Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

This study discovers a novel framework of individual
level technology adoption known as I-P (Individual- Privacy) towards
health information application in Smart National Identity Card. Many
countries introduced smart national identity card (SNIC) with various
applications such as health information application embedded inside
it. However, the degree to which citizens accept and use some of the
embedded applications in smart national identity remains unknown to
many governments and application providers as well. Moreover, the
factors of trust, perceived risk, Privacy concern and perceived
credibility need to be incorporated into more comprehensive models
such as extended Unified Theory of Acceptance and Use of
Technology known as UTAUT2. UTAUT2 is a mainly widespread
and leading theory up to now. This research identifies factors
affecting the citizens’ behavioural intention to use health information
application embedded in SNIC and extends better understanding on
the relevant factors that the government and the application providers
would need to consider in predicting citizens’ new technology
acceptance in the future. We propose a conceptual framework by
combining the UTAUT2 and Privacy Calculus Model constructs and
also adding perceived credibility as a new variable. The proposed
framework may provide assistance to any government planning,
decision, and policy makers involving e-government projects.
Empirical study may be conducted in the future to provide proof and
empirically validate this I-P framework.





References:
[1] Mahmut, T. (2011). Identifying Factors that facilitate the use of Multi-
Purpose Smart Cards by University Students: An empirical
investigation. Informatics institute. Ankara, Middle East Technical
University Master 99.
[2] Fancher, C. (1997). "In your pocket: smartcards." Spectrum, IEEE
34(2)(47-53).
[3] Yeow, P. H. P., Loo, W.H. (2009). "Acceptability of ATM and transit
applications embedded in multipurpose smart identity card: An
exploratory study in Malaysia." International Journal of Electronic
Government Research, 5 (2), 37-56 (IGI Publishing; Scopus journal).
[4] Jim Briggs, J. B. (2001). Smart cards in health, Healthcare Computing
Group, University of Portsmouth, Portsmouth, PO1 3AE.
[5] Loo W. H., Yeow, P.H.P., & Chong, S.C. (2011). "Acceptability of
Multipurpose Smart National Identity Card: An Empirical Study."
Journal of Global Information Technology Management 14 (1), 35-58.
(Thomson ISI journal).
[6] Yeow, P. H. P., Loo, Wee Hong and Chong, Siong Choy (2007).
"Accepting Multipurpose “Smart” Identity Cards in a Developing
Country." Journal of Urban Technology 14: 1, 23 — 50.
[7] Ghazali, D. B. "More with Mykad."
[8] Department, M. N. R. (2012). "Available: http: //www.jpn.gov.my/en/
informasi/main-applications.”
[9] Mallika, K. (2011). Patient Acceptance Analysis on National ID Smart
Card in Health Care Orgarnization Using a Thailand Hospital Example.
School of Health Care Administration, Taipei Medical University.
Master 69.
[10] Yeow P.H.P., Miller. (2005). "The Attitude of Malaysians towards
MyKad." Proceedings of the 4th International Conference on
Information Technology in Asia 2005 (CITA ’05).
[11] Aisha, F. B. (2011). Smart Card Systems: Managing Risks and
Modelling security protocols using systemc and Transaction level
Modeling School of electronic and Computer Science Southampton.
PHD.
[12] N. Anju Latha*, B. R. M., U. Sunitha (2012). "Smart Card Based
Integrated Electronic Health. Record System for Clinical Practice."
www.ijacsa.thesai.org.
[13] Sellappans, R., S. S. Chua, et al. (2013). "Health innovation for patient
safety improvement." Australasian Medical Journal 6(1): 60-63.
[14] Helen Cripps, C. S., Vesna Prijatelj (2012). Smart Health Care Cards:
Are they applicable in the Australian context? 25th Bled eConference
eDependability: Reliable and Trustworthy eStructures, eProcesses,
eOperations and eServices for the Future Bled, Slovenia
https://domino.fov.uni-mb.si/proceedings.nsf/0/.../P34_Cripps_43.pdf .
