key: cord-346358-ffqewqdc authors: Dhaggara, Devendra; Goswami, Mohit; Kumar, Gopal title: Impact of Trust and Privacy Concerns on Technology Acceptance in Healthcare: An Indian Perspective date: 2020-05-11 journal: Int J Med Inform DOI: 10.1016/j.ijmedinf.2020.104164 sha: doc_id: 346358 cord_uid: ffqewqdc This paper augments the technology acceptance model (TAM) by empirically investigating the influence of behavioral traits (privacy concerns and trust) and cognitive beliefs (perceived usefulness and perceived ease of use) on patients’ behavioral intention to accept technology in healthcare service delivery. Despite increased emphasis on healthcare service delivery, there has been limited studies as to how various behavioral constructs are related to adoption of new technology in healthcare sector. To this end, and to develop meaningful insights, a conceptual model integrating behavioral constructs with constructs related to technology acceptance model is devised. The aim here is essentially to understand relationships that predict patients’ acceptance of technology in healthcare services. The devised model is tested on responses obtained from survey of 416 patients availing healthcare service at various primary health centers in New Delhi, India. Structural equation modeling (SEM) is employed to conceptualize the model and validate nine hypotheses entailing key constructs. The results indicate that perceived usefulness, perceived ease of use, trust and privacy concern are direct predictors of patients’ behavior to accept technology in availing healthcare services. In summary, this research provides an empirical contribution to the literature on effect of trust and privacy concerns on acceptance of technology in healthcare. In the declaration of Alma Ata in 1978, governments across the globe pledged for health for all by the year 2000, emphasizing improved access to primary health facilities and services by setting country specific healthcare targets. However, the targets were missed and considerable gaps in delivering and accessing healthcare services remain, particularly in developing countries (World Health Statics 2010) . Great disparities in terms of measured health inequalities prominently and visibly persist across the developing countries (Wagstaff, 2002) . Poor in developing countries continue to have minimal access to health services, J o u r n a l P r e -p r o o f resulting in deterioration of health and thus, further aggravating poverty (Smith, 1999; Peters et al., 2008) . In order to access healthcare services, adoption of technology by patients has often been considered a key enabler for mitigating widespread disparities and poor accessibility (Lalseng and Andreassen, 2007) . In this backdrop, acceptance and utilization of technology in healthcare service delivery are crucial for both service providers and service consumers (patients). To address the question of adoption of new technology by the consumers, various models and theories have been developed in the past. Some of the widely explored theories are Theory of Reasoned Action (TRA) (Fishbein and Ajzen, 1975) , Theory of Planned Behaviour (TPB) (Ajzen, 1985) , Technology Acceptance Model (TAM) (Davis, 1986; Davis, 1989) , Innovation Diffusion Theory (IDT) (Rajagopal, 2002) , Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al. 2003) , Technology Readiness Index (TRI) (Parasuraman, 2000; Parasuraman and Colby, 2015) . Among these theories, TAM is perhaps one of the widely explored models by information science (IS) researchers (Hwang 2005; Venkatesh 2000) . It establishes parsimonious relationships amongst ease of use, usefulness, and intention to use. TAM posits that usefulness and ease of use are the major determinants of the end-user's intention to use information technology (IT) (Davis 1986; Davis 1989) . Numerous studies have explored impact of technology (Mainly IT) on several aspects, such as quality, efficiency, and cost of healthcare services (Chaudhry et al., 2006) . However, researchers have kept their focus primarily on design and implementation from the service provider's perspective. Extant research literature is relatively limited in providing the understanding of the ways in which patients perceive technology usage and how technology is related to behavioral aspects (Holden and Karsh, 2010) . Healthcare being expensive, complex and universally used service, is also one of the most personalized services. (Berry and Bendapudi, 2007) . Building and maintaining trust and ensuring privacy are essential for continued participation of patients in a healthcare delivery system (Mandl et al., 2001) . Patients are often concerned about possible unwanted economic and social consequences resulting from misuse (or even abuse) of their health-related information (Luck et al., 2006) . Few studies have augmented original TAM model to include the behavioural constructs particularly in context of healthcare delivery (Rahimi et al., 2018) . Studies have also focussed on qualitative exploration of challenges associated with technology adoption without taking pertinent quantitative analysis into account (Pai and Huang, 2011) . However, a detailed J o u r n a l P r e -p r o o f empirical study aimed at examination of nuances pertaining to technology adoption by patients in relation to privacy and trust in healthcare, particularly from a patient centric viewpoint (as opposed to service provider centric perspective) is a key contribution of our research. To this end, this empirical study focuses on patients receiving treatment in primary health centers (PHCs) in New Delhi, India is aimed at answering the following research In order to answer these questions, based on a comprehensive review of extant literature, we propose extending TAM by integrating two latent behavioural variables, i.e., trust and privacy concern. This study puts forward a model apt for healthcare services in order to identify relationships between relevant factors affecting intention to use technology by patients. Structural equation model (SEM) is employed to analyse the structural relationships using survey based responses obtained from 416 respondents belonging to the age group of 18 to 60 years, availing healthcare service at primary health centers in New Delhi, India. We contribute to the extant research literature in three ways. First, we focus on acceptance of technology in healthcare from a patient centric perspective. Second, we extend the TAM framework with behavioural dimensions, aiming to explicate how these factors influence patients' perceived ease of use, perceived usefulness, and behavioural intention to use healthcare services. Third, this study reaffirms theoretical foundation of TAM in healthcare setup. Rest of the paper is structured as follows. Section 2 gives details of the relevant literature related to TAM and broad domain of healthcare. Section 3 illustrates research model and associated hypotheses. Methodology is explained in section 4. Data analysis and results are presented in Section 5. Section 6 discusses the analysis and research implications associated with the study. Limitation and future research directions associated with the study are presented in Section 7. Finally, concluding remarks are presented in Section 8. The research gaps that we seek to address in this research are related to three key research streams namely, (a) IT in healthcare and its adoption, (b) TAM, and (c) privacy concerns and trust. Now we present the relevant and recent literature for each of these three streams. Information technology has transformed ways in which health information are obtained and utilized. Based on respective health technology assessments, countries prioritize healthcare delivery in order to create sustainable health systems (Littlejohns et al., 2018) . Exclusively designed technologies for healthcare services have contributed to the digital health phenomenon (Lupton, 2014) . Researchers have studied impact of information technology on quality, efficiency and cost of healthcare services (Chaudhry et al., 2006) . Most of the studies show positive effect of IT on healthcare services with some studies reporting mixed findings (Buntin et al., 2011) . For example, positive outcomes such as reduced healthcare costs for both service providers and consumers were reported by Li and Benton, (2006) and increased service satisfaction by Queenan et al., (2011) . Devaraja et al. (2013) surveyed hospitals in US and substantiated using Theory of Swift Even flow (TSEF), the finding that adoption of IT results in improved revenue. Piccinini et al., (2013) reported reduced costs associated with management of healthcare due to centralization of healthcare service using IT. Lahiri and Seidmann, (2012) reported reduced flexibility as an undesired outcome of technology adoption in healthcare service delivery. Sharma et al. (2016) suggested complementarities between clinical health information technologies (primarily used for patient data collection, diagnosis and treatment) and augmented clinical health information technology (used for integrating information for augmented decision making) with respect to process quality. He et al., (2012) identified crucial features of medical sensor networks and introduced