wang Y-S, S. Y.-W. (2009). "Why do people use information kiosks: A validation of the Unified Theory of Acceptance and Use of Technology." Government Information Quarterly 26 158-165.
[30] Dinev, T. (2006). "Privacy calculus model in e-commerce” European Journal of Information Systems.
[31] H. Jeff Smith, T. D., Heng Xu (2011). "Information Privacy Research: An Interdisciplinary Review." MIS Quarterly 35(4): 989-1015.
[32] Rindfleisch, T. C. (1997). "Privacy, Information Technology, and Health Care." Communications of the ACM 40(8): 92-100.
[33] Budnitz, M. E. (1998). "Privacy Protection for Consumer Transactions in Electronic Commerce: Why Self-Regulation Is Inadequate " South Carolina Law Review 49.
[34] Wald, M. L. (2004). "Threats and responses: The airlines; U.S. wants all air traveler files for security test.” New York Times (September 22) 1.
[35] David, D. (2013). Electronic Personal Health Records: A Matter of Trust. The School of Graduate Studies, McMaster University PhD: 149.
[36] Willison, D. J., Schwartz, L., Abelson, J., Charles, C., Swinton, M., Northrup, D., & and L. Thabane (2007). "Alternatives to Project- Specific Consent for Access to Personal Information for Health Research: What Is the Opinion of the Canadian
[37] Mcknight DH, C. V., Kacmar C (2002). "Developing and validating trust measures for e-commerce: an integrative typology." Information Systems Research 13(3), 334–359.
[38] Willison, D. J., V. Steeves, C. Charles, L. Schwartz, J. Ranford, and J. C. G. Agarwal, L. Thabane. (2009). " Consent for use of personal information for health research: Do people with potentially stigmatizing health conditions and the general public.
[39] Coy, K. L. J. (2001). "The current privacy environment: Implications for third-party research." Continuing Ed. Health Professions 21(4): 203– 214.
[40] Mayer RC, D. J., Schoorman FD (1995). "An integrative model of organizational trust.” Acad Manage Rev 20:709-734.
[41] Gefen D., K., E., Straub, D.W. (2003). "Trust and TAM in online shopping: an integrated model.” MIS Quarterly 27 (1): 51-90.
[42] Rotter, L. B. (1971). “Generalized expectations for interpersonal trust.” American Psychologist 26 (5): 443–452.
[43] McKnight, D. H., Cummings, L.L., Chervany, N.L., (1998). "Initial trust formation in new organizational relationships." Academy of Management Review 23 (3): 473–490.
[44] Naser, C., Alpert, S. A., (1999) Protecting the Privacy of Medical Records: An Ethical Analysis. White Paper,National Coalition for Patient Rights, Lexington, MA.
[45] Alpert, S. A. (1998). "Health Care Information: Confidentiality, Access, and Good Practice, in Ethics, Computing, and Medicine: Informatics and the Transformation of Health Care, K. W.Goodman (ed.), New York:." Cambridge University Press, pp.: 75-101.
[46] Yeow, P. H. P., et al. (2012). "Ergonomics issues in national identity card for homeland security, Applied Ergonomics." http://dx.doi.org/10.1016/j.apergo.2012.04.017.
[47] Im, I., Kim, Y., Han H.-J. 2008. (2008). "The Effects of Perceived Risk and Technology Type on Users’ Acceptance of Technologies." Information & Management 45(1): 1-9.
[48] Ji-Hwan Lee, S. W. K., Chi Hoon Song (2010) The Effects of Trust and Perceived Risk on Users’ Acceptance of ICT Services. KAIST Business School Working Paper Series Index:
[49] Thiesse, F. (2007). "RFID, privacy and the perception of risk: A strategic framework." Journal of Strategic Information Systems 16: 214- 232.
[50] Lui, H. K., Jamieson R. (2003). Integrating Trust and Risk Perceptions in Business-to-Consumer Electronic Commerce with the Technology Acceptance Model. European Conference on Information System (ECIS), Naples.
[51] Pavlou, P. (2003). "Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model." International Journal of Electronic Commerce 7 (3): 69–103.
