scispace - formally typeset
Search or ask a question
Journal ArticleDOI

An Integrated Success Model for Adopting Biometric Authentication Technique for District Health Information Management System 2, Ghana

17 Feb 2020-International Journal of Computer Applications (Foundation of Computer Science)-Vol. 177, Iss: 40, pp 1-16
TL;DR: Based on empirical findings, users with a higher degree of perceived usefulness, privacy concerns, and security concerns will demonstrate a more positive attitude towards adopting keystroke biometric authentication in an e-Health System.
Abstract: This paper evaluated users’ perspective of adopting a biometric authentication technique by utilizing a proposed model derived from the technology acceptance model to determine how effective user accepts a proposed keystroke biometric authentication in an E-Health System. This paper combined the TAM of Davis et al with the success adoption model of DeLone and McLean where external variables for the TAM of Davis et al were derived from the four dimensions considered in the model of DM. The research design is a self-administered survey and the empirical part of the research is quantitative. The aim of the empirical part is to test the fit of the conceptual model with received data based on a questionnaire. This paper uses a crosssectional approach that provides a “snapshot” of the secured system’s usefulness and ease-of-use from the perspective of the end-users. Based on empirical findings, users with a higher degree of perceived usefulness, privacy concerns, and security concerns will demonstrate a more positive attitude towards adopting keystroke biometric authentication in an e-Health System. The proposed model and its elements prove that it can be a useful tool for decision makers in evaluating authentication techniques in e-health systems.

Content maybe subject to copyright    Report

Citations
More filters
01 Jan 2016
TL;DR: The handbook of biometrics is universally compatible with any devices to read, and will help you to get the most less latency time to download any of the authors' books like this one.
Abstract: Thank you very much for reading handbook of biometrics. Maybe you have knowledge that, people have look numerous times for their favorite books like this handbook of biometrics, but end up in malicious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they are facing with some harmful virus inside their desktop computer. handbook of biometrics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the handbook of biometrics is universally compatible with any devices to read.

275 citations

24 Oct 2016
TL;DR: This paper found that people do tend to re-use each password on 1.7-3.4 different websites, they reuse passwords that are more complex, and mostly they tend to use passwords that they have to enter frequently.
Abstract: From email to online banking, passwords are an essential component of modern internet use. Yet, users do not always have good password security practices, leaving their accounts vulnerable to attack. We conducted a study which combines self-report survey responses with measures of actual online behavior gathered from 134 participants over the course of six weeks. We find that people do tend to re-use each password on 1.7-3.4 different websites, they reuse passwords that are more complex, and mostly they tend to re-use passwords that they have to enter frequently. We also investigated whether self-report measures are accurate indicators of actual behavior, finding that though people understand password security, their self-reported intentions have only a weak correlation with reality. These findings suggest that users manage the challenge of having many passwords by choosing a complex password on a website where they have to enter it frequently in order to memorize that password, and then re-using that strong password across other websites.

30 citations

Journal ArticleDOI
TL;DR: The predictive relevance of developed HIT model was determined and the relevance of the overall paths of the model was predictive, suggesting that TR, ORR, and OCR explained 55.8% of the total amount of variance in HIT/eHealth readiness in the case of KATH.
Abstract: There exist a sizable body of research addressing the evaluation of eHealth/health information technology (HIT) readiness using standard readiness model in the domain of Information Systems (IS). However, there is a general lack of reliable indicators used in measuring readiness assessment factors, resulting in limited predictability. The availability of reliable measuring tools could help improve outcomes of readiness assessments. In determining the predictive relevance of developed HIT model we collected quantitative data from clinical and non-clinical (administrators) staff at Komfo Anokye Teaching Hospital (KATH), Kumasi Ghana using the traditional in-person distribution of paper-based survey, popularly known as drop and collect survey (DCS). We then used PLS-SEM path analysis to measure the predictive relevance of a block of manifest indicators of the readiness assessment factors. Three important readiness assessment factors are thought to define and predict the structure of the KATH HIT/eHealth readiness survey data (Technology readiness (TR); Operational resource readiness (ORR); and Organizational cultural readiness (OCR). As many public healthcare organizations in Ghana have already gone paperless without any reliable HIT/eHealth guiding policy, there is a critical need for reliable HIT/eHealth regulatory policies readiness (RPR) and some improvement in HIT/eHealth strategic planning readiness (core readiness). The final model (R2 = 0.558 and Q2 = 0.378) suggest that TR, ORR, and OCR explained 55.8% of the total amount of variance in HIT/eHealth readiness in the case of KATH and the relevance of the overall paths of the model was predictive. Fit values (SRMR = 0.054; d_ULS = 6.717; d_G = 6.231; Chi2 = 6,795.276; NFI = 0.739). Generally, the GoF for this SEM are encouraging and can substantially be improved.