relevant node behaviors, including transmission rate and leaving time, etc., within the trust evaluation framework of healthcare delivery. Emerging technologies such as big data, cloud computing, block chain and health sensing are revolutionizing healthcare operations and delivery (Yang et al., 2015 , Wan et al., 2019 and Gan et al., 2020 . Wang et al., (2016) enumerated a number of capabilities of big data analytics in healthcare sector, particularly for decision support capability, analytical capability for pattern of care, predictive capability, unstructured data analysis capability and traceability. Zhong et al., (2016) proposed application of big data analytics for raising adoption of digitized health records. Cloud computing as an enabler for cost effective J o u r n a l P r e -p r o o f solution for patient information, sensor-based health data collection and delivery has been proposed in many studies (Binczewski et al., 2011; Patra et al., 2012; Rolim et al., 2010) . Available literature on adoption of technology in healthcare can be broadly categorized in two streams. First, studies concerned with extent of IT related adoption in healthcare by analyzing pervasiveness, scope and scale. Second, studies examining enablers and barriers in adoption of IT (Agarwal et al., 2010) . Studies belonging to first stream have explored various characteristics of healthcare service providers, such as size, location, competition, ownership status, etc., that have adopted IT (Cutler et al., 2005; Jha et al., 2009; Kazley and Ozcan, 2007; McCullough, 2008) . Major barriers in adoption of IT as enumerated by second stream of studies include financial, functional, environmental and individuals including service providers and service users (Bhattacharjee et al., 2006; DesRoches et al., 2008; Jha et al., 2009; Tang et al., 2006) . One key challenge with adoption of IT in healthcare is that the systems are typically not designed for multi-institutional lifetime records. Ethically managing health data, guarantee of security, auditability of records, and interoperability and immutability are few concerns that need to be addressed (Ekblaw et al., 2016) . Qadri et al., (2020) in their study of emerging technologies for healthcare delivery advocated for IoT (Internet of things) and AI (artificial intelligence) oriented healthcare delivery system. Further, this study conceptualized the tenets of H-IoT (healthcare internet of things). The arguments for adoption of H-IoT was also supported by Porambage et al., (2016) . Meng et al., (2018) in their surveyed stakeholders belonging to 12 different healthcare organizations developed a trust-based approach to figure out malicious devices in a healthcare environment. Yan et al., (2015) proposed trust based framework for virtualized networks and softwaredefined networking. The study in particular argued for adoption of cloud computing to securely deploy various trustworthy security services over the virtualized networks. Ahmed et al., (2017) explored the recent advances in big data analytics for IoT systems as well as the key requirements for managing big data and for enabling analytics in an IoT environment. Lin et al., (2018) presented a blockchain-based system for secure mutual authentication to enforce fine-grained access control polices. proposed two trust evaluation algorithms to support different application cases. Specifically, these algorithms can overcome attacks raised by internal malicious evidence providers. Perera et al., (2017) argued for adoption of FOG (edge) computing based approach for solving analytical and computational problems for diverse problems including those related to medical industry and smart cities. Wazid et al., (2017) devised a novel authentication framework for medicine J o u r n a l P r e -p r o o f anticounterfeiting system considering the IOT environment aimed at ascertaining the authenticity of pharmaceutical products. The key benefit of the proposed scheme was in terms of its lower communication and computation cost over other similar authentication schemes. Wazid et al. (2018) proposed a new secure remote user authentication scheme for implantable medical devices communication environment to overcome security and privacy issues associated with existing schemes. There has been effective evolution and acceptance of technology globally since second half of 20 th century. This has resulted in improvements in social lives, interpersonal relationships and even self-expression (Gucin and Berk, 2015) . TAM, as a research stream, is a widely deployed model for accessing acceptance of technology in information systems because of its simplicity and understandability (King and He, 2006) . Its proponents articulated that the key to enhancing use was to first increase acceptance of IT, which could be assessed by measuring individuals' future intentions to use (Davis, 1986; Davis, 1989; Davis et al., 1989) . The model is based on the theory of reasoned action (TRA) (Fishbein and Ajzen, 1975) , a psychological approach that illustrates how individual's belief system mediates human behavior. TRA theorizes that behavioral intention (BI) of an individual to use a product or a system is decided by the individual's attitude and subjective norms related to the behavior. TRA assumes behavioral intention to be closely linked to actual behavior. In comparison to TRA that explains many divergent human tendencies, TAM focuses on a particular kind of behavior, i.e., the rational acceptance of technology by the technology user (Davis, 1989) . TAM involves two primary concepts namely perceived ease of use (PEOU) and perceived usefulness (PU) to influence dependent variable behavioral intentions (BI) (King and He, 2006) . PU and PEOU are defined in the following way: Perceived Usefulness (PU)-"the degree to which a person believes that using a particular system would enhance his or her job performance" (Davis, 1989, p. 320) . Perceived Ease of Use (PEOU) -"the degree to which a person believes that using a particular system would be free of effort" (Davis, 1989, p. 320) . TAM has been studied in different contexts with different technologies (e-mail, world wide web, hospital information systems, etc.). It has been applied with different control factors such as organizational size, type, gender, etc., on different subjects such as undergraduate J o u r n a l P r e -p r o o f students, MBAs, and knowledge workers resulting in establishment of robustness among its proponents. TAM has received enormous empirical support in elucidation and prediction of technology acceptance and use in various settings (Dabholkar, 1996; Dabholkar and Bagozzi, 2002, and . Divergent external factors such as training, compatibility, anxiety, computing support, experience, relevance, personal innovativeness, etc., have been studied in context of TAM (Lee et al., 2003) . TAM has also been applied to study various aspects in healthcare services. Online disability evaluation systems, personal digital assistant for healthcare, telemedicine technology, electronic health records (EHR) and mobile applications are few of them. Adoption of e-health monitoring using smart wearable healthcare devices has been one of the recent contributions to extant research literature (Li et. al, 2016; Papa et. al, 2018; Wu et. al, 2011; Zhou et al., 2019) . Rahimi et al. (2018) employing a systematic literature review approach identified three ICT application areas namely, telemedicine, electronic health records, and mobile application for TAM in healthcare service delivery. The literature review also reported of a few studies wherein mediating role of behavioural aspects in conjunction with other factors such as mobile health, etc., were investigated. With ever increasing competition and growing personalization of markets, service providers are increasingly focusing on understanding the consumers (patients) better, thus leading to proliferation of consumer information. Although, most consumers welcome the increased convenience and personalization as natural outcomes, many remain concerned about privacy associated with their personal information (Lanier and Saini, 2008) . Privacy concern has been typically defined as concern for loss of privacy and need for protection against uncalled-for communication and misuse of personal information (Smith et al., 1996) . It concerns with being in control of personal information exchanges and security, and whether the beholder of the information will use it appropriately (Lanier and Saini, 2008) . Xu et al. (2008) suggested that privacy concern is the result of individual's outlook to privacy and circumstantial cues that enable him/her to assess the outcome of information disclosure. Dinev and Hart (2005) argued that perception of privacy develops socially through transactions with social entities. Cognitive processes of identifying information boundary comprising of privacy risk, privacy intrusion and privacy control is vital for structuring the privacy concerns of an individual. The demographic factors such as age, gender, income status affect privacy concerns of consumers (Culnan and Armstrong, 1999) . Individuals are found more concerned about their J o u r n a l P r e -p r o o f privacy when information is used without