| Literature DB >> 26837539 |
Chen-Chung Ma1, Kuang-Ming Kuo2, Judith W Alexander3.
Abstract
BACKGROUND: The purpose of this study is to investigate factors that motivate nurses to protect privacy in electronic medical records, based on the Decomposed Theory of Planned Behavior.Entities:
Mesh:
Year: 2016 PMID: 26837539 PMCID: PMC4736168 DOI: 10.1186/s12911-016-0254-y
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Fig. 1Research framework (Adapted with permission. Copyright 1995 INFORMS. Shirley Taylor, Peter A. Todd (1995) Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research 6(2):144–176, the Institute for Operations Research and the Management Sciences, 5521 Research Park Drive, Suite 200, Catonsville, Maryland 21228, USA). Note: PU (perceived usefulness), PEOP (perceived ease of protection), COM (compatibility), PI (peer influence), SI (superior influence), SE (self-efficacy), FC (facilitating conditions), AT (attitude), SN (subjective norm), PBC (perceived behavioral control), BI (behavioral intention)
Constructs of interest and corresponding items
| Constructs (abbreviation) | Items | Measure |
|---|---|---|
| Perceived usefulness (PU) [ | PU1 | Protecting EMRs privacy is beneficial to me |
| PU2 | The advantages of protecting EMRs privacy outweigh the disadvantages | |
| PU3 | Protecting EMRs privacy will improve patients’ trust on hospitals | |
| Perceived ease of protection (PEOP) [ | PEOP1 | The instructions for protecting EMRs privacy is easy to follow |
| PEOP2 | It is easy to learn how to protect EMRs privacy | |
| PEOP3 | It is easy to protect EMRs privacy | |
| Compatibility (COM) [ | COM1 | Protecting EMRs privacy fits into my work style |
| COM2 | I think that protecting EMRs privacy fits well with the way I like to work | |
| COM3 | Protecting EMRs privacy is compatible with all aspects of my work | |
| Peer influence (PI) [ | PI1 | My friends would think that I should protect EMRs privacy |
| PI2 | My colleagues would think that I should protect EMRs privacy | |
| Superior influence (SI) [ | SI1 | My superior would think that I should protect EMRs privacy |
| SI2 | I will protect EMRs privacy because my superior asks for | |
| Self-efficacy (SE) [ | SE1 | I could easily protect EMRs privacy if I wanted to |
| SE2 | I could protect EMRs privacy if there was no one around to tell me what to do as I go | |
| SE3 | I would feel comfortable in protecting EMRs privacy | |
| Facilitating conditions (FC) [ | FC1 | The equipment (computers, printers, etc.) for EMR systems is compatible with other hardware I use in hospital |
| FC2 | The software for EMR systems is compatible with other software I use in hospital | |
| FC3 | I could use EMR systems to query patient’s medical records | |
| Attitude (ATT) [ | ATT1 | Protecting EMRs privacy is a good idea |
| ATT2 | I think protecting EMRs privacy is a wise idea | |
| ATT3 | I like the idea of protecting EMRs privacy | |
| ATT4 | Protecting EMRs privacy is fun | |
| Subjective norm (SN) [ | SN1 | People who influence my behavior would think that I should protect EMRs privacy |
| SN2 | People who are important to me would think that I should protect EMRs privacy | |
| Perceived behavioral control (PBC) [ | PBC1 | I would be able to protect EMRs privacy |
| PBC2 | I have the knowledge necessary to protect EMRs privacy | |
| PBC3 | I have the resources necessary to protect EMRs privacy | |