[15] Rana (2012). Evaluating Suitability of Alternative Theoretical Paradigm
for Examining Citizen Adoption of E-Government, Information Systems
Evaluation and integration group (ISEing), Brunel University, London,
United Kingdom.
[16] Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003).
"User Acceptance of Information Technology: Toward a Unified View."
MIS Quarterly (27:3), pp. 425-478.
[17] Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and
user acceptance of information technology.” MIS Quarterly 13(3): 319–
340.
[18] Ajzen, I. T. T. o. P. B.,” Organizational Behavior and Human Decision
Processes (50:2), pp. 179-211. (1991). "The Theory of Planned
Behavior." Organizational Behavior and Human Decision Processes
50(2): 179-211.
[19] Taylor S, T. P. (1995). "Decomposition and crossover effects in the
theory of planned behaviour: A study of consumer adoption."
International Journal of Research in Marketing 12(2): 137-155.
[20] Rogers, E. M. (2003). "Diffusion of innovations (5th ed.)." New York:
Free Press.
[21] Thompson Ronald L., C. A. H., Jane M. Howell. (1991). "Personal
Computing: Toward a Conceptual Model of Utilization." MIS Quarterly
15.
[22] Bandura, A. (1986). Social Foundations of Thought and Action: A
Social Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ.
[23] Schaupp L.C. Carter L, M. M. E. (2010). "E-file adoption: A study of
U.S. taxpayers’ intentions." Computers in Human Behavior 26(636-
644).
[24] Venkatesh Viswanath, J. Y. L. T., Xin Xu (2012). "Consumer
acceptance and use of information technology: extending the unified
theory of acceptance and use of technology." MIS Quarterly Vol. 36 No.
1 pp. 157-178/March 2012.
[25] Carter L., S. L. C., Hobbs J, Campbell R. (2011). "The role of security
and trust in the adoption of online tax filing’. Transforming
Government: People, Process and Policy." Transforming Government:
People, Process and Policy 5(4): 303-318.
[26] Chan F.K.Y. Thong J.Y.L. Venkatesh, V. B., S.A. Hu, P.J-H and Tam,
K.Y. (2010). "Modeling Citizen Satisfaction with Mandatory Adoption
of an E-Government Technology." Journal of the Association for
Information Systems 11(10): 519-549.
[27] Van Dijk J.A.G.M. Peters O, E. W. (2008). "Explaining the acceptance
and use of government Internet services: A multivariate analysis of 2006
survey data in the Netherlands." Government Information Quarterly 25:
379-399.
[28] Carter L, S. L. C. (2009). "Relating Acceptance and Optimism to E-File
Adoption." International Journal of Electronic Government Research
5(3): 62-74.
[29] Wang Y-S, S. Y.-W. (2009). "Why do people use information kiosks: A
validation of the Unified Theory of Acceptance and Use of Technology."
Government Information Quarterly 26 158-165.
[30] Dinev, T. (2006). "Privacy calculus model in e-commerce” European
Journal of Information Systems.
[31] H. Jeff Smith, T. D., Heng Xu (2011). "Information Privacy Research:
An Interdisciplinary Review." MIS Quarterly 35(4): 989-1015.
[32] Rindfleisch, T. C. (1997). "Privacy, Information Technology, and Health
Care." Communications of the ACM 40(8): 92-100.
[33] Budnitz, M. E. (1998). "Privacy Protection for Consumer Transactions
in Electronic Commerce: Why Self-Regulation Is Inadequate " South
Carolina Law Review 49.
[34] Wald, M. L. (2004). "Threats and responses: The airlines; U.S. wants all
air traveler files for security test.” New York Times (September 22) 1.
[35] David, D. (2013). Electronic Personal Health Records: A Matter of
Trust. The School of Graduate Studies, McMaster University PhD: 149.
