跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.23) 您好!臺灣時間:2025/10/27 07:55
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳桂芬
研究生(外文):Chen, Kuei-Fen
論文名稱:影響提供個人健康資訊意願之實證研究
論文名稱(外文):Factors Affecting Personal Health Information Disclosure
指導教授:黃興進黃興進引用關係
指導教授(外文):Hwang, Hsin-Ginn
口試委員:黃興進林妙聰洪萬富郭光明
口試委員(外文):Hwang, Hsin-GinnLin, Maio-TsongHung, Won-FuKuo, Kuang-Ming
口試日期:2015-7-15
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:英文
論文頁數:56
中文關鍵詞:健康資訊隱私顧慮電子病歷交換醫院聲譽隱私政策報酬社會交換理論
外文關鍵詞:Concern for Health Information Privacy (CFHIP)EMR ExchangeHospital ReputationPrivacy PolicyRewardSocial Exchange Theory (SET)
相關次數:
  • 被引用被引用:0
  • 點閱點閱:203
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
有越來越多的醫療機構開始實施電子病歷及跨院互通,然而,民眾的健康資訊隱私顧慮可能會造成在就醫時,不願意提供其完整的個人資訊。本研究主要瞭解民眾基於健康資訊隱私顧慮基礎下,提供其個人健康資訊的意願。此外,為了更完整瞭解民眾提供其個人健康資訊的意願,亦基於社會交換理論的觀點,試圖探討在組織方面,民眾的健康資訊隱私顧慮是由哪些因素所影響。問卷主要以網路問卷進行,並以138份問卷來進行資料的驗證。所收集到的資料以結構方程模式進行驗證與分析,研究結果顯示在四個假說之中,有三個假說顯著。本研究結果證實,社會交換理論的觀點適用於解釋電子病歷交換的情境下,民眾提供其個人健康資訊的意願。
The implementation of electronic medical record (EMR) exchange is an important tread. However, EMR exchange suffers from some problems. For example, concern for health information privacy may cause individuals unwilling to provide personal health information. To better understand individuals’ intention, we tried to examine the correlation between individuals’ concern for information privacy and their intention. Beside this, based on a social exchange theory perspective, the antecedents in organizational dimension of CFIP were examined. In this study, our proposed model was empirically validated by 138 respondents in Taiwan. Four hypotheses were assessed by Structural Equation Modeling (SEM) via statistical analysis software SmartPLS 3.0. Three hypotheses were significant supported which indicate that all of the components of social exchange theory were critical, and the proposed model is applicable in EMR exchange context.
Chapter 1 Introduction 1
1.1 Background 1
1.2 Justification 4
1.3 Research Purpose 5
1.4 Research Questions 5
1.5 Research Scope 6
1.6 Research Process 6
Chapter 2 Literature Review 8
2.1 EMR and EMR exchange 8
2.2 Privacy and Existing Scales 9
2.2.1 Privacy, Information Privacy, and Concern for Information Privacy 9
2.2.2 Existing Scales 10
2.2.3 Prior Research in CFIP – Li (2011)’s Research 18
2.3 Antecedents of CFIP — Organizational Dimension 20
2.3.1 Hospital Reputation 22
2.3.2 Privacy Policy 23
2.3.3 Reward 24
2.4 Behavior Intention 25
Chapter 3 Research Framework and Hypotheses Development 26
3.1 Development of the Research Framework 26
3.2 Development of the Hypotheses—CFHIP 27
3.3 Development of the Hypotheses—Antecedents of CFHIP 27
Chapter 4 Research Methodology 29
4.1 Instrument Development Procedure 29
4.2 Expert Panels and Pilot-test 32
4.3 Data Collecting Procedure 34
Chapter 5 Data Analysis and Results 35
5.1 Demographic Data of Respondents 35
5.2 Reliability and Validity 36
5.2.1 Item Analysis and Reliability Estimates 36
5.2.2 Validity 36
5.2.3 Exploratory Factor Analysis and Confirmatory Factor Analysis 39
5.3 Hypotheses Testing 42
Chapter 6 Discussion and Conclusion 43
6.1 Discussion of Findings 43
6.2 Limitations and Future Research 44
6.3 Theoretical and Practical Implications 45
6.4 Conclusions 45
Reference 46
Appendix A—Measurement Items 54
Andrade, E. B., Kaltcheva, V., &; Weitz, B. (2002). Self-disclosure on the web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350-353.
Angst, C. M., &; Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370.
Bagozzi, R. P., Yi, Y., &; Nassen, K. D. (1998). Representation of measurement error in marketing variables: Review of approaches and extension to three-facet designs. Journal of Econometrics, 89(1), 393-421.
Bansal, G., &; Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
Beldad, A., De Jong, M., &; Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857-869.
Buchanan, T., Paine, C., Joinson, A. N., &; Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165.
Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Interactive Marketing, 11(3), 44-57.
Cook, K. S. (1977). Exchange and power in networks of interorganizational relations. Sociological Quarterly, 62-82.
Culnan, M. J., &; Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342.
Davidson, S. M., &; Heineke, J. (2007). Toward an effective strategy for the diffusion and use of clinical information systems. Journal of the American Medical Informatics Association, 14(3), 361-367.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.
Dinev, T., &; Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour &; Information Technology, 23(6), 413-422.
Dinev, T., &; Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Donaldson, T., &; Dunfee, T. W. (1994). Toward a unified conception of business ethics: Integrative social contracts theory. Academy of Management Review, 19(2), 252-284.
