| 研究生: |
蔡明松 Tsai, Ming-Sung |
|---|---|
| 論文名稱: |
當智慧型手機化身為醫療器材-結合隱私計算與風險感受行為觀點探討消費者對於行動醫療應用程式之採用意願 Smartphone as a Medical Device: Examining Users’ Adoption of Mobile Medical Applications – an Empirical Study from Privacy Calculus and Risk-as-Feelings Perspective |
| 指導教授: |
李昇暾
Li, Sheng-Tun |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 經營管理碩士學位學程(AMBA) Advanced Master of Business Administration (AMBA) |
| 論文出版年: | 2016 |
| 畢業學年度: | 104 |
| 語文別: | 中文 |
| 論文頁數: | 87 |
| 中文關鍵詞: | 行動醫療 、ResearchKit 、隱私計算 、風險感知行為 |
| 外文關鍵詞: | Mobile Health, ResearchKit, Privacy Calculus, Risk-as-Feelings |
| 相關次數: | 點閱:90 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,由於智慧型手機與高速行動網路的普及化,藉助行動應用程式(App)從事個人運動記錄與健康管理,已逐漸成為現代人必備的一種生活習慣。同一時間,結合行動資訊科技與醫療服務而衍生的行動醫療(Mobile Health),更是在2014年4月被歐盟列為公共衛生(Public Health)領域的重點發展項目。不過,對消費者而言,使用行動醫療App對個人醫療資訊隱私所產生的風險,也是不應被忽視的一個研究議題。因此,本研究擬結合隱私計算(Privacy Calculus)與風險感受行為(Risk-as-feelings)觀點,探討有哪些因素會實質影響我國消費者對於蘋果公司(Apple, Inc.)於2015年3月所推出的殺手級應用ResearchKit相關醫療類App的採用意願。
本研究係採用「問卷調查法」進行實證研究資料的蒐集,總計回收有效樣本數為517筆,同時使用偏最小平方法(Partial Least Squares, PLS)以進行研究模型的驗證。研究結果顯示,在理性構面中,對開發者的信任是影響行動醫療App採用意願的最重要決定因素,認知風險亦會顯著直接或間接影響行動醫療App採用意願,但隱私顧慮並不會顯著影響行動醫療App採用意願;在感性構面中,健康狀態情緒同樣會顯著影響行動醫療App採用意願。另外,本研究模型的整體解釋能力為26.7%,代表本研究對於採納新資訊科技所提出的理性與感性元素整合觀點具有一定的參考價值。
最後,本研究也一併提出相關學術面與實務面的管理意涵,以期對後續的行動醫療相關研究有所助益。
Thanks to the rapid development and popularization of smartphone and high-speed cellular networks, more and more people today are using mobile applications (apps) to conduct their sport and health management. At the same time, the European Commission has recognized the acute importance of investing in mobile health (mHealth), a kind of medical and public health practice supported by mobile devices, to address the shortage of healthcare workers in the EU countries. While mHealth holds great promise in this field, it should not also be ignored that mHealth has created a new set of risk to privacy and security since personal health information can be stored on mobile devices or shared via networks that are not secure. Drawing on the literatures of privacy calculus theory and risk-as-feelings perspective as the conceptual foundation, this study attempts to understand how privacy perceptions and calculus may influence individuals’ intention to adopt mHealth apps with a particular focus on ResearchKit, which is a killer application introduced by Apple that allows scientists and doctors to create powerful apps for medical research. In this study, 517 measurable samples were collected to empirically verify the research model and partial least squares (PLS) approach was employed as the data analysis tool. The results show that trust in app developer is the key variable to individuals’ adoption intention, and perceived risk and health status emotion both effectively moderate individuals’ adoption intention. The theoretical and practical implications, limitations, and future research directions in mHealth apps are then discussed at the end of this article.