[36] Willison, D. J., Schwartz, L., Abelson, J., Charles, C., Swinton, M.,
Northrup, D., & and L. Thabane (2007). "Alternatives to Project-
Specific Consent for Access to Personal Information for Health
Research: What Is the Opinion of the Canadian
[37] Mcknight DH, C. V., Kacmar C (2002). "Developing and validating trust
measures for e-commerce: an integrative typology." Information
Systems Research 13(3), 334–359.
[38] Willison, D. J., V. Steeves, C. Charles, L. Schwartz, J. Ranford, and J.
C. G. Agarwal, L. Thabane. (2009). " Consent for use of personal
information for health research: Do people with potentially stigmatizing
health conditions and the general public.
[39] Coy, K. L. J. (2001). "The current privacy environment: Implications for
third-party research." Continuing Ed. Health Professions 21(4): 203–
214.
[40] Mayer RC, D. J., Schoorman FD (1995). "An integrative model of
organizational trust.” Acad Manage Rev 20:709-734.
[41] Gefen D., K., E., Straub, D.W. (2003). "Trust and TAM in online
shopping: an integrated model.” MIS Quarterly 27 (1): 51-90.
[42] Rotter, L. B. (1971). “Generalized expectations for interpersonal trust.”
American Psychologist 26 (5): 443–452.
[43] McKnight, D. H., Cummings, L.L., Chervany, N.L., (1998). "Initial trust
formation in new organizational relationships." Academy of
Management Review 23 (3): 473–490.
[44] Naser, C., Alpert, S. A., (1999) Protecting the Privacy of Medical
Records: An Ethical Analysis. White Paper,National Coalition for
Patient Rights, Lexington, MA.
[45] Alpert, S. A. (1998). "Health Care Information: Confidentiality, Access,
and Good Practice, in Ethics, Computing, and Medicine: Informatics and
the Transformation of Health Care, K. W.Goodman (ed.), New York:."
Cambridge University Press, pp.: 75-101.
[46] Yeow, P. H. P., et al. (2012). "Ergonomics issues in national identity
card for homeland security, Applied Ergonomics."
http://dx.doi.org/10.1016/j.apergo.2012.04.017.
[47] Im, I., Kim, Y., Han H.-J. 2008. (2008). "The Effects of Perceived Risk
and Technology Type on Users’ Acceptance of Technologies."
Information & Management 45(1): 1-9.
[48] Ji-Hwan Lee, S. W. K., Chi Hoon Song (2010) The Effects of Trust and
Perceived Risk on Users’ Acceptance of ICT Services. KAIST Business
School Working Paper Series Index:
[49] Thiesse, F. (2007). "RFID, privacy and the perception of risk: A
strategic framework." Journal of Strategic Information Systems 16: 214-
232.
[50] Lui, H. K., Jamieson R. (2003). Integrating Trust and Risk Perceptions
in Business-to-Consumer Electronic Commerce with the Technology
Acceptance Model. European Conference on Information System
(ECIS), Naples.
[51] Pavlou, P. (2003). "Consumer acceptance of electronic commerce:
integrating trust and risk with the technology acceptance model."
International Journal of Electronic Commerce 7 (3): 69–103.
[52] Al-Sobhi F. Weerakkody, V. a. E.-H., R. (2011). "The Relative
Importance of Intermediaries in eGovernment Adoption: A study of
Saudi Arabia." M. Janssen, H.J. Scholl, M.A. Wimmer, and Y-H. Tan
(Eds.): EGOV 2011, LNCS 6846, 62-74.
[53] Hussein R., M. N. A. A. R., Mahmud M, Aditiawarman U. (2010). "G2C
Adoption of E- Government in Malaysia: Trust, Perceived Risk and
Political Self-Efficacy." International Journal of Electronic Government
Research 6(3): 57-72.
[54] Chiang, L. (2009). "Trust and security in the e-voting system’.
Electronic Government." an International Journal 6(4): 343-360.
[55] McLeod Jr. A.J, P. S. E. (2009). "Security and Privacy Trust in EGovernment:
Understanding System and Relationship Trust
Antecedents." 42nd Hawaii International Conference on System
Sciences 1-10.
