Skip to main content

Advertisement

Log in

Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

As personal health information is digitized and entrusted to healthcare professionals and the technology vendors that manage health information systems (e.g., electronic health records), questions continue to arise regarding how this information is used and protected. By understanding what factors shape people’s health information privacy concerns (HIPCs), organizations can better manage reactions and concerns regarding the use of new technologies and guidance can be produced to help people better protect their health information. We conduct a mixed methods study to examine antecedents to HIPC and find that individuals’ characteristics, perceptions, and experiences all play important roles in shaping HIPC. We also show that users who report high HIPC are less likely to allow their health information to be included in an electronic health record system. The study is conducted using Irish respondents and thus provides a European perspective from a country in which health information systems are not yet widespread.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. https://www.nlm.nih.gov/hmd/greek/greek_oath.html

  2. In this section, we have traced the direct lineage to the IPC scale by Hong and Thong (Hong and Thong 2013) that we use in this paper. It should be noted that the CFIP, IUIPC, and the IPC are not the only privacy concern scales in the literature (Preibusch 2013). Another privacy concern construct was introduced by Dinev and Hart (Dinev and Hart 2004) using Smith et al. (Smith et al. 1996) and Culnan and Armstrong (Culnan and Armstrong 1999) for inspiration. Their variation of a privacy concern instrument was refined into a four-item, single-factor scale that has also been widely employed [e.g., (Dinev and Hart 2006a; Dinev and Hart 2006b; Xu et al. 2011)]. This research group has published extensively in IS on privacy and we use their work in developing our antecedents. However, we have chosen the more recent IPC construct in the formal lineage of the CFIP for the privacy concern construct in this paper because through a series of papers the scale development for this instrument has been extensively and thoroughly conducted and tested.

  3. We will also test perceived information sensitivity, but classify that factor under perceptions and discuss it below.

  4. https://www.nbcnews.com/tech/security/big-paydays-force-hospitals-prepare-ransomware-attacks-n557176, https://www.theguardian.com/technology/2016/feb/17/los-angeles-hospital-hacked-ransom-bitcoin-hollywood-presbyterian-medical-center

  5. https://www.reuters.com/article/us-anthem-cyber-settlement/anthem-to-pay-record-115-million-to-settle-u-s-lawsuits-over-data-breach-idUSKBN19E2ML

  6. https://gdpr-info.eu/

References

  • Alavi, M., Kayworth, T. R., & Leidner, D. E. (2005). An empirical examination of the influence of organizational culture on knowledge management practices. Journal of Management Information Systems, 22(3), 191–224.

    Google Scholar 

  • Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Monterey, CA: Brooks/Cole Publishing Co..

    Google Scholar 

  • Anderson, C. L., & Agarwal, R. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490.

    Google Scholar 

  • Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339–370.

    Google Scholar 

  • Bansal, G. and Davenport, R. Moderating Role of Perceived Health Status on Privacy Concern Factors and Intentions to Transact with High versus Low Trustworthy Health Websites. Presented at 5th MWAIS (Midwest Association for Information) Conference, Moorhead, MN, 2010, pp. 1–6.

  • Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150.

    Google Scholar 

  • Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21.

    Google Scholar 

  • Bartel Sheehan, K. (1999). An investigation of gender differences in online privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.

    Google Scholar 

  • Becker, M. Understanding Users’ Health Information Privacy Concerns for Health Wearables. Presented at 51st Hawaii International Conference on System Sciences, Big Island, Hawaii, 2018.

  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1042.

    Google Scholar 

  • Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3–4), 245–270.

    Google Scholar 

  • Belanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578.

    Google Scholar 

  • Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324.

    Google Scholar 

  • Bryman, A., & Bell, E. (2007). Business research methods (2nd ed.). Oxford, UK: Oxford University Press.

    Google Scholar 

  • Caine, K., & Hanania, R. (2013). Patients want granular privacy control over health information in electronic medical records. Journal of the American Medical Informatics Association, 20(1), 7–15.

    Google Scholar 

  • Campos-Castillo, C., & Anthony, D. L. (2014). The double-edged sword of electronic health records: Implications for patient disclosure. Journal of the American Medical Informatics Association, 22(e1), e130–e140.