一、中文部分
井三胖. (2015). ResearchKit的五款app究竟是什麼?. Retrieved from http://www.leiphone.com/news/201503/PSiAO8jhdlTgp7Ty.html
江明翰. (2015). 全球智慧手機普及排名台灣上榜 第一名你猜不到. Retrieved from https://tw.tech.yahoo.com/news/%E5%85%A8%E7%90%83%E6%99%BA%E6%85%A7%E6%89%8B%E6%A9%9F%E6%99%AE%E5%8F%8A%E6%8E%92%E5%90%8D%E5%8F%B0%E7%81%A3%E4%B8%8A%E6%A6%9C-%E7%AC%AC-%E5%90%8D%E4%BD%A0%E7%8C%9C%E4%B8%8D%E5%88%B0-120000172.html
何雍慶, & 蔡青姿. (2009). 運用PLS方法探討價值創新導入新產品開發之調節角色. 中華管理評論國際學報.
吳玫瑩, & 林怡君. (2011). 臺灣的大學院校師生對 Library 2.0 網站的使用意圖及使用行為之探討. 圖書資訊學研究.
周君倚, & 陸洛. (2014). 以科技接受模式探討數位學習系統使用態度-以成長需求為調節變項. 資訊管理學報, 21(1), 83-105.
周致中, 黃正魁, & 胡明強. (2013). 探討使用資料探勘工具的滿意與績效之實證研究:結合任務導向行為與科技導向行為的觀點. 資訊與管理科學, 6(2), 4-21.
明報. (2011). 訛稱治暗瘡 兩apps遭罰款. Retrieved from http://dailynews.sina.com/bg/news/int/mingpao/20110913/14392764052.html
林麗真. (2015). 係"驚"耶?!全臺行動族群半年內激增170萬人 熟齡族躍升主力族群 hTC擊敗Samsung奪回手機愛牌美名 現逾1,600萬人每天滑滑滑!!!. Retrieved from http://www.find.org.tw/market_info.aspx?n_ID=8482#
邱皓政. (2011). 當PLS遇上SEM:議題與對話. αβγ量化研究學刊, 3(1), 20-53.
俞力平. (2014). 行動醫療產業的發展與台灣的機會-從美國行動醫療應用程式指引談起. 當代醫藥法規月刊, 42, 9-22.
科技產業資訊室. (2014). 歐盟對於開放mHealth行動健康醫療議題廣徵建言. Retrieved from http://cdnet.stpi.narl.org.tw/techroom/market/bio/2014/bio_14_008.htm
科技產業資訊室. (2015). 精準醫療與基因檢測. Retrieved from http://iknow.stpi.narl.org.tw/post/Read.aspx?PostID=11220
郜倍倍. (2015). 除了鴿子,古代人還靠什麼傳消息?. Retrieved from http://www.dooo.cc/2015/04/36014.shtml
高行, 張嘉芳, 江碩涵, & 江慧珺. (2015). 翁啟惠:個人精準醫療 下波趨勢. Retrieved from http://money.udn.com/money/story/5648/1167675-%E7%BF%81%E5%95%9F%E6%83%A0%EF%BC%9A%E5%80%8B%E4%BA%BA%E7%B2%BE%E6%BA%96%E9%86%AB%E7%99%82-%E4%B8%8B%E6%B3%A2%E8%B6%A8%E5%8B%A2
張馳. (2015). 蘋果ResearchKit醫療軟體基礎架構正式推出,已有6萬人參與. Retrieved from http://www.leiphone.com/news/201504/5NHfwU4k1FHAofGk.html
莊晏詞. (2014). 淺談美國行動健康服務應用程式之管理規範. 科技法律透析, 26(12), 22-28.
陳宜誠. (2011). 軟體下載之「退貨期限」與郵購買賣之「7日猶豫期」是兩件事. Retrieved from http://blog.udn.com/vchen123/5450804
雲端資料分析暨導引系統. (2013). 結構方程模式 (SEM). Retrieved from http://www.r-web.com.tw/stat/step1.php?method=sem
新唐人亞太台. (2015). 精良技術國際認證 台灣濃縮中藥傳遞全球. Retrieved from http://www.ntdtv.com.tw/b5/20151219/video/162311.html?%E7%B2%BE%E8%89%AF%E6%8A%80%E8%A1%93%E5%9C%8B%E9%9A%9B%E8%AA%8D%E8%AD%89%20%E5%8F%B0%E7%81%A3%E6%BF%83%E7%B8%AE%E4%B8%AD%E8%97%A5%E5%82%B3%E9%81%9E%E5%85%A8%E7%90%83
廖珮妤、林宜慧. (2015). 偏鄉公費醫師看診24年 他放不下金門病人. Retrieved from http://www.chinatimes.com/newspapers/20151023000381-260102
劉哲良, & 吳珮瑛. (2013). 健康風險認知與快樂程度對抽菸行為之影響-論抽菸行為的理性與感性. 農業與經濟(50), 1-39.