their knowledge or permission or when intended use of the information is not revealed (Phelps et al. 2000) . These attributions have also been concluded and validated empirically in various models (Phelps et al. 2000, Chellappa and Sin 2005; Dinev and Hart 2006) . For some, protection of patients' information is part of core professional ethics and for others, it is simply occupational work in the interest of organization (Anthony and Stablein, 2015) . Research on addressing privacy concerns of consumers has grown considerably in the recent past and shifted from general contexts to specific ones (Yun et al., 2019) . Researchers have explored privacy concerns in diverse fields like social networking (Heravi et al., 2017; Jeong and Kim, 2017; Lankton et al., 2017) , online services Hart, 2005, Jiang et al., 2013) , healthcare (Bansal et al., 2010; Xu, 2019) , location-based services (Xu et al., 2011; Zhou, 2011) . Studies have explored a large number of antecedents of privacy concerns. Li (2011) categorized these antecedents into five groups on the basis of their level of study. These are individual factors, socio-relational factors, macro-environmental factors, organizational and task environment factors, and information contingencies. Studies have conceptualized various instruments and models for privacy concerns in different contexts. For example, the Concern for Information Privacy (CFIP) (Smith et al. 1996) conceptualizes organizational privacy practices. Internet Users Information Privacy Concerns (IUIPC) (Malhotra et al. 2004 ) operationalizes multidimensional notion of internet users' privacy. However, for our study in healthcare services, we use model suggested by Xu et al. (2008) . This model explains molding of individual's privacy concern towards specific practices through a cognitive process comprising of privacy control, privacy intrusion and perceived privacy risk. Drawing on information boundary theory, this integrative model implies that the individual's disposition to situational or privacy indications thus enabling them to assess consequences of their information disclosures shape the privacy concern of the individual. Trust, on the other hand, has received a great deal of attention in sociology, social psychology, economics and as well as in marketing field. It is an elusive multiplex concept (Castaldo et al. 2010 ) and a multi-dimensional construct with two inter-related components, i.e., trusting beliefs and trusting intentions (McKnight et al., 2002) . Rousseau et al., (1998) defined trust as "a psychological state comprising of the intention to accept vulnerability based upon positive expectations of the intentions or behavior of another under conditions of risk and interdependence". Trust is essentially needed in uncertain situations, since it J o u r n a l P r e -p r o o f eventually implies accompanying risks and becoming susceptible to trusted parties (Hosmer, 1995) . It has been identified as a catalyst of transactions providing service receivers with expectations of fruitful exchange relationship with service providers. Drawing on various literatures, Doney and Cannon (1997) defined trust as perceived credibility and benevolence of a target trust. Here credibility refers to the extent to which the receiver believes that the service provider has the required expertise to perform the job effectively and reliably. Whereas, benevolence refers to extent to which the receiver believes that the service provider has the intentions and motives beneficial for the receiver in unforeseen conditions for which commitment is not made (Ganeshan, 1994) . Schoorman et al., (2007) contended that all three factors related to integrity, ability, and benevolence could affect trust in a group or organization. Consumers' loyalty, long term relationships, commitment and product acceptance are underpinned by their trust in service providers (Bozic, 2017) . Trust plays a crucial role in virtually all shared economy interactions (Hwlitschek et al., 2018) . In online domain, it often functions as the sole foundation for the consumers to take purchase decisions in case of scarce information (Bleier and Eisenbeiss, 2015) . Gefen et al., (2008) called for reexamination of dimensionality of trust in context of online environments. They argued that besides existing methods like case studies, field interviews, surveys, econometric analysis, experiments, analytical modeling etc., for examining trust, other techniques like cognitive neuroscience too can be deployed for better understanding of nature, antecedents and consequences. Söllner et al., (2016) reasoned that survey-based approaches postulate valuable insights about the interrelations of diverse trust concepts in IS literature. These are frequently applied to distinguish between targets of trust that determine IS use. In order to study technology acceptance in healthcare with respect to trust, we need to appreciate distinctions of healthcare services from other services. People commonly demand healthcare services under distress in that either they are sick or at risk thus relinquishing privacy. There is risk of loss of privacy associated with providing personal information (Culnan and Armstrong, 1999) . If the service provider cannot be trusted, there is no reason why consumers should expect to gain from using the particular service (Paulov, 2003) . Number of public opinion polls establish that individuals are quite concerned about threats to their personal information (Xu et al., 2008) . However, partial mediation of trust and privacy concern reduce the perception of risk (Andrews et al., 2014) . Once consumers trust the J o u r n a l P r e -p r o o f service provider, the service provider seeks more health-related information (Miller and Bell, 2012) . Bansal et al., (2010) established that personal disposition indirectly impacts trust through information sensitivity and privacy concern. Platt et al. (2019) found that expectations of benefits and positive views of health information sharing are associated with system trust. Steininger et al., (2015) in their study pertaining to acceptance of electronic health record (EHR) demonstrated that privacy concerns impact perceived usefulness of EHRs negatively. He et al., (2012) identified the security challenges facing a sensor network for wireless medical monitoring and suggested that the network should follow a two-tier architecture. Based on such an architecture, the study also devised an attack-resistant and lightweight trust management scheme termed as ReTrust. Zhou et al., (2013) Likewise, researchers have extensively explored behavioural constructs namely, trust and privacy concern, their enablers and their influence on technology acceptance independently in online transactions and e-commerce applications. However, studies on effect of behavioural aspects of patients on acceptance of IT in healthcare are lacking. Because of various distinct characteristics of healthcare service, it would be fruitless to apply canonical approaches for assessing users' response by espousing inferences from studies carried out in other service setups. In this section, we present research model that encompasses elements affecting behavioral intentions of healthcare service users to adopt technology. Researchers have widely explored IT in healthcare from the perspective of associated merits and limitations within the sector. Extant studies, primarily, have focused on enablers and barriers in implementation of IT in healthcare sector from service provider's perspective (Agarwal et al., 2010; Dey et al. 2013; McCullough et al. 2010) . We find limited studies on adoption of technology concerning patients' perspectives. In this study, we extend TAM from patient centric perspective by incorporating variables such as patients' cognitive belief, trust and privacy concerns in addition to TAM variables. To this end, following hypotheses are conceptualized. Perceived usefulness is the degree to which the consumer perceives a service useful, while perceived ease of use is the consumers' perception about effortless use of the service system (Davis, 1989) . Consumers evaluate usefulness of a service based on what they get and what they pay for it. Similar to other services, within healthcare services as well, the patient strives for timely and right treatment without much burden on his/her resources. If the patient perceives that any technology can help in getting effective treatment, the patient is more likely to avail the service facilitated by that technology. Similarly, given major parameters remaining same, if patients are provided with option to get themselves treated at any place without physically carrying their case history and using technology as facilitator, they would most likely gravitate towards accepting the technology. Further, ease of use is vital for acceptance, as familiarity with technology and skills to use technology are likely to vary significantly within the diverse population. There is extensive literature that has established that perceived usefulness and perceived ease of use directly and positively influence behavioral intention to use. Perceived ease of use also influences indirectly through perceived usefulness (Dabholkar, 1996; Dabholkar and Bagozzi, 