7 citations

Journal ArticleDOI
TL;DR: Pre-consultation testing significantly improves clinicians’ adherence to malaria test results, shortens patients’ waiting time and leads to overall patient satisfaction.
Abstract: The Ministry of Health, Ghana, in accordance with global policy, recommends that all suspected malaria cases be confirmed parasitologically before treatment. Not all clinicians, however, base their treatment on test results. Patients also spend a lot of time at health facilities waiting to consult a clinician before being asked to go for testing and to see a clinician with test results. The purpose of the study was to determine if testing all children aged 6 to 59 months with fever reporting at an outpatients department (OPD) for malaria before consultation with a clinician (pre-consultation testing) will influence clinicians to adhere to test results and also reduce the time spent by such patients. A quasi-experimental study design was used involving two randomly selected government-owned hospitals in the Northern Volta, Ghana. In each hospital, 439 children were recruited between November 2018 and January 2019. The intervention hospital implemented pre-consultation testing. In the comparator arm, standard practices, which involved patients seeing the clinician before he/she decides whether to send the patient for testing or not, were maintained. Out of 878 children screened the overall prevalence of malaria was 31.9% by malaria rapid diagnostic test (RDT) and 26.7% by microscopy. Clinicians in the intervention arm adhered more to the malaria test results than those in the comparator arm (93.2 vs. 84.3%; p < 0.001). The proportion of children who tested negative but were still diagnosed with malaria was significantly lower in the intervention arm compared to the comparator arm (8.4 vs. 21.2%: p < 0.001). Clinicians and mothers/caregivers in both arms preferred pre-consulting testing. Six out of every 10 mothers/caregivers in the comparator arm viewed the waiting time as ‘too long’’ compared to 4 out of every 10 mothers in the intervention arm. On average, patient waiting time was significantly lower in the intervention arm (2.61 h) than in the comparator arm (3.42 h). Pre-consultation testing significantly improves clinicians’ adherence to malaria test results, shortens patients’ waiting time and leads to overall patient satisfaction. There is a need to establish RDT corners at OPDs of health facilities to implement pre-consultation testing.