Doll, W. J., Xia, W., &; Torkzadeh, G. (1994). A confirmatory factor analysis of the end-user computing satisfaction instrument. MIS Quarterly, 453-461.
Eastlick, M. A., Lotz, S. L., &; Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877-886.
Faja, S., &; Trimi, S. (2006). Influence of the web vendor's interventions on privacy-related behaviors in e-commerce. Communications of the Association for Information Systems, 17(1), 27.
Fornell, C., &; Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50.
Gefen, D., &; Straub, D. (2005). A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the Association for Information systems, 16(1), 5.
Gefen, D., Straub, D., &; Boudreau, M. C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the association for information systems, 4(1), 7.
Hair, J. F., Anderson, R. E., Tatham, R. L., &; William, C. (1998). Black (1998), Multivariate data analysis: Upper Saddle River, NJ: Prentice Hall.
Hannan, T. J. (1996). Electronic medical records. Health Informatics: An Overview, 133-148.
Homans, G. C. (1958). Social behavior as exchange. American journal of sociology, 597-606.
Hooper, D., Coughlan, J., Mullen, M. (2008). Structural Equation Modelling: Guidelines for Determining Model Fit. Electronic Journal of Business Research Methods, 6(1), 53-60
Hu, L. T., &; Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, 6(1), 1-55.
Hwang, H. G. &; Lin, H. T. (2012). Concern for Electronic Medical Records Privacy—The Construct, the Instrument, and Causal Models. (NSC100-2410-H009-012-MY2).
Kline, T. J. (2005). Psychological testing: A practical approach to design and evaluation. Sage Publications.
Lee, C. H., &; Cranage, D. A. (2011). Personalisation–privacy paradox: The effects of personalisation and privacy assurance on customer responses to travel Web sites. Tourism Management, 32(5), 987-994.
Lee, D., Larose, R., &; Rifon, N. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour &; Information Technology, 27(5), 445-454.
Li, Y. (2011). Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453-496.
Li, Y. (2014). A multi-level model of individual information privacy beliefs. Electronic Commerce Research and Applications, 13(1), 32-44.
Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343-354.
Lwin, M., Wirtz, J., &; Williams, J. D. (2007). Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.
Malhotra, N. K., Kim, S. S., &; Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Marsh, H. W., &; Hocevar, D. (1985). Application of confirmatory factor analysis to the study of self-concept: First-and higher order factor models and their invariance across groups. Psychological bulletin, 97(3), 562.
Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 5-12.
Mercuri, R. T. (2004). The HIPAA-potamus in health care data security. Communications of the ACM, 47(7), 25-28.
Milberg, S. J., Burke, S. J., Smith, H. J., &; Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65-74.
Mira, J. J., Lorenzo, S., &; Navarro, I. (2013). Hospital reputation and perceptions of patient safety. Medical principles and practice: international journal of the Kuwait University, Health Science Centre, 23(1), 92-94.
Mohamed, N., &; Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375.
Nam, C., Song, C., Lee, E., &; Park, C. I. (2006). Consumers’ privacy concerns and willingness to provide marketing-related personal information online. Advances in Consumer Research, 33, 212.
Nguyen, N., &; Leblanc, G. (2001). Corporate image and corporate reputation in customers’ retention decisions in services. Journal of retailing and Consumer Services, 8(4), 227-236.
Nunnally, J. C., &; Bernstein, I. H. (1994). The assessment of reliability. Psychometric theory, 3, 248-292.
Nunnally, J. C., Bernstein, I. H., &; Berge, J. M. T. (1967). Psychometric theory, 226. New York: McGraw-Hill.
Pavlou, P. A., &; Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 115-143.
Pavlou, P. A., Liang, H., &; Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: a principal-agent perspective. MIS Quarterly, 31(1), 105-136.
Phelps, J., Nowak, G., &; Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of public policy &; marketing, 19(1), 27-41.
Rahman, M., &; Kreider, C. (2012). Information Security Principles for Electronic Medical Record (EMR) Systems. AMCIS 2012 Proceedings, 9.
Segars, A. H., &; Grover, V. (1993). Re-examining perceived ease of use and usefulness: A confirmatory factor analysis. MIS Quarterly, 517-525.
Sehgal, A. R. (2010). The role of reputation in US News &; World Report's rankings of the top 50 American hospitals. Annals of internal medicine, 152(8), 521-525.
Sheehan, K. B., &; Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy &; marketing, 19(1), 62-73.
Smith, H. J., Milberg, S. J., &; Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 167-196.
Stewart, K. A., &; Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-49.
Stone, E. F., Gueutal, H. G., Gardner, D. G., &; McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of applied psychology, 68(3), 459.
Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 147-169.
Straub, D., Boudreau, M. C., &; Gefen, D. (2004). Validation guidelines for IS positivist research. The Communications of the Association for Information Systems, 13(1), 63.
Trochim, W. M., &; Donnelly, J. P. (2001). Research methods knowledge base.
Warren, S. D., &; Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193-220.
Wartick, S. L. (1992). The relationship between intense media exposure and change in corporate reputation. Business &; Society, 31(1), 33-49.
Wirtz, J., Lwin, M. O., &; Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348.
Wu, K.-W., Huang, S. Y., Yen, D. C., &; Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897.
Yousafzai, S., Pallister, J., &; Foxall, G. (2009). Multi-dimensional role of trust in Internet banking adoption. The Service Industries Journal, 29(5), 591-605.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top