2002; Davis, 1989; Szajna, 1996; Venkatesh, 2000) . Therefore, in line with these arguments and extant literature, we hypothesize the following. In e-commerce and IS literature, trust has been widely acknowledged in influencing user behavior in adoption of technologies (Amoako-Gyampah and Salam, 2004; Ha and Stoel, 2009; Paulov, 2003) . Healthcare delivery, however, is more personalized and vital service for consumers (Berry and Bendapudi, 2007) . The patient has to give access to personal information and previous health records to the service providers. Extant studies have established an array of divergent aspects in delivery and patients' ability to evaluate healthcare services (McGlynn et al., 2003) . Healthcare is one such typical service, wherein efficacy of primary service availed (treatment) cannot be evaluated or verified even after consumption of service. Hence, the consumer has to solely rely on the diagnosis made by the J o u r n a l P r e -p r o o f service provider. Handing over personal details to the service provider is predicated upon trust, a vital factor in acceptance of technology in healthcare services. Trust is one of the defining factors in such exchanges, where uncertainty is present. Practically, trust is a prerequisite for interactions conducted in uncertain environment (Ba and Paulov, 2002) . In such situations, beliefs about the service provider (apart from usefulness and ease of use) also becomes crucial. If the service providers fail to convey trustworthiness, the consumer is not likely to engage in transaction (Hoffman et al. 1999) . Similarly, in case of healthcare, if the patient trusts the healthcare provider to fulfill his or her needs, then the patient is more likely to view technology as beneficial for him or her (Lalseng and Andreassen, 2007) Studies have supported trust as a vital construct for predicting acceptance of technology (Carter and Bélanger, 2005; Gefen et al., 2003; Parasuraman et al., 2008; Paulov, 2003) . Studies have theoretically and empirically supported integration of trust with TAM constructs. If service provider cannot be trusted by the consumer, the consumer is not likely to see any usefulness in the service provided. At the same time, trust on service provider will reduce efforts needed to verify, monitor and control the service interaction. On the other hand, if trust is low, consumer would be forced to devote more time and effort to gauge the service thus to avoid any opportunism on part of the service provider. Therefore, in line with the existing literature, we hypothesize the following hypotheses. J o u r n a l P r e -p r o o f Researchers have studied privacy extensively. Privacy concern (PCON) has been one of the most widely used variable amongst privacy related constructs in IS research. It has been one of the strongest predictors of the privacy related behavior (Dinev and Hart 2006; Malhotra et al. 2004; Stewart and Segars, 2002) . Capturing nuances related to privacy have gained significance, as IT is increasingly expanding capabilities to store, process, explore and exploit personal information (Dinev and Hart, 2005) . Despite growing research interest in privacy concerns, there are lack of empirical evidences as to how privacy concerns affect acceptance of technology in healthcare. Privacy concern (a part of our proposed model) is considered a direct determinant of BI. The rationale is extracted out of the existing studies carried out in different domains. Existing literature suggests that privacy concerns make users circumspect about using technology and sharing personal information. In sensitive areas, privacy concern of health information may even cause individuals to avoid obtaining certain healthcare services. If privacy concerns of the customer are not mitigated by the service provider, it will have significant negative effect on the consumer's attitude and behavior towards the service (Milne and Boza 1999; Phelps et al. 2001) . In an empirical study on internet uses, Dinev and Hart, (2005) also found out negative impact of privacy concern on intention to use. Privacy of the personal information is the focal concern of the individual (Stewart and Segars, 2002) . Mukherjee and Nath (2007) identified that security to privacy along with shared values positively influences behavioral intentions of the customers. This study follows the perception that privacy concerns measure the patient's assessment of lack of reliance on the service provider, especially when one has to share personal details. Therefore, in line with the above presented arguments, we hypothesize the following. Though various researchers have explored privacy in different contexts and environments, we found a few literatures on the effect of privacy concern on PU and PEOU. Andrews et al., (2014) asserted that higher privacy concerns negatively mediate the relationship between perceived risk and attitude of the user. Intuitively, we can argue that patients will not find usefulness in a technology that is likely to invade their privacy. Individuals are likely to put more effort into monitoring if they feel that their privacy is at stake while using any service. Therefore, concern for the privacy of the user will reduce the ease of use and will affect J o u r n a l P r e -p r o o f his/her perceived usefulness for any service negatively. Along these arguments, we hypothesize the following. To test our model, we have adopted survey-based strategy consisting of structured selfadministered questionnaire. We considered five latent constructs and twenty-three manifest variables to measure them. Methodology of research is summarized in Figure 2 . Data for testing hypotheses has been collected using scenario and questionnaire-based approach. The respondents were given a scenario (presented in Appendix 1) before responding to the questionnaire. This approach is adopted as healthcare services linked to unique identity that does not yet exist in targeted area. However, validity of the response of individual based on a scenario has been well documented by Bem (1967) . To make the scenario as realistic as possible, it was discussed with the patients in primary health centers. Based on the inputs Presently available electronic healthcare record systems are not designed to manage multiinstitutional, multi-format lifetime health records of patients. Patients leave their health data scattered across various health service providers wherein they have availed treatment. These healthcare providers work in silos and hardly any inter-organizational data transfer takes place. Whenever a patient visits any healthcare provider, either the patient carries the related previous records (in the form of case history) obtained from previous healthcare providers, or the case is registered as a fresh case. In such redundant process, lots of scarce resources that could have been provided to a new patient, are used on the same patients repetitively. To facilitate availability of medical records, we propose that healthcare records to be linked to unique identity (Aadhaar -unique identification number for the citizen of India) of the patient. These records can be accessed at any health center by patients providing authentication of their unique identity. Aadhaar, a 12-digit unique number allotted to the citizen of India, stores demographic, biometric and financial information of the individual. Aadhaar number can be used as an identity and has been made mandatory for availing benefits of many governmental social schemes. As Aadhaar number is linked to personal and financial information, sharing Aadhaar identification can raise apprehensions about safety and security of data in the mind of individual. Scenario for collection of data has been Literature review on TAM, Trust and Privacy concern Development of conceptual model and hypotheses Development of scenario Development of questionnaire CFA and SEM of collected data Analysis of results and its implications J o u r n a l P r e -p r o o f developed highlighting concern of sharing Aadhaar identification with healthcare provider (see Appendix 1). As argued by Pai and Huang (2011) , we designed our questionnaire on a five point Likert scale with 1 being "strongly disagree" to 5 being "strongly agree" to collect data on demographic profile of respondents and twenty-three manifest variables. All items were adopted from published sources to ensure psychometric properties (internal consistency, testretest reliability, factor structure etc.). These measures were adjusted in consonance with healthcare environment. Experts in the field of operation management examined the questionnaire for its clarity, terminology, logical consistency and contextual relevance. Constructs, observed variables, questions and their sources are presented in Table 1 . Questionnaire was prepared in English and Hindi (local language). A pilot study was carried out on 25 respondents, who had visited Delhi Government's dispensaries in the recent past. Respondents were asked to give comments on wording and relevance of the questionnaire items, length of survey, difficulty, if any, in answering and time taken to complete it. Based on qualitative assessment of their comments, language of the questions was simplified to make them more understandable and eliminate any ambiguity. In Delhi, both Government and Non-Government organizations provide healthcare facilities. We randomly selected 11 dispensaries from 8 out of 11 districts of Delhi for data collection. Patients and their accompanying member(s), both females and males, in the age group of 18-60 years were approached. Patients seemingly in critical medical state were not disturbed. Consent from the respondents was taken before asking for their response. Respondents were asked to read the scenario before giving responses. Few, who were not willing to read the scenario, were personally explained. 