Annals of Telecommunications

, Volume 72, Issue 5–6, pp 253–264 | Cite as

An empirical study on acceptance of secure healthcare service in Malaysia, Pakistan, and Saudi Arabia: a mobile cloud computing perspective

  • Rooh ul Amin
  • Irum Inayat
  • Basit Shahzad
  • Kashif Saleem
  • Li Aijun
Article

Abstract

The advent of information and communication technology in healthcare sector has taken the world to a new pervasive horizon. Cloud computing is a ubiquitous way of information and data transfer. Implementation of cloud computing in daily healthcare operations can bring numerous benefits. However, there is a resistance towards the usage of this modern technology by healthcare organizations and staff due to lack of IT exposure, resources, infrastructure, patient data privacy, and security issues. Therefore, there is a need to provide an empirical evidence on how healthcare industry is responding to this new technology and to point out the factors that hinder its implementation in healthcare sector. In this paper, we aim to conduct an empirical study to investigate the behavioural intention of healthcare organizations’ staff, towards the usage of cloud-based healthcare services to carry out their daily jobs. We used unified theory of acceptance and use of technology (UTAUT) as a theoretical basis to test the predictors i.e. performance expectancy, effort expectancy, facilitating conditions, and social influence in order to find the behavioural intention of the healthcare organizations’ staff. Age, experience, and gender were also studied as moderators to investigate their effect on the behavioural intention of the user. An online questionnaire-based survey was conducted with 147 healthcare professionals in Malaysia, Pakistan, and Saudi Arabia. The results showed that social influence was the least influencing predictor in determining the dependent variable and the years of experience positively influenced user’s behavioural intentions towards using cloud-based healthcare services.

Keywords

Cloud computing Cloud-based health services Acceptance Security and privacy Mobile cloud computing Empirical study 

Notes

Acknowledgements

This Project was funded by the National plan of Science, Technology and Innovation (MAARIFAH), King Abdulaziz City for Science and Technology, Kingdom of Saudi Arabia, Award Number (12-INF2817-02).