    Google Scholar 

  • Cate, F. H. (1999). The changing face of privacy protections in the European Union and the United States. Indiana Law Review, 33, 173–232.

    Google Scholar 

  • Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7–19.

    Google Scholar 

  • Cenfetelli, R. T., & Bassellier, G. (2009). Interpretation of formative measurement in information systems research. MIS Quarterly, 33(4), 689–707.

    Google Scholar 

  • Chen, J., Zhang, Y., & Heath, R. (2001). An exploratory investigation of the relationships between consumer characteristics and information privacy. Marketing Management Journal, 11(1), 73–81.

    Google Scholar 

  • Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189–217.

    Google Scholar 

  • Correia, J. and Compeau, D. Information privacy awareness (IPA): A review of the use, definition and measurement of IPA. Presented at 50th Hawaii International Conference on System Sciences, Waikoloa, Hawaii, 2017.

  • Creswell, J. W., & Plano Clark, V. L. (2007). Designing and conducting mixed methods research. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Crossler, R. E., & Posey, C. (2017). Robbing Peter to pay Paul: Surrendering privacy for security's sake in an identity ecosystem. Journal of the Association for Information Systems, 18(7), 487–515.

    Google Scholar 

  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.

    Google Scholar 

  • Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.

    Google Scholar 

  • Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17(4), 263–282.

    Google Scholar 

  • Dinev, T., Albano, V., Xu, H., D’Atri, A., & Hart, P. (2016). Individuals’ attitudes towards electronic health records: A privacy calculus perspective. In R. Sharda & S. Voß (Eds.), Advances in healthcare informatics and analytics (pp. 19–50). Cham, Switzerland: Springer.

    Google Scholar 

  • Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402.

    Google Scholar 

  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422.

    Google Scholar 

  • Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.

    Google Scholar 

  • Dinev, T., & Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29.

    Google Scholar 

  • Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316.

    Google Scholar 

  • Eng, D. S., & Lee, J. M. (2013). The promise and peril of mobile health applications for diabetes and endocrinology. Pediatric Diabetes, 14(4), 231–238.

    Google Scholar 

  • Ermakova, T.; Fabian, B.; Kelkel, S.; Wolff, T.; and Zarnekow, R. Antecedents of health information privacy concerns. Presented at 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, Berlin, Germany, 2015, pp. 376–383.

  • Eurobarometer. Attitudes on Data Protection and Electronic Identity in the European Union. European Commission, Brussels, Belgium 2011.

  • Evans, D. C., Nichol, W. P., & Perlin, J. B. (2006). Effect of the implementation of an enterprise-wide electronic health record on productivity in the veterans health administration. Health Economics, Policy and Law, 1(2), 163–169.

    Google Scholar 

  • Flynn, H. A., Marcus, S. M., Kerber, K., & Alessi, N. (2003). Patients' concerns about and perceptions of electronic psychiatric records. Psychiatric Services, 54(11), 1539–1541.

    Google Scholar 

  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153–160.

    Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.

    Google Scholar 

  • Fox, G., & Connolly, R. (2018). Mobile health technology adoption across generations: Narrowing the digital divide. Information Systems Journal, 28(6), 995–1019.

    Google Scholar 

  • Fox, G., & Connolly, R. (2020). “To protect my health or to protect my health privacy?” A mixed‐methods investigation of the privacy paradox. Journal of the Association for Information Science and Technology 71 (9):1015–1029

  • Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing, 58(2), 1–19.

    Google Scholar 

  • Gaskin, J. (2012). Data screening. Date last accessed: June, 29, 2020 retrieved from http://statwiki.kolobkreations.com/index.php?title=Data_screening.

    Google Scholar 

  • Gay, V., & Leijdekkers, P. (2015). Bringing health and fitness data together for connected health care: Mobile apps as enablers of interoperability. Journal of Medical Internet Research, 17(11), e260.

    Google Scholar 

  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.

    Google Scholar 

  • Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16(1), 91–109.

    Google Scholar 

  • Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis. 5. Pearson Prentice Hall: Upper Saddle River, NJ.

    Google Scholar 

  • Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2017). A primer on partial least squares structural equation modeling (PLS-SEM) (Second ed.). Thousand Oaks, CA: Sage Publications.

  • Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152.