458 responses were received. On scrutiny, 42 responses were rejected due to incomplete or multiple responses. In all 416 responses were statistically analyzed for verification of our conceptual model. Demographic characteristics of the sample are presented in Table 2 .1 and descriptive statistics are presented in Table 2 .2. Careful observation of the descriptive statistics presented in Table 2 .2, indicates that on an average, perhaps, mean related to privacy related items are lowest as compared to items pertaining to trust, PU, PEOU, and BI. Further, within privacy related items itself, perhaps PCON1 has the lowest mean, implying that respondents in general are already concerned about the providing much personal information. I am concerned about giving information to health providers. Healthcare service providers are trustworthy. Paulov (2003) T2 Healthcare service provider is one that keeps promises and commitments. I trust healthcare service provider because they keep my best interests in mind. Utility (PU) Aadhaar linked healthcare services will enable me quick service. Davis (1986) , Davis (1989) , Davis, Bagozzi and Warshaw (1989) PU2 Using Aadhaar linked healthcare services will increase productivity of service provider. Aadhaar linked healthcare services will improve performance of service providers. Using Aadhaar linked healthcare services will enhance effectiveness of service providers. Using Aadhaar linked healthcare services will make it easier to get healthcare services. Overall, I find Aadhaar linked healthcare services system useful for me. Learning to get healthcare services using Aadhaar will be easy for me. Davis (1986) , Davis (1989) , Davis, Bagozzi and Warshaw (1989) PEOU2 It will be easy to get healthcare service using Aadhaar based service. It will be easy for me to remember how to get required service using Aadhaar based healthcare service. My interaction with healthcare service providers is clear and understandable. I find [that it will not] take a lot of effort in using healthcare services. Overall, I find the Aadhaar based healthcare service will be easy to use. Intention ( The non-response bias in this study was also tested by performing a series of t-tests between the last twenty five percent of respondents and the rest of the sample on a large number of variables in the survey following the framework developed by Armstrong and Overton (1977) . As the data was collected from single respondents, there is also an accompanying risk of spurious covariance between the measures in the survey, i.e., common method variance (CMV) possibly resulting in biased estimators (Siemsen et al., 2010) . Step was taken to minimize CMV and limit its potential effect on the analysis. The wordings of the survey items were refined to improve their clarity by using expert judgment (in this case by both academic and industry expert) and q-sort techniques, resulting in tentative item reliability and item validity (Menor and Roth, 2007) . Evaluation of quality of measurement model is the primary stage of any structural equation modeling involving examination of convergence, content and discriminant validity, and reliability of constructs. Since all the items are adopted from published research literature and experts in the field conducted item-by-item evaluation before and after the pilot study, content validity of the measurement is established (Straub et al. 2004 ). Construct validity is established by ascertaining convergent validity and discriminant validity. Factor analysis with J o u r n a l P r e -p r o o f Varimax rotation using SPSS16 is carried out to ascertain convergent validity. Kaiser-Meyer-Olkin measure of sampling adequacy value is 0.92, higher than justifiable value for carrying out factor analysis (0.5) (Kaiser, 1974) . Bartlett's test of sphericity is significant (Table 4 ). All the items displayed clear loading unto their five respective components as given in Table 5 . Average variance extracted (AVE) for all constructs and quality parameters, i.e., Cronbach's alpha, composite reliability (CR) are reported in Table 3 . All measures representing constructs have Cronbach's alpha above the acceptable limit of 0.70, CR above 0.7 and AVE more than 0.5 (Cortina, 1993) confirming convergent validity, discriminant validity and reliability of the constructs. Sig. .000 We use SEM for analysis of the proposed measurement model. Use of SEM will substantiate robustness of findings as it is based on maximum likelihood algorithm that considers error terms in establishing loadings, correlations and other related measures. The measurement model is evaluated on primary fit criteria, overall model fit and fit of internal structure of model as proposed by Bagozzi and Yi (1988) . Widely accepted and reported fit indices including absolute fit, incremental fit and parsimony fit indices of the conceptual model are examined (Hooper at al., 2008) . Absolute fit measures, i.e., chi-square static, GFI (goodnessof-fit index), AGFI (adjusted goodness-of-fit index) and RMSEA (root mean square error approximation) determine degree to which the overall model predicts the observed covariance or correlation matrix. Incremental fit indices, i.e., NFI (normed fit index), CFI (comparative fit index) and NNFI (non-normed fir index) compare the proposed model to J o u r n a l P r e -p r o o f baseline model, often referred to as null model. PNFI (parsimonious normed fit index) and PGFI (parsimonious goodness-of-fit index) are termed as parsimony fit indices. These indices determine impact of additional parameters on the conceptualized model. All the indices of the proposed model obtained using LISREL are within acceptable limit are presented in Table 6 . All the fit indices were within acceptable limit indicating good model fit (McDonald and Ho, 2002; Mulaik et al., 1989; Pai and Huang, 2011; Schreiber et al., 2006) . Path coefficients along with t-statistics of corresponding hypothesized paths are presented in Table 7 and Figure 3 . Seven path coefficients are found considerably high and statistically significant. As per the established TAM, PU is found to influence BI and PEOU to PU. PEOU influence on BI found to be insignificant. Trust influence on PEOU is not found significant, however, trust has direct influence on PU and BI. Privacy concern is found to influence PU, PEOU and BI negatively. The obtained results from our empirical analysis support proposed hypotheses on acceptance of technology in healthcare. However, the significance of individual hypotheses warrants further discussion. This research examines technology acceptance in healthcare services, hypothesizing and validating role of trust and privacy concerns. In addition to reaffirming relations of original TAM constructs, our results elucidate that trust and privacy concern directly affect patients' intention to use technology in healthcare services. Growing interest in patients' reaction to introduction of technology in healthcare has given impetus to theories that predict and explain technology acceptance and usage. The results suggest that while enhanced trust positively affects behavioral intention and perceived utility of the service, privacy concern, on other hand, has negative effect on behavioral intention, perceived utility and perceived ease of use of medical services. In particular, the studies carried out by Andrews et al., (2014) and Honein-AbouHaidar et al., (2020) are important to be discussed here, since both of these studies, investigated the acceptance of technology by people availing healthcare services. Andrews et al., (2014) , while investigating Australian general public perception of adopting a personally controlled electronic health record (PCEHR), argued that individuals appreciate the value associated with PCEHR. However, adoption of PCEHR was explained by perceived value and perceived risk. Further, individuals also liked to have two key concerns, viz., reduction in privacy and lack of trust to be mitigated before committing to PCEHR. However, how and to what degree trust and privacy concerns impact the behavioral intentions of individuals is something ascertained by our study. Unlike the study by Andrews et al. (2014) , our study also considers the relationships amongst behavioral constructs and perceived utility associated with adoption of technology in healthcare delivery. Trust does not seem to have significant effect on ease of use of any technology in healthcare. All hypotheses are confirmed through empirical assessment. The results also confirm findings of similar studies carried out in online services. However, evaluation of effect of trust and