[52] Al-Sobhi F. Weerakkody, V. a. E.-H., R. (2011). "The Relative Importance of Intermediaries in eGovernment Adoption: A study of Saudi Arabia." M. Janssen, H.J. Scholl, M.A. Wimmer, and Y-H. Tan (Eds.): EGOV 2011, LNCS 6846, 62-74.
[53] Hussein R., M. N. A. A. R., Mahmud M, Aditiawarman U. (2010). "G2C Adoption of E- Government in Malaysia: Trust, Perceived Risk and Political Self-Efficacy." International Journal of Electronic Government Research 6(3): 57-72.
[54] Chiang, L. (2009). "Trust and security in the e-voting system’. Electronic Government." an International Journal 6(4): 343-360.
[55] McLeod Jr. A.J, P. S. E. (2009). "Security and Privacy Trust in EGovernment: Understanding System and Relationship Trust Antecedents." 42nd Hawaii International Conference on System Sciences 1-10.
[56] Smith, J. (2006). "Determining Key Factors in E-Government Information System Security." Information Systems Management 23-32.
[57] France Be´langer, L. C. (2008). "Trust and risk in e-government adoption."Journal Strategic Information Systems doi:10.1016/j.jsis.2007.12.002.
[58] Ciborra C, N. D. D. (2005). "Good Governance, Development Theory, and Aid Policy: Risks and Challenges of E-Government in Jordan." Information Technology for Development 11(2): 141-159.
[59] Colesca, S. E. (2009). "Increasing E-Trust: A Solution to Minimize Risk in E-Government Adoption." Journal of Applied Quantitative Methods 4(1): 31-44.
[60] Lee S.M. Tan X, T. S. (2006). "M-government, from rhetoric to reality: learning from leading countries’. Electronic Government." An International Journal 3(2): 113-126.
[61] Loukis E, C. Y. (2011). "Why Do e-Government Projects Fail? Risk Factors of Large Information Systems Projects in the Greek Public sector." An International Comparison’. International Journal of Electronic Government Research 7(2): 59-77.
[62] Taiwo, A. A., A. K. Mahmood, et al. (2012). User acceptance of eGovernment: Integrating risk and trust dimensions with UTAUT model. Computer & Information Science (ICCIS), 2012 International Conference on.
[63] Yap Ai Kee, Y. C. N., Leau Yu Beng, and Tan Soo Fun (2012). "Security Issues on Identity Card in Malaysia." IA CSIT International Journal of Engineering and Technology Vol. 4 (No. 5).
[64] Bansal, G., F. M. Zahedi, D. Gefen (2010). "The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online." Decision Support Systems 49(2): 138-150.
[65] Gilbert, D., Kelly, L. L., and Barton, M. (2003). "Technophobia, gender influences and consumer decision-making for technology-related products." European Journal of Innovation Management, 6 (4), 253-263.
[66] Wang, Y. S., Wang, Y. M., Lin, H. H., and Tang, T. I. (2003). "Determinants of user acceptance of internet banking: An empirical study." International Journal of Service Industry Management, 14 (5), 501-519.
[67] Alshare, K. A., Freeze, R., Kwun, O. (2009). "Student intention to use expert systems: an exploratory study." J. Comput. Inf. Syst. 49 (4): 105e113.
[68] Simon, B., 2001. Knowledge media in education e a user acceptance in universities. and V. Master dissertation. Wirtschaftsuniversität Wien (2001). Knowledge media in education e a user acceptance in universities. Wirtschaftsuniversität Wien, Vienna. Master
[69] Sun, H. (2003). An integrative analysis of TAM: toward a deeper understanding of technology acceptance model. Proceedings of the 9th American Conference on Information Systems (the 9th AMCIS), Tampa, Florida.
[70] Bauer, R. A. (1960). Consumer behavior as risk-taking. In R. S. Hancock (Ed.), Dynamic marketing for a changing world. Chicago, American Marketing Association: 389-398.
[71] Warkentin, M., Gefen, D., Pavlou, P., Rose, G. (2002). "Encouraging citizen adoption of e-government by building trust." Electronic Markets 12 (3) 157–162.
[72] Mauricio Featherman, P. A. P. (2003). "Predicting e-services adoption: a perceived risk facets perspective." International Journal of Human- Computer Studies 59: 451-474.