[56] Smith, J. (2006). "Determining Key Factors in E-Government
Information System Security." Information Systems Management 23-32.
[57] France Be´langer, L. C. (2008). "Trust and risk in e-government
adoption."Journal Strategic Information Systems
doi:10.1016/j.jsis.2007.12.002.
[58] Ciborra C, N. D. D. (2005). "Good Governance, Development Theory,
and Aid Policy: Risks and Challenges of E-Government in Jordan."
Information Technology for Development 11(2): 141-159.
[59] Colesca, S. E. (2009). "Increasing E-Trust: A Solution to Minimize Risk
in E-Government Adoption." Journal of Applied Quantitative Methods
4(1): 31-44.
[60] Lee S.M. Tan X, T. S. (2006). "M-government, from rhetoric to reality:
learning from leading countries’. Electronic Government." An
International Journal 3(2): 113-126.
[61] Loukis E, C. Y. (2011). "Why Do e-Government Projects Fail? Risk
Factors of Large Information Systems Projects in the Greek Public
sector." An International Comparison’. International Journal of
Electronic Government Research 7(2): 59-77.
[62] Taiwo, A. A., A. K. Mahmood, et al. (2012). User acceptance of
eGovernment: Integrating risk and trust dimensions with UTAUT
model. Computer & Information Science (ICCIS), 2012 International
Conference on.
[63] Yap Ai Kee, Y. C. N., Leau Yu Beng, and Tan Soo Fun (2012).
"Security Issues on Identity Card in Malaysia." IA CSIT International
Journal of Engineering and Technology Vol. 4 (No. 5).
[64] Bansal, G., F. M. Zahedi, D. Gefen (2010). "The impact of personal
dispositions on information sensitivity, privacy concern and trust in
disclosing health information online." Decision Support Systems 49(2):
138-150.
[65] Gilbert, D., Kelly, L. L., and Barton, M. (2003). "Technophobia, gender
influences and consumer decision-making for technology-related
products." European Journal of Innovation Management, 6 (4), 253-263.
[66] Wang, Y. S., Wang, Y. M., Lin, H. H., and Tang, T. I. (2003).
"Determinants of user acceptance of internet banking: An empirical study." International Journal of Service Industry Management, 14 (5),
501-519.
[67] Alshare, K. A., Freeze, R., Kwun, O. (2009). "Student intention to use
expert systems: an exploratory study." J. Comput. Inf. Syst. 49 (4):
105e113.
[68] Simon, B., 2001. Knowledge media in education e a user acceptance in
universities. and V. Master dissertation. Wirtschaftsuniversität Wien
(2001). Knowledge media in education e a user acceptance in
universities. Wirtschaftsuniversität Wien, Vienna. Master
[69] Sun, H. (2003). An integrative analysis of TAM: toward a deeper
understanding of technology acceptance model. Proceedings of the 9th
American Conference on Information Systems (the 9th AMCIS),
Tampa, Florida.
[70] Bauer, R. A. (1960). Consumer behavior as risk-taking. In R. S.
Hancock (Ed.), Dynamic marketing for a changing world. Chicago,
American Marketing Association: 389-398.
[71] Warkentin, M., Gefen, D., Pavlou, P., Rose, G. (2002). "Encouraging
citizen adoption of e-government by building trust." Electronic Markets
12 (3) 157–162.
[72] Mauricio Featherman, P. A. P. (2003). "Predicting e-services adoption: a
perceived risk facets perspective." International Journal of Human-
Computer Studies 59: 451-474.
[73] Richards, R. J. (2012). A Study of the Intent to Fully Utilize Electronic
Personal Health
[74] Xin Li, T. J. H., Joseph S. Valacich Bernama (2008). "Why do we trust
new technology? A study of initial trust formation with organizational
information systems." Strategic Information System 17(1): 39–71.
[75] Wang, W., Benbasat, I. (2005). "Trust in and adoption of online
recommendation agents." Journal of the Association for Information
Systems 6(3): 72–101.
