RD_Poster_Madison_2010

Rebecca Davenport (Green Bay, Wisconsin, Human Resource Management/Health
Care Administration) and Dr. Gaurav Bansal
Moderating Role of Perceived Health Status on Privacy Concern Factors
and Intentions to Transact with High versus Low Trustworthy Health Websites
Collection
Research Methodology
H1
Web based lab experiment comprising of a scenario grid of 11 websites
ranging in terms of high trust (offering low discount) to low trust (offering
high discount)
Total 245 students participated. 55 responses were eliminated.
Examined discriminant and convergent validity using exploratory factor
analysis
Examined reliability using Cronbach alpha
 Data was analyzed using Ordinary Least Square Regression
All the multivariate variables were estimated by averaging the item scores
Moderation analysis was performed by multiplying the centered variables
(Ray et al. 2005)
.35***
Introduction
The study examines the relative role of health information privacy concern
factors and perceived health status on the trade-off between trust and discount
when buying vitamins online. The study relies on Utility Theory to argue that
the privacy concern factors and perceived health status impact one’s preference
for trust over discount.
Research Model
Collection
H1
Unauthorized
Secondary Use
Improper
Access
H2
Preference
of Trust
over
Discount
H3
H4
H6
H8
Errors
H5
H7
Construct
Privacy
concern
Collection
Code
Col1
Col2
Perceived
Poor
Health Status
Financial Status
Literature Review and Theory





Research suggests that people are concerned for the privacy of their
health information (Bansal et al. 2008; Malhotra et al. 2004; Westin
2006).
People are concerned that once their health information is released, it
cannot be made secret again (Rindfleisch 1997), that the information
may fall in wrong hands (USA Today.com 2008).
Those who perceive their health to be “poor” are more sensitive about
their health information (Bansal et al. 2010).
Privacy concerns have been defined as comprising of four subconstructs: collection, unauthorized secondary use (internal / external),
improper access, and errors (Smith et al. 1996; Stewart and Segars
2002).
Utility theory suggests that people tend to maximize benefit. Those who
are more concerned for privacy protection would trade trust for
discount. Those who are less concerned would like to avail discount at
the expense of perceived privacy protection.
Collection
Concern
Secondary Use
Concern
Errors
My level of concern that online companies may:
Share my health information, without prior authorization with other companies is
(very low / very high)
Sell my health information to other companies is (very low / very high)
Misuse my health information for other reasons without prior authorization is
(very low / very high)
Privacy
concern –
Improper
access
Imp1
Imp2
I am concerned that when it comes to preventing unauthorized access to my
health information, the online companies:
(have sufficient controls / do not have sufficient controls)
(devote sufficient time and effort / do not devote sufficient time and effort at all)
Privacy
concern Errors
Err1
Err2
I am concerned that when it comes to correcting and verifying the accuracy of
my health information, the online companies:
(have excellent procedures/ have poor procedures)
(devote a great deal of time and effort / do not devote any time and effort at all)
Model 1
Model 2
Model3
Model 4
Model 5
Model 6
Intercept
3.00***
3.07***
2.88***
3.03***
2.94***
3.00***
Collection (H1)
0.35***
0.35***
0.36***
0.35***
0.35***
0.34***
Secondary Use (H2)
0.07
0.06
0.05
0.07
0.06
0.06
Improper Access (H3)
-0.19*
-0.19*
-0.18*
-0.19*
-0.20*
-0.17*
Error (H4)
0.17*
0.17*
0.17*
0.17*
0.18*
0.18*
Fin. Status (Control)
0.29***
0.28**
0.31***
0.28**
0.30***
0.29**
0.01
Health status x Sec. Use (H6)
0.05
-0.07*
1.
2.
3.
-0.03
0.04
0.07
7.