潘人豪. (2016). 物聯網與大數據時代下的個人化精準醫療. Retrieved from http://innobic.blogspot.tw/2016/02/2016020103.html
蔣維倫. (2015). 滑iPhone也能研究科學?-蘋果的臨床研究App. Retrieved from http://pansci.asia/archives/84058
蕭文龍. (2016). 統計分析入門與應用:SPSS中文版+SmartPLS 3 (PLS-SEM): 碁峰.
謝雨珊. (2015). 指尖上的照護...行動醫療App正夯. Retrieved from http://www.chinatimes.com/newspapers/20150412000093-260204
蘋果日報. (2010). iPhone推除皺軟體 衛署籲勿購買. Retrieved from http://www.appledaily.com.tw/appledaily/article/headline/20100210/32294492/
Apple. (2015). Apple宣布ResearchKit即日可供醫學研究人員使用. Retrieved from http://www.apple.com/tw/pr/library/2015/04/14Apple-Announces-ResearchKit-Available-Today-to-Medical-Researchers.html
Ling, R., & 肖強. (2012). 中國移動醫療:創建一個致勝的商業模式. Retrieved from http://www.pwccn.com/webmedia/doc/634828882329492174_healthcare_mhealth_2012_chi.pdf
MoneyDJ理財網. 精準醫療 (Precision Medicine). Retrieved from http://www.moneydj.com/KMDJ/Wiki/WikiViewer.aspx?KeyID=2fd08c25-44bf-4b1c-8071-253cb25a6cdf
二、英文部分
Akter, S., D'Ambra, J., & Ray, P. (2011). Trustworthiness in mHealth information services: an assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS). Journal of the American Society for Information Science and Technology, 62(1), 100-116.
Anderson, C. L., & Agarwal, R. (2011). The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469-490.
Anderson, M. (2015). Technology Device Ownership: 2015. 68% of Americans have smartphones; 45% have tablet computers. Ownership of other digital devices has not grown in recent years. Retrieved from http://www.pewinternet.org/files/2015/10/PI_2015-10-29_device-ownership_FINAL.pdf
App Annie. (2015). Insights into app engagement Q1 2015. Retrieved from https://s3.amazonaws.com/files.appannie.com/reports/Insights-Into-App-Engagement-Q1-2015-EN.pdf?mkt_tok=3RkMMJWWfF9wsRokv67LZKXonjHpfsX96e8lX66ylMI%2F0ER3fOvrPUfGjI4DRcZjI%2BSLDwEYGJlv6SgFSrfEMbFl3rgPUxU%3D
Ariely, D., & Loewenstein, G. (2006). The heat of the moment: The effect of sexual arousal on sexual decision making. Journal of Behavioral Decision Making, 19(2), 87-98.
Armony, J. L., Servan-Schreiber, D., Cohen, J. D., & LeDoux, J. E. (1997). Computational modeling of emotion: explorations through the anatomy and physiology of fear conditioning. Trends in Cognitive Sciences, 1(1), 28-34.
Ba, S., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. Management Information Systems Quarterly, 243-268.
Ba, S., Whinston, A. B., & Zhang, H. (2003). Building trust in online auction markets through an economic incentive mechanism. Decision Support Systems, 35(3), 273-286.
Babbie, E. R. (1998). The practice of social research (Vol. 112): Wadsworth publishing company Belmont, CA.
Babel, C. (2012). Protecting information with privacy. Retrieved from http://www.scmagazine.com/protecting-information-with-privacy/article/249586/
Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
BCG. (1998). Shop.org/BCG Survey of Online Customers. Retrieved from http://www.bcg.com/
Bechara, A., Damasio, H., Tranel, D., & Damasio, A. R. (1997). Deciding advantageously before knowing the advantageous strategy. Science, 275(5304), 1293-1295.
Blau, P. M. (1964). Exchange and power in social life: Transaction Publishers.