| Behavioral intention (BI) [ | BI1 | I intend to protect EMRs privacy |
| BI2 | I predict I would protect EMRs privacy | |
| BI3 | I plan to protect EMRs privacy |
Respondent characteristics
| Variable | Category | Frequency | Percentage |
|---|---|---|---|
| Gender | Male | 6 | 2 |
| Female | 296 | 98 | |
| Age (years) | 18–29 | 58 | 19.2 |
| 30–49 | 226 | 74.8 | |
| 50–64 | 18 | 6 | |
| Education level | High school | 2 | 7 |
| College | 281 | 93 | |
| University | 19 | 6.3 | |
| Working position | Non-managerial | 276 | 91.4 |
| Managerial | 26 | 8.6 |
Descriptive statistics and reliability measures
| Construct | Items | Mean | SD | Loadings | AVE | CR | Cronbach’s α |
|---|---|---|---|---|---|---|---|
| PU | PU1 | 6.09 | 0.94 | .97 | .92 | .97 | .96 |
| PU2 | 6.01 | 0.97 | .96 | ||||
| PU3 | 6.07 | 0.95 | .95 | ||||
| PEOP | PEOP1 | 5.68 | 1.03 | .95 | .91 | .97 | .95 |
| PEOP2 | 5.68 | 1.03 | .95 | ||||
| PEOP3 | 5.64 | 1.04 | .96 | ||||
| COM | COM1 | 5.77 | 0.94 | .98 | .96 | .98 | .98 |
| COM2 | 5.75 | 0.94 | .98 | ||||
| COM3 | 5.76 | 0.93 | .98 | ||||
| PI | PI1 | 5.80 | 1.01 | .97 | .95 | .98 | .95 |
| PI2 | 5.89 | 0.98 | .98 | ||||
| SI | SI1 | 6.05 | 0.93 | .97 | .93 | .96 | .93 |
| SI2 | 5.97 | 1.00 | .96 | ||||
| SE | SE1 | 5.86 | 0.96 | .94 | .91 | .97 | .95 |
| SE2 | 5.70 | 1.12 | .95 | ||||
| SE3 | 5.75 | 1.02 | .96 | ||||
| FC | FC1 | 5.60 | 1.06 | .95 | .91 | .97 | .95 |
| FC2 | 5.62 | 1.07 | .97 | ||||
| FC3 | 5.59 | 1.05 | .94 | ||||
| ATT | ATT1 | 6.00 | 0.90 | .93 | .88 | .97 | .96 |
| ATT2 | 5.88 | 0.94 | .96 | ||||
| ATT3 | 5.87 | 0.95 | .96 | ||||
| ATT4 | 5.72 | 1.05 | .90 | ||||
| SN | SN1 | 5.90 | 0.96 | .99 | .98 | .99 | .82 |
| SN2 | 5.89 | 0.99 | .99 | ||||
| PBC | PBC1 | 5.88 | 0.92 | .96 | .93 | .98 | .96 |
| PBC2 | 5.81 | 1.00 | .97 | ||||
| PBC3 | 5.75 | 0.99 | .96 | ||||
| BI | BI1 | 5.92 | 0.96 | .97 | .92 | .97 | .96 |
| BI2 | 5.88 | 0.97 | .96 | ||||
| BI3 | 5.97 | 0.92 | .94 |
CR denotes composite reliability, AVE denotes average variance extracted
Inter-construct correlations
| PU | PEOP | COM | PI | SI | SE | FC | ATT | SN | PBC | BI | |
|---|---|---|---|---|---|---|---|---|---|---|---|
| PU |
| ||||||||||
| PEOP | .67 |
| |||||||||
| COM | .82 | .74 |
| ||||||||
| PI | .70 | .74 | .81 |
| |||||||
| SI | .61 | .73 | .73 | .77 |
| ||||||
| SE | .73 | .70 | .83 | .82 | .74 |
| |||||
| FC | .70 | .62 | .76 | .73 | .61 | .76 |
| ||||
| ATT | .77 | .79 | .88 | .82 | .80 | .80 | .70 |
| |||
| SN | .71 | .75 | .79 | .86 | .84 | .82 | .70 | .84 |
| ||
| PBC | .71 | .75 | .84 | .82 | .76 | .86 | .81 | .83 | .84 |
| |
| BI | .69 | .78 | .82 | .84 | .78 | .82 | .75 | .84 | .83 | .88 |
|
Diagonal means the square root of Average Variance Extracted
Fig. 2Structural model results with β and t-statistics (in parenthesis)(Adapted with permission. Copyright 1995 INFORMS. Shirley Taylor, Peter A. Todd (1995) Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research 6(2):144–176, the Institute for Operations Research and the Management Sciences, 5521 Research Park Drive, Suite 200, Catonsville, Maryland 21228, USA)
Removed items
| Constructs (abbreviation) | Items retained | Items removed | Reason(s) for removing items |
|---|---|---|---|
| Perceived usefulness (PU) | PU1/PU2/PU3 | PU4: Overall, protecting EMRs privacy will be advantageous | Two out of three experts considered PU4 is similar to PU1, PU2, and PU3; and suggested removal. |