Usage of the user information for other purposes, without the users’
approval
Health Status x Errors (H8)
R2
0.24
0.24
0.25
0.24
0.24
0.26
Improper Access
Concern
Unauthorized access to the user information
Adjusted R2
0.22
0.22
0.23
0.21
0.21
0.23
F - Model
10.97
9.11
9.78
9.19
9.21
6.87
Errors Concern
Errors in the user information
p - value
0.00
0.00
0.00
0.00
0.00
0.00
Max VIF
1.99
1.99
2.01
1.99
1.99
2.56
H4
.17*
H6
-.09*
H8
H7
Controls:
Financial Status
(.29**)
Literature Cited
5.
6.
-0.03
R2=24.52%
Collection and error concerns are positively associated with trust over
discount. Improper access is positively associated with discount over trust.
People probably feel that HIPAA explicitly protects them from unauthorized
secondary use and improper access.
People still feel unprotected for collection and error concerns for which
they probably rely on the implicit protection via trust in the health website.
Other reason for the negative role of improper access could be higher
perceived likelihood of improper access of the user’s health information
stored with the trustworthy companies than with the lesser known
companies. E.g., Hacking of Google, CitiBank, Pentagon etc.
Moderation analysis suggests that less healthy people use the explicit
protection to save money in order to buy more medication.
Health websites need to follow different strategies in order to gain their
clients’ business. These strategies need to vary depending upon the
perceived health status of their users.
One impression is that companies need to assure their users about
collection and error concerns, in particular, because findings of this study
suggest that the users are willing to pay a premium in lieu of protection
against these two concerns.
4.
Health Status x Imp. Access (H7)
H3
-.19*
Conclusion and Implications
-0.10*
Collecting too much information on the users
Preference
of Trust
over
Discount
Perceived
Poor
Health Status
Result of the Regression Analysis
Hypothesis / variable
H2
H5
My level of concern when online companies:
Ask for my health information is (very low / very high)
Collect too much health information is (very low / very high)
Health status x Collection (H5)
Definition of the Privacy Concern Factors (Smith et al. 1996)
Improper
Access
Items (Adapted from: Smith et al. 1996, Malhotra et al. 2004)
Privacy
Sec 1
concern –
Sec 2
unauthorized Sec 3
secondary use
Controls:
Unauthorized
secondary use
Estimated Model
Abbreviations:
*** p < .001
** p < .01
* p < .05
8.
9.
Bansal, G., Zahedi, F. M. and Gefen, D. (2008) The Moderating influence of privacy concern on the efficacy of
privacy assurance mechanisms for building trust: A multiple-context investigation, in the proceedings of the
International Conference on Information Systems, Paris.
Bansal, G., Zahedi, F. M. and Gefen, D. (2010) The impact of personal dispositions on information sensitivity,
privacy concern and trust in disclosing health information online, Decision Support Systems, forthcoming.
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004) Internet users’ information privacy concerns (IUIPC): The
construct, the scale, and a causal model, Information Systems Research, 15, 4, 336-355.
Ray, G., Muhanna, W. A. and Barney, J.B. (2005) Information technology and the performance of the customer
service process: A resource-based analysis, MIS Quarterly, 29, 4, 625-652.
Rindfleisch, T. C. (1997) Privacy, information technology, and healthcare, Com. of ACM, 40, 8, 93-100.
Smith, H. J., Milberg, S. J. and Burke, S. J. (1996) Information privacy: Measuring individuals' concerns about
organizational practices, MIS Quarterly, 20, 2, 167-196.
Stewart, K. A., and Segars, A. H. (2002) An empirical examination of the concern for information privacy
instrument, Information Systems Research, 13, 1, 36-49.
USA Today.com (2008) “Google plan for medical info raises privacy issues” 2/22/2008 (last accessed 3/15/2010).
Westin, A. F. (2006) Improving access and protecting privacy, in Connecting Americans to their Health Care,
http://www.phrconference.org/conf_resources/presentations/dec7/improving_access.pdf (last accessed March 12,
2010)