    Google Scholar 

  • Havlena, W. J., & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927–939.

    Google Scholar 

  • Hong, W., & Thong, J. (2013). Internet privacy concerns: An integrated conceptualization and four empirical tests. MIS Quarterly, 37(1), 275–298.

    Google Scholar 

  • Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.

    Google Scholar 

  • Hwang, H.-G., Han, H.-E., Kuo, K.-M., & Liu, C.-F. (2012). The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan. Journal of Medical Systems, 36(6), 3783–3793.

    Google Scholar 

  • James, T. L., Lowry, P. B., Wallace, L., & Warkentin, M. (2017a). The effect of belongingness on obsessive-compulsive disorder in the use of online social networks. Journal of Management Information Systems, 34(2), 560–596.

    Google Scholar 

  • James, T. L., Nottingham, Q., Collignon, S. E., Warkentin, M., & Ziegelmayer, J. L. (2016). The interpersonal privacy identity (IPI): Development of a privacy as control model. Information Technology and Management, 17(4), 341–360.

    Google Scholar 

  • James, T. L., Wallace, L., & Deane, J. (2019). Using organismic integration theory to explore the associations between users’ exercise motivations and fitness technology feature use. MIS Quarterly, 43(1), 287–312.

    Google Scholar 

  • James, T. L., Wallace, L., Warkentin, M., Kim, B. C., & Collignon, S. E. (2017b). Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Information & Management, 54(7), 851–865.

    Google Scholar 

  • James, T. L., Warkentin, M., & Collignon, S. E. (2015). A dual privacy decision model for online social networks. Information & Management, 52(8), 893–908.

    Google Scholar 

  • Janda, S., & Fair, L. L. (2004). Exploring consumer concerns related to the internet. Journal of Internet Commerce, 3(1), 1–21.

    Google Scholar 

  • Jarvenpaa, S. L., & Staples, D. S. (2001). Exploring perceptions of organizational ownership of information and expertise. Journal of Management Information Systems, 18(1), 151–183.

    Google Scholar 

  • Johnson, B., & Turner, L. A. (2003). Data collection strategies in mixed methods research. In A. Tashakkori & C. Teddlie (Eds.), Handbook of mixed methods in social and behavioral research (pp. 297–319). Thousand Oaks, CA: Sage.

    Google Scholar 

  • Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human–Computer Interaction, 25(1), 1–24.

    Google Scholar 

  • Karwatzki, S., Trenz, M., Tuunainen, V. K., & Veit, D. (2017). Adverse consequences of access to individuals’ information: An analysis of perceptions and the scope of organisational influence. European Journal of Information Systems, 26(6), 688–715.

    Google Scholar 

  • Kemper, E. A., Stringfield, S., & Teddlie, C. (2003). Mixed methods sampling strategies in social science research. In A. Tashakkori & C. Teddlie (Eds.), Handbook of mixed methods in social and behavioral research (pp. 273–296). Thousand Oaks, CA: Sage.

    Google Scholar 

  • King, T., Brankovic, L., & Gillard, P. (2012). Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. International Journal of Medical Informatics, 81(4), 279–289.

    Google Scholar 

  • Klein, R. (2007). Internet-based patient-physician electronic communication applications: Patient acceptance and trust. E-Service Journal, 5(2), 27–52.

    Google Scholar 

  • Kordzadeh, N., & Warren, J. (2017). Communicating personal health information in virtual health communities: An integration of privacy calculus model and affective commitment. Journal of the Association for Information Systems, 18(1), 45–81.

    Google Scholar 

  • Kordzadeh, N., Warren, J., & Seifi, A. (2016). Antecedents of privacy calculus components in virtual health communities. International Journal of Information Management, 36(5), 724–734.

    Google Scholar 

  • Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2(1), 39–63.

    Google Scholar 

  • Kvale, S. The interview situation. In S. Kvale (ed.), Interviews. An Introduction to Qualitative Research Interviewing. London, UK: Sage, 1996, pp. 124–143.

  • Lafky, D. B., & Horan, T. A. (2011). Personal health records: Consumer attitudes toward privacy and security of their personal health information. Health Informatics Journal, 17(1), 63–71.