Boulos, M. N., Wheeler, S., Tavares, C., & Jones, R. (2011). How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. Biomedical Engineering Online, 10(1), 24.
Bowman, G., Watson, R., & Trotman‐Beasty, A. (2006). Primary emotions in patients after myocardial infarction. Journal of Advanced Nursing, 53(6), 636-645.
Brief, A. P., & Aldag, R. J. (1977). The intrinsic-extrinsic dichotomy: Toward conceptual clarity. Academy of Management Review, 2(3), 496-500.
Burner, E. R., Menchine, M. D., Kubicek, K., Robles, M., & Arora, S. (2014). Perceptions of successful cues to action and opportunities to augment behavioral triggers in diabetes self-management: qualitative analysis of a mobile intervention for low-income Latinos with diabetes. Journal of Medical Internet Research, 16(1), e25.
Business Wire. (2014). CEA Releases Report on Dramatic Rise of Connected Health and Wellness Consumer Devices Market. Retrieved from http://www.businesswire.com/news/home/20140102005942/en/CEA-Releases-Report-Dramatic-Rise-Connected-Health#.UsbwE5yVYgM
Campbell, J. E., & Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting & Electronic Media, 46(4), 586-606.
Chen, R. (2013). Member use of social networking sites—an empirical examination. Decision Support Systems, 54(3), 1219-1227.
Chen, T. (2015). Apple's ResearchKit Shows Promising Early Results. Retrieved from http://www.forbes.com/sites/medidata/2015/11/23/apples-researchkit-shows-promising-early-results/#a02e20367873
Chin, W. W. (1998). Issues and Opinion on Structural Equation Modeling. Management Information Systems Quarterly, 22(1), 3.
Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.
Clore, G. L., Schwarz, N., & Conway, M. (1994). Affective causes and consequences of social information processing. Handbook of Social Cognition, 1, 323-417.
Cole, J. I. (2000). The UCLA Internet Report: Surveying the Digital Future. Retrieved from http://www.worldinternetproject.net/_files/_Published/_oldis/ucla-internet1.pdf
Cole, J. I. (2001). The UCLA Internet Report 2001: Surveying the Digital Future. Year Two. Retrieved from http://www.worldinternetproject.net/_files/_Published/_oldis/ucla-internet-2001.pdf
Cole, J. I. (2003). The UCLA Internet Report: Surveying the Digital Future. Year Three. Retrieved from http://worldinternetproject.com/_files/_Published/_oldis/UCLA-Internet-Report-Year-Three.pdf
Constine, J. (2015). Apple ResearchKit Turns iPhones Into Medical Diagnostic Devices. Retrieved from http://techcrunch.com/2015/03/09/apple-introduces-researchkit-turning-iphones-into-medical-diagnostic-devices/
Conway, J. M., & Lance, C. E. (2010). What reviewers should expect from authors regarding common method bias in organizational research. Journal of Business and Psychology, 25(3), 325-334.
Cosmides, L., & Tooby, J. (2000). Evolutionary psychology and the emotions. Handbook of Emotions, 2, 91-115.
Coy, K. L. (2001). The current privacy environment: Implications for third‐party research. Journal of Continuing Education in the Health Professions, 21(4), 203-214.
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
Damasio, A. R. (1994). Descartes’ error: Emotion, rationality and the human brain. New York: Putnam, 352, 1061-1070.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Dolan, B., & Gullo, C. (2011). US regulators remove two acne medical apps. Retrieved from http://mobihealthnews.com/13123/us-regulators-remove-two-acne-medical-apps
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. Journal of Marketing, 35-51.
Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877-886.
Efron, B. (1979). Bootstrap Methods: Another Look at the Jackknife. The Annals of Statistics, 7(1), 1-26.
El-Wajeeh, M., Galal-Edeen, G. H., & Mokhtar, H. (2014). Technology Acceptance Model for Mobile Health Systems. IOSR Journal of Mobile Computing & Application, 1(1), 21-33.
Epocrates. (2013). Epocrates 2013 Mobile Trends Report: Maximizing Multi-Screen Engagement Among Clinicians. Retrieved from http://www.epocrates.com/sites/default/files/2013_Epocrates_Mobile_Trends_Report_FINAL.pdf
Escobar-Rodríguez, T., & Carvajal-Trujillo, E. (2014). Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model. Tourism Management, 43, 70-88.