References

  1. 1.
    Griebel L, Prokosch H, Köpcke F, Toddenroth D, Christoph J, Leb I, Engel I, Sedlmayr M (2015) A scoping review of cloud computing in healthcare. BMC Med Inform Decis Mak 15(17):1–16Google Scholar
  2. 2.
    Mellado D, Fernández-medina E (2012) A systematic review of information security governance frameworks in the cloud computing environment. J Univers Comput Sci 18(6):798–815Google Scholar
  3. 3.
    Inayat I, Salim SS, Kasirun ZM (2013) Agile-based software product development using cloud computing services: findings from a case study. Sci Int 25(4):1065–1069Google Scholar
  4. 4.
    Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I (2010) A view of cloud computing. Commun ACM 53:4CrossRefGoogle Scholar
  5. 5.
    Majhi SK, Bera P (2014) OHMF: a query based optimal healthcare medication framework. Int J Inf Process 8(3):1–12Google Scholar
  6. 6.
    Youssef AE (2014) A framework for secure healthcare systems based on big data analytics in mobile cloud computing environments. Int J Ambient Syst Appl 2(2):1–11Google Scholar
  7. 7.
    V. Koufi, F. Malamateniou, G. Vassilacopoulos, and A. Prentza, “An android-enabled mobile framework for ubiquitous access to cloud emergency medical services,” in Second Symposium on Network Cloud Computing and Applications, 2012, pp. 95–101.Google Scholar
  8. 8.
    Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient’s data collection in health care institutions. In: 2nd International Conference on eHealth, Telemedicine and Social Medicine, pp 95–99Google Scholar
  9. 9.
    Nkosi MT and Mekuria SM (2010) Cloud computing for enhanced mobile health applications. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp 629–633Google Scholar
  10. 10.
    Yarbrough AK, Smith TB (2007) Technology acceptance among physicians. Med Care Res Rev 64(6):650–672CrossRefGoogle Scholar
  11. 11.
    Curry SJ (2007) eHealth research and healthcare delivery. Am J Prev Med 32:127–130CrossRefGoogle Scholar
  12. 12.
    Atienza AA, Hesse BW, Baker TB, Abrams DB, Rimer BK, Croyle RT, Volckmann LN (2007) Critical issues in eHealth research. Am J Prev Med 32:71–74CrossRefGoogle Scholar
  13. 13.
    Featherman MS, Pavlou PA (2003) Predicting e-services adoption: a perceived risk facets perspective. Int J Hum Comput Stud 59:451–474CrossRefGoogle Scholar
  14. 14.
    Ramgovind S, Eloff MM, Smith E (2010) The management of security in cloud computing. In: Information Security for South Africa, pp 1–7Google Scholar
  15. 15.
    Lian J, Yen DC, Wang Y (2014) An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. Int J Inf Manag 34(1):28–36CrossRefGoogle Scholar
  16. 16.
    Lero ML, Kieran C (2013) Factors affecting the adoption of cloud computing: an exploratory study. In: 21st European Conference on Information Systems foundation, pp 1–12Google Scholar
  17. 17.
    Latif R, Abbas H, Latif S, Masood A (2016) Distributed denial of service attack source detection using efficient traceback technique (ETT) in cloud-assisted healthcare environment. J Med Syst 40(7):161–173CrossRefGoogle Scholar
  18. 18.
    Sajid A, Abbas H (2016) Data privacy in cloud-assisted healthcare systems: state of the art and future challenges. J Med Syst 40(6):155CrossRefGoogle Scholar
  19. 19.
    Latif R, Abbas H, Assar S Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. J Med Syst 38:128–2014Google Scholar
  20. 20.
    Blaya BJA, Fraser HSF, Holt B (2010) E-health technologies show promise in developing countries. Health Aff 29(2):244–251CrossRefGoogle Scholar
  21. 21.
    Manuel J, Egea O, Victoria M, González R (2011) Explaining physicians’ acceptance of EHCR systems: an extension of TAM with trust and risk factors. Comput Human Behav 27:319–332CrossRefGoogle Scholar
  22. 22.
    Demirkan H, Tacoma W (2013) A smart healthcare systems framework. IT Professional 5:38–45CrossRefGoogle Scholar
  23. 23.
    Saleem K, Derhab A, Al-Muhtadi J, Shahzad B (2015) Human-oriented design of secure machine-to-machine communication system for e-Healthcare society. Comput. Human Behav. 51(NOVEMBER):977–985CrossRefGoogle Scholar
  24. 24.
    Fleischmann R, Duhm J, Hupperts H, Brandt SA (2015) Tablet computers with mobile electronic medical records enhance clinical routine and promote bedside time: a controlled prospective crossover study. J Neurol 262:532–540CrossRefGoogle Scholar
  25. 25.
    Hsieh S, Hou I, Cheng P, Tan C, Shen P, Hsu K, Hsieh S, Lai F (2010) Design and implementation of web-based mobile electronic medication administration record. J Med Syst 39:947–958CrossRefGoogle Scholar
  26. 26.
    Ying A (2003) Mobile physician order entry. J Heal Informatics Manag 17:58–63Google Scholar
  27. 27.
    Bielli E, Carminati F, La Capra S, Lina M, Brunelli C, Tamburini M (2004) A wireless health outcomes monitoring system (WHOMS): development and field testing with cancer patients using mobile phones. BMC Med. Inform. Decis. Mak. 4(7):1–13Google Scholar
  28. 28.
    Sun N, Rau PP (2015) The acceptance of personal health devices among patients with chronic conditions. Int J Med Inform 84(4):288–297CrossRefGoogle Scholar
  29. 29.
    Vilaplana J, Solsona F, Abella F, Filgueira R, Rius J (2013) The cloud paradigm applied to e-Health. BMC Med. Inform. Decis. Mak. 13(35):1–10Google Scholar
  30. 30.
    Derenzi B, Borriello G, Jackson J, Kumar VS, Parikh TS, Virk P, Lesh N (2011) Mobile phone tools for field-based health care workers in low-income countries. Mt Sinai J Med 78:406–418CrossRefGoogle Scholar
  31. 31.
    Braun R, Catalani C, Wimbush J, Israelski D (2013) Community health workers and mobile technology: a systematic review of the literature. PLoS One 8(6):4–9Google Scholar
  32. 32.
    Chen I-J, Yang K-F, Tang F-I, Yu S (2008) Applying the technology acceptance model to explore public health nurses’ intentions towards web-based learning: a cross-sectional questionnaire survey. Int J Nurs Stud 45(6):869–878CrossRefGoogle Scholar