[73] Richards, R. J. (2012). A Study of the Intent to Fully Utilize Electronic Personal Health
[74] Xin Li, T. J. H., Joseph S. Valacich Bernama (2008). "Why do we trust new technology? A study of initial trust formation with organizational information systems." Strategic Information System 17(1): 39–71.
[75] Wang, W., Benbasat, I. (2005). "Trust in and adoption of online recommendation agents." Journal of the Association for Information Systems 6(3): 72–101.
[76] McKnight, D. H. (2005). "Trust in information technology.” The Blackwell Encyclopedia of Management. Blackwell, Maiden, MA, 329– 331.
[77] Angst, C. M. a. R. A. (2009). "Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion." MIS Quarterly 33(2): 339-370.
[78] Chellappa, R. K., Sin, R. G. (2005). "Personalization Versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma." Information Technology and Management 6(2): 181-202.
[79] Donna, M. (2003). "Evaluating Electronic Commerce Acceptance with the Technology Acceptance Model." Journal of Computer Information Systems 44(2), 2003, 49-57.
[80] Gefen, D., and Straub, D. (1997). "Gender Differences in the Perception and Use of E-mail: An Extension to the Technology Acceptance Model." MIS Quarterly 21(4), 389-400.
[81] Vijayasarathy, L. R. (2004). "Predicting Consumer Intentions to Use Online Shopping: The Case for an Augmented Technology Acceptance Model." Information and Management 41(6), 747-762.
[82] Loo, W. H., Yeow, P.H.P. & Chong, S.C. (2009). "User acceptance of Malaysian government multipurpose smartcard applications." Government Information Quarterly, 26, 358-367. (Publisher: Elsevier; Thomson ISI).
[83] Venkatesh, V., Morris, M.G. (2000). "Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behaviour." MIS Quarterly, 24(1) 2000, 115- 139.
[84] Al-Gahtani, S. S., Hubona, G.S., and Wang, J. (2007). "Information Technology (IT) in Saudi Arabia: Culture and the Acceptance and Use of IT." Information and Management, 44(8), 681-691.
[85] Yuen, Y. Y., Yeow, P.H.P., Lim, N., and Saylani, N. (2010). "Internet Banking Adoption: Comparing Developed and Developing Countries." Journal of Computer Information Systems 51(1), 52-61.
[86] Limayem, M., Hirt, S. G., and Cheung, C. M. K. (2007). "How Habit Limits the Predictive Power of Intentions: The Case of IS Continuance." MIS Quarterly (31:4), pp. 705-737.
[87] Kim, S. S., Malhotra, N. K., and Narasimhan, S. (2005). "Two Competing Perspectives on Automatic Use: A Theoretical and Empirical Comparison." Information Systems Research (16:4), pp. 418-432.
[88] Brown, S. A., and Venkatesh, V. (2005). "Model of Adoption of Technology in the Household: A Baseline Model Test and Extension Incorporating Household Life Cycle." MIS Quarterly 29(4): 399-426.
[89] Van der Heijden, H. (2004). "User Acceptance of Hedonic Information Systems." MIS Quarterly 28 (4): 695-704.
[90] Thong J. Y. L., H., S. J., Tam, K. Y. (2006). "The Effects of Post- Adoption Beliefs on the Expectation Confirmation Model for Information Technology Continuance” International Journal of Human- Computer Studies 64(9): 799-810.
[91] Chan, K. Y., Gong, M., Xu, Y., Thong, J. Y. L. (2008). Examining User Acceptance of SMS: An Empirical Study in China and Hong Kong. 12th Pacific Asia Conference on Information System. Suzhou, China.
[92] Dodds, W. B., Monroe, K. B., and Grewal, D. (1991). "Effects of Price, Brand, and Store Information on Buyers." Journal of Marketing Research (28:3), pp. 307-3 19.
[93] Nisakorn Phichitchaisopa, T. N. (2013). "Factors Affecting the Adoption of Healthcare Information Technology” EXCLI Journal 12(ISSN 1611- 2156): 413-436.
[94] Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and user acceptance of information technology. ." MIS Quarterly 13(3): 319– 340.