European Commission. (2014). GREEN PAPER on Mobile Health ("mHealth"). {SWD(2014) 135 final}. Retrieved from http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=5147.
Falk, R. F., & Miller, N. B. (1992). A primer for soft modeling: University of Akron Press.
Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219-229.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 39-50.
Fox, B. (2014). Mobile medical apps: Where health and internet privacy law meet. Hous. J. Health L. & Pol'y, 14, 193.
Fox, S., & Duggan, M. (2012). Mobile Health 2012. Half of smartphone owners use their devices to get health information and one-fifth of smartphone owners have health apps. Retrieved from http://www.pewinternet.org/files/old-media//Files/Reports/2012/PIP_MobileHealth2012_FINAL.pdf
Freid, V. M., Bernstein, A. B., & Bush, M. A. (2012). Multiple chronic conditions among adults aged 45 and over: trends over the past 10 years. Women, 45, 64.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Inexperience and experience with online stores: The importance of TAM and trust. Engineering Management, IEEE Transactions on, 50(3), 307-321.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. Management Information Systems Quarterly, 27(1), 51-90.
Gefen, D., & Straub, D. W. (2003). Managing user trust in B2C e-services. E-service Journal, 2(2), 7-24.
Giordano, L. A., Bickel, W. K., Loewenstein, G., Jacobs, E. A., Badger, G. J., & Marsch, L. A. (2004). Mild opioid deprivation and delay to consequences affects how opioid-dependent outpatients value an extra maintenance dose of buprenorphine.
Gostin, L. O., & Hodge Jr, J. G. (2002). Personal privacy and common goods: a framework for balancing under the national health information privacy rule. Minnesota Law Review, 86(6), 1439.
Greenman, C. (1999). On the net, curiosity has a price: Registration. New York Times. Retrieved from http://www.nytimes.com/1999/12/23/technology/on-the-net-curiosity-has-a-price-registration.html
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate Data Analysis (Vol. 6): Pearson Prentice Hall Upper Saddle River, NJ.
Hall, S. D. (2015). Android version of Apple's ResearchKit in the works. Retrieved from http://www.fiercemobilehealthcare.com/story/android-version-apples-researchkit-works/2015-11-23
Handel, M. J. (2011). mHealth (mobile health)—using apps for health and wellness. EXPLORE: The Journal of Science and Healing, 7(4), 256-261.
Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web. The Information Society, 15(2), 129-139.
Ho-Jeong, L. (2015). UAE tops, Korea 4th in smartphone penetration. Retrieved from http://koreajoongangdaily.joins.com/news/article/Article.aspx?aid=3006397
Internet Crime Complaint Center. (2011). 2011 Internet Crime Report. Retrieved from https://www.its.ny.gov/sites/default/files/documents/2011_IC3Report.pdf
Istepanian, R. S., Jovanov, E., & Zhang, Y. (2004). Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health-care connectivity. Information Technology in Biomedicine, IEEE Transactions on, 8(4), 405-414.
Jarvenpaa, S. L., Tractinsky, N., & Vitalec, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1, 45-71.
Javadi, M. H. M., Dolatabadi, H. R., Nourbakhsh, M., Poursaeedi, A., & Asadollahi, A. R. (2012). An analysis of factors affecting on online shopping behavior of consumers. International Journal of Marketing Studies, 4(5), 81.
Jiuan Tan, S. (1999). Strategies for reducing consumers' risk aversion in Internet shopping. Journal of Consumer Marketing, 16(2), 163-180.
Johnson, E. J., & Tversky, A. (1983). Affect, generalization, and the perception of risk. Journal of Personality and Social Psychology, 45(1), 20.
Johnson, K. (2012). CIOs Must Address The Growing Mobile Device Security Threat. Retrieved from http://www.forbes.com/sites/ciocentral/2012/08/16/cios-must-address-the-growing-mobile-device-security-threat/#364502d3fdad
Krogoll, C. (2015). Healthcare anytime anywhere: a case study about the factors predicting initial and continuous usage intention of health-related smartphone applications among Dutch users. (Master), University of Twente.
Kumar, N. (1996). The power of trust in manufacturer-retailer relationships. Harvard Business Review, 74(6), 92-106.