    Google Scholar 

  • Laric, M. V., Pitta, D. A., & Katsanis, L. P. (2009). Consumer concerns for healthcare information privacy: A comparison of US and Canadian perspectives. Research in Healthcare Financial Management, 12(1), 93–111.

    Google Scholar 

  • Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.

    Google Scholar 

  • Leiner, D.J. Too fast, too straight, too weird: Non-reactive indicators for meaningless data in internet surveys. Presented at Survey Research Methods, 2019, pp. 229–248.

  • Leogue, J. HSE to spend €875m on health records system. (2016), Date last accessed: April 1, 2020, retrieved from https://www.irishexaminer.com/ireland/hse-to-spend-875m-on-health-records-system-388741.html

  • Li, H., Gupta, A., Zhang, J., & Sarathy, R. (2014). Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract. Decision Support Systems, 57, 376–386.

    Google Scholar 

  • Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals’ adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International Journal of Medical Informatics, 88, 8–17.

    Google Scholar 

  • Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.

    Google Scholar 

  • Li, T., & Slee, T. (2014). The effects of information privacy concerns on digitizing personal health records. Journal of the Association for Information Science and Technology, 65(8), 1541–1554.

    Google Scholar 

  • Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. CAIS, 28(28), 453–496.

    Google Scholar 

  • Lovett, L. and Muoio, D. Ireland knows it’s behind on EHRs, but hopes to learn from others' mistakes. (2018), Date last accessed: April 1, 2020, retrieved from https://www.mobihealthnews.com/content/ireland-knows-it%E2%80%99s-behind-ehrs-hopes-learn-others-mistakes

  • Lowry, P. B., & Gaskin, J. (2014). Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57(2), 123–146.

    Google Scholar 

  • Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986.

    Google Scholar 

  • Luhmann, N. (1979). Trust and power. Chichester, England: John Wiley & Sons.

    Google Scholar 

  • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.

    Google Scholar 

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

    Google Scholar 

  • Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social Issues, 33(3), 5–21.

    Google Scholar 

  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.

    Google Scholar 

  • Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335–361.

    Google Scholar 

  • Meyer, A. D., & Goes, J. B. (1988). Organizational assimilation of innovations: A multilevel contextual analysis. Academy of Management Journal, 31(4), 897–923.

    Google Scholar 

  • Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65–74.

    Google Scholar 

  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.

    Google Scholar 

  • Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.

    Google Scholar 

  • Miltgen, C. L., & Smith, H. J. (2015). Exploring information privacy regulation, risks, trust, and behavior. Information & Management, 52(6), 741–759.

    Google Scholar 

  • Mishra, A. N., Anderson, C., Angst, C. M., & Agarwal, R. (2012). Electronic health records assimilation and physician identity evolution: An identity theory perspective. Information Systems Research, 23(3 Part 1), 738–760.

    Google Scholar 

  • Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375.

    Google Scholar 

  • Mukherjee, S. (2020). Emerging Frontiers in smart environment and healthcare–a vision. Information Systems Frontiers, 22(1), 23–27.

    Google Scholar 

  • Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.

    Google Scholar 

  • O'Cathain, A., Knowles, E., Turner, J., Hirst, E., Goodacre, S., & Nicholl, J. (2014). Explaining variation in emergency admissions: A mixed-methods study of emergency and urgent care systems. Journal of Health Services Research and Policy, 2, 48.

    Google Scholar 

  • O’Cathain, A., Murphy, E., & Nicholl, J. (2008). The quality of mixed methods studies in health services research. Journal of Health Services Research & Policy, 13(2), 92–98.

    Google Scholar 

  • Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63–77.

    Google Scholar 

  • Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642–660.

    Google Scholar 

  • Park, S., & Jayaraman, S. (2003). Enhancing the quality of life through wearable technology. IEEE Engineering in Medicine and Biology Magazine, 22(3), 41–48.

    Google Scholar 

  • Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136.

    Google Scholar 

  • Peng, D. X., & Lai, F. (2012). Using partial least squares in operations management research: A practical guideline and summary of past research. Journal of Operations Management, 30(6), 467–480.

    Google Scholar 

  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: State University of New York (SUNY) Press.

    Google Scholar 

  • Petter, S., Straub, D., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623–656.

    Google Scholar 

  • Preibusch, S. (2013). Guide to measuring privacy concern: Review of survey and observational instruments. International Journal of Human-Computer Studies, 71(12), 1133–1143.