privacy concern on technology acceptance in healthcare services provides the aspect of originality in respect of existing literature. Our results in regard to behavioral intention also somewhat support the findings from Honein-AbouHaidar et al., (2020) arguing that positive relationship exists between perceived utility and behavioral intention in adopting electronic patient portal (EPP). Our study supports earlier literature on trust and transactions and confirms their relevance in healthcare services also. Data from primary health centres shows that trust has direct bearing on behavioural intentions of patients to use the service or avoid to it. The study also establishes positive relationship between trust and perceived utility. Based on these results, we can assert that trust is an enabler of acceptance of technology in healthcare services. The results also demonstrate that privacy concerns of patients are negatively associated with perceived utility, perceived ease of use and as a result behavioural intention of adaptation of new technology in healthcare. Our results support previous studies, carried out in different services, which suggest that if consumers' privacy concerns are not mitigated, they will have negative impact on consumers' decision on availing that service (Eastlick et al., 2006) . Given the potential repercussion on consumer's attitude, it is essential J o u r n a l P r e -p r o o f that researchers accurately understand the concern related to consumer's information privacy. Above analysis synthesizes the assertion that privacy concern is an inhibiter of acceptance of technology in healthcare services. Following implications can be clearly derived from the research analysis discussed above. From managerial point of view, major implications of this study can be summarized as follows. Firstly, in today's technologically intensive and competitive health care domain, the citizens' need (particularly in developing countries) is oriented around high quality care at an affordable cost. Health care managers, therefore, must find cogent ways to obtain superior healthcare results considering rather limited resources. Secondly, as numerous studies have shown that adoption of new technologies in healthcare can provide quality healthcare to all socioeconomic strata of the society particularly in rural and remote areas, it is pivotal for healthcare service providers to understand the driving forces of patients' acceptance of technology. This study demonstrates factors that affect behavioural intentions of patients in acceptance of newer technologies. Thirdly, this study reflects needs for strategic planning, assessing and understanding the role of trust to allay ethical concerns related to the user sensitive data. Finally, success of any e-health program hinges on acceptance of technology to put in place robust IT enabled models designed for providing access to affordable healthcare. It mandates service managers to strive for greater technology acceptance amongst patients. On theoretical front, this research provides significant contributions in establishing link between behavioral aspects and acceptance of technology in health services. The study explores a vital issue of patients' trust and their privacy concerns in context of new technology acceptance, thus providing a theoretical foundation to understand behavioral responses of patients on introduction of a new technology in healthcare service delivery. Additionally, our study also contributes to the extant literature by proposing and testing extended TAM by integrating behavioral constructs in healthcare context. Adapting to the conceptualization of trust and privacy concern in various other services, this research reaffirms effect of these constructs on acceptance of technology in healthcare services. This approach will help us in building a holistic picture of technology acceptance in healthcare. This study suggests that perceived usefulness, perceived ease of use, trust and privacy concerns are valid predictors of technology acceptance in healthcare service delivery. Our study lends support to theoretical foundation of TAM in healthcare setting associated with credence, co-creation and co-production, and vulnerability of service receiver as few key attributes. Partly, implementation of new technology in healthcare is marred by lack of engagement of the service consumers. Theoretically, existing literature is rather inadequate in satisfactorily exploring contingent factors emerging from application of smart technologies in public healthcare (Papa et al., 2018) . This study provides relationship between an individual's behavioral constructs and final acceptance of technology in healthcare service setting. Countries have been spending significantly on new technologies for improving healthcare service delivery. However, when adopted technology is not acceptable to the patients, then the purpose of these technological advancements gets defeated. Despite notable gains in improving life expectancy, improving maternal and child mortality outcomes and addressing other health priorities, the rate of improvement has been far from satisfactory (particularly in developing world). For policy makers and researchers, this study does a redressal of four issues to obtain acceptance and desired outcome of technology being introduced in healthcare services. Firstly, introduced technology must focus on expected usefulness to the patients. Secondly, service providers must focus on ease of use and convenience associated with the technology. Thirdly, trust has been found to impact patients' perception of utility and thus, behavioral intention to use that technology. While expected use and ease of use can be explained to the user, trust is something, which has to be earned. Onus here lies with implementing agencies (health centers in this case) and the Governments to develop trust amongst patients for delivery of healthcare services. Finally, privacy concern has influence on utility, ease of use and final acceptance of any technology. Like trust, apprehensions related to privacy concern of the patients have to be mitigated by the implementing agencies and the Government. Technology induction in healthcare will not only create value for patients, but also for the entire social and economic ecosystem. In India, availability of enabling technologies like mobile internet, cloud computing and social media augmented by favorable demographics and healthcare infrastructure can create a fertile ground for induction of technologies in health care delivery. Various governmental direct benefit schemes are already linked with Aadhaar numbers of citizens. However, J o u r n a l P r e -p r o o f healthcare services are yet to be linked to any unique identity in the country. One such study proposed blockchain and big data assisted, unique id linked model for universal healthcare coverage (Dhagarra et al., 2019) . As an augmentation to Dhagarra et al., (2019) , this research delineates behavioral factors to be considered while implementing any technology assisted healthcare model for achieving universal healthcare coverage. As already ascertained by extant studies (Andrews et al., 2014) , mitigating privacy related concerns in patients' minds thus ensuring enhanced trust between patients and service providers, is crucial to success of medical services delivery including e-services. In this regard there are certain concrete steps can be taken by the concerned stakeholders including both government and healthcare providers. In Indian context and on a governmental level, of particular interest would be HIPAA (Health Insurance Portability and Accountability Act of 1996) and EUs safe harbor law (Barua et al., 2011) . These laws usually mandate strict security measures for sharing and exchanging health data, and failure to comply with them is accompanied by severe penalties. From the standpoint of health care service providers, only authorized users such as medical staff should have access to the collected health data as it almost always contains confidential and sensitive data. This security critical system, however, requires careful balancing between confidentiality and availability. The dichotomous nature of these two goals is clear: while all the patient's data should be available to be shared and monitored to deliver professional healthcare services; for security reasons, part of the data may be considered confidential and therefore must not be accessible. Clearly, rationalization of the paired goals should be achieved to provide the best possible care for patients. Further, when dealing with privacy concerns in e-healthcare models, security models revolving around data collection, data transmission, and data storage would have to be designed carefully (Zriqat et al., 2016) . Of particular interest in this context would be use of blockchain concept for patients' registration and handling of medical record as proposed by Dhaggara et al., (2019) as a way of creating immutable and secure framework. To the best of authors' knowledge, this is first study aimed to explore technology acceptance linking unique identity with healthcare records in India. Since such conceptualization is yet to be implemented, there exists many limitations