Kummervold, P., Chronaki, C., Lausen, B., Prokosch, H.-U., Rasmussen, J., Santana, S., . . . Wangberg, S. (2008). eHealth trends in Europe 2005-2007: a population-based survey. Journal of Medical Internet Research, 10(4), e42.
Lanier Jr, C. D., & Saini, A. (2008). Understanding consumer privacy: A review and future directions. Academy of Marketing Science Review, 2008, 1.
Larkin, H. (2011). mHealth. Hospitals & Health Networks/AHA, 85(4), 22-26, 22.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42.
LeDoux, J. (1996). The Emotional Brain. Simon & Schuster, New York.
Lee, H. Y., Koopmeiners, J. S., Rhee, T. G., Raveis, V. H., & Ahluwalia, J. S. (2014). Mobile phone text messaging intervention for cervical cancer screening: changes in knowledge and behavior pre-post intervention. Journal of Medical Internet Research, 16(8), e196.
Lee, M. K., & Turban, E. (2001). A trust model for consumer internet shopping. International Journal of Electronic Commerce, 6(1), 75-91.
Li, H., Gupta, A., Zhang, J., & Sarathy, R. (2014). Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract. Decision Support Systems, 57, 376-386.
Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.
Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining Individuals’ Adoption of Healthcare Wearable Devices: An Empirical Study from Privacy Calculus Perspective. International Journal of Medical Informatics.
Li, H., Wu, J., Liu, L., & Li, Q. (2015). Adoption of big data analytics in healthcare: The efficiency and privacy. Paper presented at the Proceedings of 19th Pacific Asia Conference on Information Systems, Singapore.
Li, R., Li, W., Geng, S., & An, Y. (2014). Measurement of Privacy Leakage Tolerance on the Mobile Internet. Paper presented at the PACIS.
Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343-354.
Loewenstein, G. (2005). Hot-cold empathy gaps and medical decision making. Health Psychology, 24(4S), S49.
Loewenstein, G. F., Weber, E. U., Hsee, C. K., & Welch, N. (2001). Risk as feelings. Psychological bulletin, 127(2), 267.
Madden, M., Fox, S., Smith, A., & Vitak, J. (2007). Digital Footprints: Online identity management and search in the age of transparency. Retrieved from Washington, DC: http://www.pewinternet.org/files/old-media/Files/Reports/2007/PIP_Digital_Footprints.pdf
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Margulis, S. T. (2003). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59(2), 411-429.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
Milne, G. R. (1997). Consumer participation in mailing lists: A field experiment. Journal of Public Policy & Marketing, 298-309.
Min, Q., Ji, S., & Qu, G. (2008). Mobile commerce user acceptance study in China: a revised UTAUT model. Tsinghua Science & Technology, 13(3), 257-264.
Minch, R. P. (2004). Privacy issues in location-aware mobile devices. Paper presented at the Proceedings of the 37th Annual Hawaii International Conference on System Sciences.
Norris, A. C., Stockdale, R., & Sharma, S. (2009). A strategic approach to m-health. Health Informatics Journal, 15(3), 244-253.
Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual‐level consumer information: Determining how and when “privacy” matters. Journal of Direct Marketing, 9(3), 46-60.
Nunnally, J. (1978). Psychometric theory: New York: McGraw-Hill.
Pavlou, P. (2001). Integrating trust in electronic commerce with the technology acceptance model: model development and validation. AMCIS 2001 Proceedings, 159.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59.
Peter, J. P., & Ryan, M. J. (1976). An investigation of perceived risk at the brand level. Journal of Marketing Research, 184-188.
Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879.
Prosser, W. L. (1960). Privacy. California Law Review, 383(48), 389-392.
PwC. (2013). Socio-economic impact of mHealth: An assessment report for the European Union. Retrieved from http://www.gsma.com/connectedliving/wp-content/uploads/2013/06/Socio-economic_impact-of-mHealth_EU_14062013V2.pdf
Raghunathan, R., & Pham, M. T. (1999). All negative moods are not equal: Motivational influences of anxiety and sadness on decision making. Organizational Behavior and Human Decision Processes, 79(1), 56-77.
research2guidance. (2014). mHealth App Developer Economics 2014. The State of the Art of mHealth App Publishing. Retrieved from http://research2guidance.com/r2g/research2guidance-mHealth-App-Developer-Economics-2014.pdf
research2guidance. (2015). mHealth App Developer Economics 2015. The current status and trends of the mHealth app market. Retrieved from http://research2guidance.com/r2g/r2g-mHealth-App-Developer-Economics-2015.pdf
Rohm, A. J., & Milne, G. R. (2004). Just what the doctor ordered: the role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000-1011.