    Google Scholar 

  • Rahim, F.A.; Ismail, Z.; and Samy, G.N. Information privacy concerns in electronic healthcare records: A systematic literature review. Presented at 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), Kuala Lumpur, Malaysia, 2013, pp. 504–509.

  • Ritchie, J., & Spencer, L. (1994). Qualitative data analysis for applied policy research. In A. Bryman & R. G. Burgess (Eds.), Analyzing qualitative data (pp. 173–194). London, UK: Routledge.

    Google Scholar 

  • Rohm, A. J., & Milne, G. R. (2004). Just what the doctor ordered: The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000–1011.

    Google Scholar 

  • Rotter, J. B. (1971). Generalized expectancies for interpersonal trust. American Psychologist, 26(5), 443–452.

    Google Scholar 

  • Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404.

    Google Scholar 

  • Sadeghi, P., Benyoucef, M., & Kuziemsky, C. E. (2012). A mashup based framework for multi level healthcare interoperability. Information Systems Frontiers, 14(1), 57–72.

    Google Scholar 

  • Smit, E. G., Van Noort, G., & Voorveld, H. A. (2014). Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe. Computers in Human Behavior, 32(1), 15–22.

    Google Scholar 

  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.

    Google Scholar 

  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167–196.

    Google Scholar 

  • Spiekermann, S.; Korunovska, J.; and Bauer, C. Psychology of ownership and asset defense: Why people value their personal information beyond privacy. Presented at 33rd International Conference on Information Systems, Orlando, FL, 2012.

  • Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49.

    Google Scholar 

  • Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459–468.

    Google Scholar 

  • Teddlie, C., & Tashakkori, A. (2009). Foundation of Mixed Methods Research: Integrating quantitative and qualitative approaches in the social and behavioral sciences. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Tsarenko, Y., & Rooslani Tojib, D. (2009). Examining customer privacy concerns in dealings with financial institutions. Journal of Consumer Marketing, 26(7), 468–476.

    Google Scholar 

  • Van Slyke, C., Shim, J., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415–444.

    Google Scholar 

  • Venkatesh, V., Brown, S. A., & Bala, H. (2013). Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS Quarterly, 37(1), 21–54.

    Google Scholar 

  • Vodicka, E., Mejilla, R., Leveille, S. G., Ralston, J. D., Darer, J. D., Delbanco, T., Walker, J., & Elmore, J. G. (2013). Online access to doctors' notes: Patient concerns about privacy. Journal of Medical Internet Research, 15, 9.

    Google Scholar 

  • Weber-Jahnke, J. H., & Obry, C. (2012). Protecting privacy during peer-to-peer exchange of medical documents. Information Systems Frontiers, 14(1), 87–104.

    Google Scholar 

  • Westin, A. F. (1967). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.

    Google Scholar 

  • Xu, H.; Dinev, T.; Smith, H.J.; and Hart, P. Examining the formation of individual's privacy concerns: Toward an integrative view. Presented at 29th International Conference on Information Systems, Paris, France, 2008, pp. 6.

  • Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798–824.

    Google Scholar 

  • Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012). Research note—Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342–1363.

    Google Scholar 

  • Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. The DATA BASE for Advances in Information Systems, 40(1), 38–51.

    Google Scholar 

  • Yang, Y. T., & Silverman, R. D. (2014). Mobile health applications: The patchwork of legal and liability issues suggests strategies to improve oversight. Health Affairs, 33(2), 222–227.

    Google Scholar 

  • Yassaee, M., & Mettler, T. (2019). Digital occupational health systems: What do employees think about it? Information Systems Frontiers, 21(4), 909–924.

    Google Scholar 

  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.

    Google Scholar 

  • Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management, 55(4), 482–493.

    Google Scholar 

  • Zviran, M. (2008). User's perspectives on privacy in web-based applications. Journal of Computer Information Systems, 48(4), 97–105.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tabitha L. James.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Electronic supplementary material

ESM 1

(DOCX 116 kb)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fox, G., James, T.L. Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study. Inf Syst Front 23, 1537–1562 (2021). https://doi.org/10.1007/s10796-020-10053-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-020-10053-0

Keywords

Navigation