in our study. We recommend a pilot project implementing integration of healthcare records based on unique identity. This study has been carried out in urban area of one city of the country wherein the respondents were relatively J o u r n a l P r e -p r o o f young and educated. Educated respondents therefore pose less of a challenge as far as interpretation of survey responses are concerned. Though data has been collected by randomly selecting healthcare centers and patients, it may not reflect huge diversity of the population. To further validate present findings, proposed model may be investigated in different countries in different geographical spreads. Model may further be cross validated in developing and developed countries. This will further boost the reliability of results and may result in some degree of generalization of managerial and theoretical inferences. To further boost robustness and validity of the proposed model, study may be replicated with larger sample size and at different levels of healthcare services like in specialty hospitals. Finally, the study investigates effect of only two additional behavioral constructs on technology acceptance in healthcare delivery. Future study may include more behavioral constructs to study their effects on technology acceptance in healthcare. Of particular interest would be to include behavioral constructs that can explain patients' behavioral and psychological traits in the time of pandemics (for instance the ongoing COVID-19 situation). Psychological interventions for all or specific (e.g., more vulnerable) groups aimed at identification of adverse psychological impacts and psychopathological symptoms in the general population during the pandemics would be of use to governments and healthcare service providers. The methodological analysis as carried out in our study can be further refined by taking into account the fixed and random effects. In particular, the motivation for using fixed effect (FE) and random effect (RE) regression model would emanate from identification of such effects explaining variations on measurement items related to output variables, i.e., variables explaining behavioral intention in our case (Martin et al., 2010) . However, such methods, for instance, those related to FE (e.g., ordinary regression, uni/multivariate regression models) and RE including meta-analysis related (e.g., Hunter-Schmidt/Hedges-Vevea) are often considered data hungry methods, wherein some important questions such as how much and what kind of data need to be collected to deploy such models meaningfully and reliably need to be addressed. Questions, for instance, whether the data would be pooled in nature or individual respondent based would also aid practitioners in determining the right sampling strategy (Martin et al., 2010) . Schmidt et al. (2011) in their study discussed comparison of FE and RE model for empirical data. They argued that results often vary substantially given the type of model used since FE is often associated with apriori while RE takes into account statistical calibration. Further, J o u r n a l P r e -p r o o f deploying FE models and generalizing findings are often dichotomous in nature in that FE models can lead to inflated Type I error rates and erroneously narrow confidence interval (Hedges & Vevea, 1998; Hunter & Schmidt, 2000) . With the advent and phenomenal growth of new technologies based on big data, cloud computing, and blockchain, technology usage is rapidly increasing due to numerous advantages. In healthcare service delivery, technologies concerning professionals, like online appointments, data recording for diagnosis and tracking, etc., are increasingly being adopted. Moreover, not only professionals, but patients and their relatives also get influenced by technology. Intent of this empirical work was to explore constructs that affect patients' acceptance of technology in healthcare. Technology in healthcare has many advantages and at times seems to be only answer to the enormous task of providing universal health coverage. However, for implementation and acceptance of technology in this sector, practitioners and researchers have to take behavioral traits of patients into consideration as well. This empirical study presents an extension to the well-established TAM model. Primary contribution of this study is integration of behavioral variables (trust and privacy concern) with TAM constructs into a parsimonious model that predicts patients' acceptance of technology in healthcare service. This study suggests that trust, privacy concern and perceived utility shape patients attitude towards technology acceptance; while trust and privacy concern directly influence perceived utility. As healthcare service is often characterized by credence of highest degree and different from other services on many accounts, there remains significant scope of unauthorized exploitation of patients' health data. This study suggests that patients' fears about losing privacy has to be dispelled for their acceptance of any newer technology. Practitioners and agencies responsible for healthcare need to earn trust of patients before implementing any new technology. The study empirically establishes relationship between trust and privacy concern of patients with their intention of technology acceptance. Based on a scenario, the data was collected from primary health centers in India to understand various constructs and to test related hypotheses. Based on results and analysis, theoretical and managerial implications are drawn and discussed in detail. One morning you wake up suffering from fever and headache. You had similar problem a few weeks ago and you got all your tests done. You took medicines as prescribed by the doctor. Now you feel worried and would like to get in touch with a medical doctor to receive a diagnosis and treatment. You have two options: You may collect all your previous treatment case history, reports, prescriptions, etc., and preferably go to the same doctor from whom you received your treatment on the last time. Second option is that, you carry your Aadhaar card and go to any health center, which is capable of providing healthcare services by using your Aadhaar data. If you choose second option, you have to give your thumb impression to identify yourself. After identification, your all the medical records will be available with the doctor. You don't have to carry any of your previous health records. The doctor, after examining your records and previous diagnosis, will be able to prescribe future course of action. With more certainty, the doctor will be able to decide which tests need to be done. Whatever treatment you receive here, everything will be added to your health history so that next time whenever you need health service, you don't have to carry any physical record with you. Just by identifying yourself by giving your thumb impression at any health center, all your previous treatment details will be available with stationed doctor there. I am sure that you are aware that your Aadhaar is linked with your bank accounts, and other financial subsidies you receive from Government. However, such data is safe and secure. At a health center, only your health related data will be accessed. J o u r n a l P r e -p r o o f Research commentary-The digital transformation of healthcare: Current status and the road ahead Estimating nonresponse bias in mail surveys The role of big data analytics in Internet of Things The Theory of Planned Behavior An extension of the technology acceptance model in an ERP implementation environment The Australian general public's perceptions of having a personally controlled electronic health record (PCEHR) Annual Report 2016-17. Government of National Capital Territory of Delhi, Directorate General of Health Services Privacy in practice: professional discourse about information control in healthcare Evidence of the effect of trust building technology in electronic market: price premium and buyer behaviour On the evaluation of structure equation models The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online An alternative interpretation of cognitive dissonance phenomena Healthcare: A fertile field for service research The differential performance effects of healthcare information technology adoption A concept of a patientcentered healthcare system based on the virtualized networking and information infrastructure The Importance of Trust for Personalized Online Advertising Consumer trust repair: A critical literature review The benefits of health information technology: A review of the recent literature shows predominantly positive results The utilization of e-government services: Citizen trust, innovation and acceptance factors The Meaning(s) of Trust. A Content Analysis on the Diverse Conceptualizations of Trust in Scholarly Research on Business Relationships Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care Personalization versus Privacy: An empirical examination of the online consumer's dilemma Social values in health priority setting: a conceptual framework U.S. adoption of computerized physician order entry systems An attitudinal model of technology-based selfservice: moderating effects of consumer traits and situational