  33. 33.
    Sedem AA, Panford JK (2015) Cloud computing framework for e-Health in Ghana: adoption issues and strategies: case study of Ghana health service. 118(17):13–17Google Scholar
  34. 34.
    Inkelman WAJW, Eonard KEJL, Ossos PEGR (2005) Patient-perceived usefulness of online electronic medical records: employing grounded theory in the development of information and communication technologies for use by patients living with chronic illness. J Am Med Informatics Assoc 12(3):306–314CrossRefGoogle Scholar
  35. 35.
    Ierdon STP, Eitz DED, Uck SAK, Rtiz EDO (2004) Patient experiences and attitudes about access to a patient electronic health care record and linked web messaging. J. Am. Med. Informatics Assoc. 11(6):505–513CrossRefGoogle Scholar
  36. 36.
    Wilson EV, Lankton NK (2004) Modeling patients’ acceptance of provider-delivered e-health. J. Am. Med. Informatics Assoc. 11(4):241–248CrossRefGoogle Scholar
  37. 37.
    Ahlan AR, Isma’eel BA (2014) User acceptance of health information technology (HIT) in developing countries: a conceptual model. Procedia Technol 16:1287–1296CrossRefGoogle Scholar
  38. 38.
    Sezgin E, Özkan S (2014) A literature review on attitudes of health professionals towards health information systems: from e-Health to m-Health. Procedia Technol. 16:1317–1326CrossRefGoogle Scholar
  39. 39.
    Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319–340CrossRefGoogle Scholar
  40. 40.
    Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag Sci 46(2):186–2014CrossRefGoogle Scholar
  41. 41.
    Venkatesh V, Bala H (2008) Technology acceptance model 3 and a research agenda on interventions. Decis Sci 39(2):273–315CrossRefGoogle Scholar
  42. 42.
    Chau PYK, Hu PJ (2002) Investigating healthcare professionals’ decisions to accept telemedicine technology: an empirical test of competing theories. Inf Manag 39:297–311CrossRefGoogle Scholar
  43. 43.
    Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478Google Scholar
  44. 44.
    Im I, Hong S, Soo M (2011) Information & Management an international comparison of technology adoption testing the UTAUT model §. Inf Manag 48:1–8CrossRefGoogle Scholar
  45. 45.
    Creswell JW (2009) Research design: Qualitative, quantitative, and mixed methods approaches, 3rd ed. Sage Publications Inc, Thousand Oaks, CaliforniaGoogle Scholar
  46. 46.
    Vogt WP (2009) Quantitative research methods for professionals. Pearson Education, Boston, MA, USGoogle Scholar
  47. 47.
    Chow M, Herold DK, Cho T-M, Chan K (2012) Extending the technology acceptance model to explore the intention to use second life for enhancing healthcare education. Comput Educ 59(4):1136–1144CrossRefGoogle Scholar
  48. 48.
    Egea JMO, González MVR (2011) Explaining physicians’ acceptance of EHCR systems: an extension of TAM with trust and risk factors. Comput. Human Behav. 27:319–332CrossRefGoogle Scholar
  49. 49.
    Moores TT (2012) Towards an integrated model of IT acceptance in healthcare. Decis Support Syst 53:507–516CrossRefGoogle Scholar
  50. 50.
    Pai F-Y, Huang K-I (2011) Applying the technology acceptance model to the introduction of healthcare information systems. Technol Forecast Soc Chang 78:650–660CrossRefGoogle Scholar
  51. 51.
    Wu I-L, Li J-Y, Fu C-F (2011) The adoption of mobile healthcare by hospital’s professionals: an investigative perspective. Decis Support Syst 51:587–596CrossRefGoogle Scholar
  52. 52.
    Zhang H, Cocosila M, Archer N (2010) Factors of adoption of mobile information technology by homecare nurses. Comput Informatics, Nurs 28(1):49–56CrossRefGoogle Scholar
  53. 53.
    Kowitlawakul Y (2011) The technology acceptance model: predicting nurses’ intention to use telemedicine technology (eICU). 29(7), 411-418. Comput. Informatics, Nurs. 29(7):411–418CrossRefGoogle Scholar
  54. 54.
    Carayon P, Cartmill R, Blosky MA, Brown R, Hackenberg M, Hoonakker P, Walker JM (2013) ICU nurses’ acceptance of electronic health records. J. Am. Med. Informatics Assoc. 18:812–819CrossRefGoogle Scholar
  55. 55.
    Groves RM, Fowler FJ, Couper MP, Lepkowski JM, Singer E, and Tourangeau R (2009) Survey Methodology, 2nd ed. Wiley, p 488Google Scholar
  56. 56.
    Cronbach L (1949) Essentials of psychological testing. Harper & Row, New York, p 726Google Scholar
  57. 57.
    Cronbach L (1951) Coefficient alpha and the internal structure of tests. Psychometrika 16:297–334Google Scholar
  58. 58.
    Raykov T (1997) Estimation of composite reliability for congeneric measures. Appl Psychol Meas 21(2):173–184CrossRefGoogle Scholar
  59. 59.
    Sykes AO (2007) An introduction to regression analysis. Am Stat 61:1–33CrossRefGoogle Scholar
  60. 60.
    Straub DW (1989) Validating instruments in MIS research. MIS Q 13(2):147–169CrossRefGoogle Scholar
  61. 61.
    Hair JF, Tatham RE, Anderson RL, Black W (1998) Multivariate data analysis Englewood Cliffs: Prentice Hall, 5th edn. Prentice Hall, Englewood CliffsGoogle Scholar
  62. 62.
    Field A (2009) Discovering statistics using SPSS, 3rd edn. SAGE Publications Inc., Thousand Oaks, CaliforniaMATHGoogle Scholar

Copyright information

© Institut Mines-Télécom and Springer-Verlag France 2016

Authors and Affiliations

  • Rooh ul Amin
    • 1
  • Irum Inayat
    • 2
  • Basit Shahzad
    • 3
  • Kashif Saleem
    • 4
  • Li Aijun
    • 5
  1. 1.Department of Control & Information EngineeringNorthwestern Polytechnical UniversityXianPeople’s Republic of China
  2. 2.Department of Computer ScienceFAST National University of Computer and Emerging SciencesIslamabadPakistan
  3. 3.College of Computer and Information ScienceKing Saud UniversityRiyadhSaudi Arabia
  4. 4.Center of Excellence in Information Assurance (CoEIA)King Saud UniversityRiyadhSaudi Arabia
  5. 5.School of AutomationNorthwestern Polytechnical UniversityXianPeople’s Republic of China

Personalised recommendations