Sako, M. (1998). Does trust improve business performance? Trust Within and Between Organizations: Conceptual Issues and Empirical Applications (pp. 88-117): Oxford University Press.
Schoeman, F. D. (1984). Philosophical dimensions of privacy: An anthology: Cambridge University Press.
Sharma, S., & Crossler, R. E. (2014). Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electronic Commerce Research and Applications, 13(5), 305-319.
Sitkin, S. B., & Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. Academy of Management Review, 17(1), 9-38.
Skinner, G., Han, S., & Chang, E. (2006). An information privacy taxonomy for collaborative environments. Information Management & Computer Security, 14(4), 382-394.
Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2004). Risk as analysis and risk as feelings: Some thoughts about affect, reason, risk, and rationality. Risk Analysis, 24(2), 311-322.
SmartPLS GmbH. (2015). Bootstrapping. Retrieved from http://www.smartpls.de/documentation/bootstrapping
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. Management Information Systems Quarterly, 35(4), 989-1016.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. Management Information Systems Quarterly, 167-196.
Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. Management Information Systems Quarterly, 503-529.
Steinhubl, S. R. (2014). Where mobile health technologies are needed in healthcare mHealth Innovation: Best Practices From The Mobile Frontier (pp. 287).
Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459.
Sun, Y., Wang, N., Guo, X., & Peng, Z. (2013). Understanding the acceptance of mobile health services: a comparison and integration of alternative models. Journal of Electronic Commerce Research, 14(2), 183.
Trumbo, C. W., McComas, K. A., & Kannaovakun, P. (2007). Cancer anxiety and the perception of risk in alarmed communities. Risk Analysis, 27(2), 337-350.
Tung, F.-C., Chang, S.-C., & Chou, C.-M. (2008). An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry. International Journal of Medical Informatics, 77(5), 324-335.
Van Boven, L., Loewenstein, G., Welch, N., & Dunning, D. (2004). The illusion of courage: Underestimating the impact of fear of embarrassment on the self. .
Wamba, S. F. (2014). Perceived usefulness, ease of use and risk in Social Media Adoption within Workspace: An Empirical Study Integrating Assessment of Unobserved Heterogeneity in PLS Path Modeling. Paper presented at the Proceedings of the Sixteenth International Conference on Electronic Commerce.
Ward, B., Schiller, J., & Goodman, R. (2014). Multiple chronic conditions among US adults: a 2012 update. Preventing Chronic Disease, 11, E62.
Warkentin, M., Gefen, D., Pavlou, P. A., & Rose, G. M. (2002). Encouraging citizen adoption of e-government by building trust. Electronic Markets, 12(3), 157-162.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 193-220.
Weinstein, N. D. (1989). Effects of personal experience on self-protective behavior. Psychological Bulletin, 105(1), 31.
Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.
Westin, A. F. (2001). Testimony before U.S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade, and Consumer Protection, Hearing on "Opinion surveys: What consumers have to say about information privacy.". Retrieved from https://www.gpo.gov/fdsys/pkg/CHRG-107hhrg72825/html/CHRG-107hhrg72825.htm.
Wu, C.-C., Huang, Y., & Hsu, C.-L. (2014). Benevolence trust: a key determinant of user continuance use of online social networks. Information Systems and e-Business Management, 12(2), 189-211.
Wu, L., & Chen, J.-L. (2005). An extension of trust and TAM model with TPB in the initial adoption of on-line tax: an empirical study. International Journal of Human-Computer Studies, 62(6), 784-808.
Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52.
Xu, H., Teo, H.-H., & Tan, B. (2005). Predicting the adoption of location-based services: the role of trust and perceived privacy risk. Paper presented at the ICIS 2005 proceedings.
Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 135-174.
Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90.
Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior, 26(4), 760-767.
校內:2021-12-31公開