factors Consumer evaluations of new technology-based self-service options: an investigation of alternative models of service quality User acceptance of computer technology: A comparison of two A Technology Acceptance Model for empirical testing new end-user information systems: Theory and results. Doctoral Dissertation, MIT Perceived usefulness, perceived ease of use, and user acceptance of information technology Electronic health records in ambulatory care-A national survey of physicians Examining the impact of information technology and patient flow on healthcare performance: A Theory of Swift and Even Flow (TSEF) perspective IT Capability for Health Care Delivery: Is More Better? Big Data and blockchain supported conceptual model for enhanced healthcare coverage: The Indian context Internet privacy concerns and social awareness as determinants of intention to transact An extended privacy calculus model for e-commerce transactions An examination of the nature of trust in buyer-seller relationships Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment MedRec" prototype for electronic health records and medical research data. White Paper Belief, attitude, intention and behavior: An introduction to theory and research Utility-Driven Data Analytics on Uncertain Data Determinants of long-term orientation in buyer-seller relationships A Research Agenda for Trust in Online Environments Trust and TAM in online shopping: An integrated model Technology acceptance in health care: An integrative review of predictive factors and intervention programs Consumer e-shopping acceptance: Antecedents in a technology acceptance model The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks Fixed-and random-effects models in metaanalysis Information privacy in online social networks: Uses and gratification perspective Building consumer trust online The Technology Acceptance Model: Its past and its future in health care Structural Equation Modelling: Guidelines for determining model fit Users' acceptance of electronic patient portals in Lebanon Trust: The connection link between organizational theory and philosophical ethics Human development for everyone Fixed effects vs. random effects meta-analysis models: Implications for cumulative research knowledge Investigating enterprise systems adoption: uncertainty avoidance, intrinsic motivation, and the technology acceptance model Privacy concerns on social networking sites: Interplay among posting types, content, and audiences Use of electronic health records in U.S. hospitals Privacy concerns and privacy-protective behavior in synchronous online social interactions An index for factor simplicity Organizational and environmental determinants of hospital EMR adoption: A national study Trust in health information websites: A systematic literature review on the trust A meta-analysis of the technology acceptance model Information hangovers in healthcare service systems Electronic Healthcare: A study of people's readiness and attitude toward performing self-diagnosis Understanding consumer privacy: A review and future directions Facebook privacy management strategies: A cluster analysis of user privacy behaviors The Technology Acceptance Model: Past, present, and future Examining individuals' adoption of healthcare wearables devices: An empirical study from privacy calculus perspective Hospital technology and nurse staffing management decisions Empirical studies on online information privacy concerns: literature review and an integrative framework. Communication of the Association for Information System BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 Creating sustainable healthcare system Using local health information to promote public health Health promotion in the digital era: A critical commentary Internet Users' Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model Public standards and patients' control: how to keep electronic medical records accessible but private Measuring individual differences in reaction norms in field and experimental studies: a power analysis of random regression models The adoption of hospital information systems The Effect of Health Information Technology on Quality in U. S. Hospitals Principles and practice in reporting statistical equation analyses The quality of healthcare delivered to adults in the United States The impact of initial consumer trust on intentions to transact with a web site: a trust building model Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks New service development competence in retail banking: construct development and measurement validation Online health information seeking: the influence of age, information trustworthiness, and search challenges Trust and concern in consumers' perceptions of marketing information management practices Role of electronic trust in online retailing: A re-examination of the commitment-trust theory Evaluation of goodness-of-fit Indices for structural equation models Applying the Technology Acceptance Model to the introduction of healthcare information systems E-health and wellbeing monitoring using smart healthcare devices: An empirical investigation An updated and streamlined Technology Readiness Index: TRI 2.0 Technology Readiness Index (TRI): A Multiple item scale to measure readiness to embrace new technologies Situation awareness, mental workload, and trust in automation: Viable, empirically supported cognitive engineering constructs Cloud based rural healthcare information system Consumer acceptance of electronic commerce: Integrating trust and risk with the Technology Acceptance Model Fog Computing for Sustainable Smart Cities: A Survey Poverty and access to health care in developing countries Antecedents and consequences of consumer privacy concerns: An empirical investigation Privacy concerns and consumer willingness to provide personal information An automated picking workstation for healthcare applications The public's trust and information brokers in healthcare, public health and research The Quest for Privacy in the Internet of Things The Future of Healthcare Internet of Things: A Survey of Emerging Technologies Doctors' orders--If they're electronic, do they improve patient satisfaction? A complements/ substitutes perspective A systematic review of the technology acceptance model in health informatics An innovation-Diffusion view of implementation of enterprise resource planning (ERP) systems and development of a research model A cloud computing solution for patient's data collection in health care institutions Not so different after all: a cross-discipline view of trust Fixed-versus random-effects models in meta-analysis: Model properties and an empirical comparison of differences in results An integrative model of organizational trust: past, present, and future Reporting structural equation modeling and confirmatory factor analysis results: A review Common method bias in regression models with linear, quadratic, and interaction effects The impact of Health Information Technology bundles on hospital performance: An econometric study Information privacy: Measuring individuals' concerns about organizational practices Healthy bodies and thick wallets: The dual relation between health and economic status Why different trust relationships matter for information systems users An empirical examination of the concern for information privacy instrument EHR acceptance among Austrian resident doctors Validation guidelines for IS positivist research. Communications of the Association for Information Systems Empirical evaluation of the revised technology acceptance model Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption Research for universal health coverage Unique Identification Authority of India, Government of India A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the Technology Acceptance Model User Acceptance of Information Technology: Toward a Unified View Poverty and health sector inequalities An Artificial Intelligence Driven Multi-Feature Extraction Scheme for Big Data Detection Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment Towards Effective Trust-based Packet Filtering in Collaborative Network Environments World Health Organization. The global burden of disease The adoption of mobile healthcare by hospital's professionals: an integrative perspective Examining the formation of individual's privacy concerns: Toward an integrative view The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing An empirical study of patients' privacy concerns for health informatics as a service A security and trust framework for virtualized networks and software-defined networking Two Schemes of Privacy-Preserving Trust Evaluation Emerging information technologies for enhanced healthcare A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs Security and Privacy Issues in Healthcare Systems: Towards Trusted Services Big Data for supply chain management in the service and manufacturing sectors: challenges, opportunities, and future perspectives Factors influencing behaviour intentions to telehealth by Chinese elderly: An extended TAM model Securing m-healthcare social networks: challenges, countermeasures and future directions The impact of privacy concern on user adoption of location-based services