[76] McKnight, D. H. (2005). "Trust in information technology.” The
Blackwell Encyclopedia of Management. Blackwell, Maiden, MA, 329–
331.
[77] Angst, C. M. a. R. A. (2009). "Adoption of electronic health records in
the presence of privacy concerns: The elaboration likelihood model and
individual persuasion." MIS Quarterly 33(2): 339-370.
[78] Chellappa, R. K., Sin, R. G. (2005). "Personalization Versus Privacy: An
Empirical Examination of the Online Consumer’s Dilemma."
Information Technology and Management 6(2): 181-202.
[79] Donna, M. (2003). "Evaluating Electronic Commerce Acceptance with
the Technology Acceptance Model." Journal of Computer Information
Systems 44(2), 2003, 49-57.
[80] Gefen, D., and Straub, D. (1997). "Gender Differences in the Perception
and Use of E-mail: An Extension to the Technology Acceptance Model."
MIS Quarterly 21(4), 389-400.
[81] Vijayasarathy, L. R. (2004). "Predicting Consumer Intentions to Use
Online Shopping: The Case for an Augmented Technology Acceptance
Model." Information and Management 41(6), 747-762.
[82] Loo, W. H., Yeow, P.H.P. & Chong, S.C. (2009). "User acceptance of
Malaysian government multipurpose smartcard applications."
Government Information Quarterly, 26, 358-367. (Publisher: Elsevier;
Thomson ISI).
[83] Venkatesh, V., Morris, M.G. (2000). "Why Don't Men Ever Stop to Ask
for Directions? Gender, Social Influence, and Their Role in Technology
Acceptance and Usage Behaviour." MIS Quarterly, 24(1) 2000, 115-
139.
[84] Al-Gahtani, S. S., Hubona, G.S., and Wang, J. (2007). "Information
Technology (IT) in Saudi Arabia: Culture and the Acceptance and Use
of IT." Information and Management, 44(8), 681-691.
[85] Yuen, Y. Y., Yeow, P.H.P., Lim, N., and Saylani, N. (2010). "Internet
Banking Adoption: Comparing Developed and Developing Countries."
Journal of Computer Information Systems 51(1), 52-61.
[86] Limayem, M., Hirt, S. G., and Cheung, C. M. K. (2007). "How Habit
Limits the Predictive Power of Intentions: The Case of IS Continuance."
MIS Quarterly (31:4), pp. 705-737.
[87] Kim, S. S., Malhotra, N. K., and Narasimhan, S. (2005). "Two
Competing Perspectives on Automatic Use: A Theoretical and Empirical
Comparison." Information Systems Research (16:4), pp. 418-432.
[88] Brown, S. A., and Venkatesh, V. (2005). "Model of Adoption of
Technology in the Household: A Baseline Model Test and Extension
Incorporating Household Life Cycle." MIS Quarterly 29(4): 399-426.
[89] Van der Heijden, H. (2004). "User Acceptance of Hedonic Information
Systems." MIS Quarterly 28 (4): 695-704.
[90] Thong J. Y. L., H., S. J., Tam, K. Y. (2006). "The Effects of Post-
Adoption Beliefs on the Expectation Confirmation Model for
Information Technology Continuance” International Journal of Human-
Computer Studies 64(9): 799-810.
[91] Chan, K. Y., Gong, M., Xu, Y., Thong, J. Y. L. (2008). Examining User
Acceptance of SMS: An Empirical Study in China and Hong Kong. 12th
Pacific Asia Conference on Information System. Suzhou, China.
[92] Dodds, W. B., Monroe, K. B., and Grewal, D. (1991). "Effects of Price,
Brand, and Store Information on Buyers." Journal of Marketing
Research (28:3), pp. 307-3 19.
[93] Nisakorn Phichitchaisopa, T. N. (2013). "Factors Affecting the Adoption
of Healthcare Information Technology” EXCLI Journal 12(ISSN 1611-
2156): 413-436.
[94] Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and
user acceptance of information technology. ." MIS Quarterly 13(3): 319–
340.