5 citations

Journal ArticleDOI
TL;DR: In this paper, a personal health information management system based on Java is presented, where the overall hierarchical structure of the system is designed including a health management module, personal health data synchronization module, and full-text retrieval module.
Abstract: Health information management systems help gather, compile, and analyze health data to help manage population health and reduce healthcare costs. It can support the clinical decision, help diagnose individual patients, and improve patient care. In this study, a personal health information management system based on Java is presented. Based on the Java platform, the overall hierarchical structure of the system is designed including a health information management module, personal health data synchronization module, and full-text retrieval module, to realize the functions of the system. To improve the security of personal health information, the data encryption standard (DES) algorithm is implemented to encrypt and protect personal healthcare information. The system is evaluated in terms of health information acquisition accuracy, information security, and system response time. To verify the robustness of the proposed health information management system, it is compared with two related studies. The maximum health information acquisition accuracy of the system is 99%, the safety factor reported is above 0.9, and the maximum response time is only 0.8 s. The experimental results show that the designed personal health information management system can collect health information more accurately and ensure the security of information, and the overall response time is shorter.
References
More filters
Journal ArticleDOI
TL;DR: The Unified Theory of Acceptance and Use of Technology (UTAUT) as mentioned in this paper is a unified model that integrates elements across the eight models, and empirically validate the unified model.
Abstract: Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formulate a unified model that integrates elements across the eight models, and (4) empirically validate the unified model. The eight models reviewed are the theory of reasoned action, the technology acceptance model, the motivational model, the theory of planned behavior, a model combining the technology acceptance model and the theory of planned behavior, the model of PC utilization, the innovation diffusion theory, and the social cognitive theory. Using data from four organizations over a six-month period with three points of measurement, the eight models explained between 17 percent and 53 percent of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Technology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT was then tested using the original data and found to outperform the eight individual models (adjusted R2 of 69 percent). UTAUT was then confirmed with data from two new organizations with similar results (adjusted R2 of 70 percent). UTAUT thus provides a useful tool for managers needing to assess the likelihood of success for new technology introductions and helps them understand the drivers of acceptance in order to proactively design interventions (including training, marketing, etc.) targeted at populations of users that may be less inclined to adopt and use new systems. The paper also makes several recommendations for future research including developing a deeper understanding of the dynamic influences studied here, refining measurement of the core constructs used in UTAUT, and understanding the organizational outcomes associated with new technology use.

27,798 citations

Journal ArticleDOI
TL;DR: In this article, the authors address the ability to predict peoples' computer acceptance from a measure of their intentions, and explain their intentions in terms of their attitudes, subjective norms, perceived usefulness, perceived ease of use, and related variables.
Abstract: Computer systems cannot improve organizational performance if they aren't used. Unfortunately, resistance to end-user systems by managers and professionals is a widespread problem. To better predict, explain, and increase user acceptance, we need to better understand why people accept or reject computers. This research addresses the ability to predict peoples' computer acceptance from a measure of their intentions, and the ability to explain their intentions in terms of their attitudes, subjective norms, perceived usefulness, perceived ease of use, and related variables. In a longitudinal study of 107 users, intentions to use a specific system, measured after a one-hour introduction to the system, were correlated 0.35 with system use 14 weeks later. The intention-usage correlation was 0.63 at the end of this time period. Perceived usefulness strongly influenced peoples' intentions, explaining more than half of the variance in intentions at the end of 14 weeks. Perceived ease of use had a small but significant effect on intentions as well, although this effect subsided over time. Attitudes only partially mediated the effects of these beliefs on intentions. Subjective norms had no effect on intentions. These results suggest the possibility of simple but powerful models of the determinants of user acceptance, with practical value for evaluating systems and guiding managerial interventions aimed at reducing the problem of underutilized computer technology.

21,880 citations

Journal ArticleDOI
TL;DR: This paper discusses many of the important IS success research contributions of the last decade, focusing especially on research efforts that apply, validate, challenge, and propose enhancements to the original model.
Abstract: Ten years ago, we presented the DeLone and McLean Information Systems (IS) Success Model as a framework and model for measuring the complex-dependent variable in IS research. In this paper, we discuss many of the important IS success research contributions of the last decade, focusing especially on research efforts that apply, validate, challenge, and propose enhancements to our original model. Based on our evaluation of those contributions, we propose minor refinements to the model and propose an updated DeLone and McLean IS Success Model. We discuss the utility of the updated model for measuring e-commerce system success. Finally, we make a series of recommendations regarding current and future measurement of IS success.

9,544 citations

Journal ArticleDOI

7,432 citations


"An Integrated Success Model for Ado..." refers background in this paper

  • ...Descriptive research was deemed appropriate for this phase, since it is better at collecting information that describes the world as it is (35)....

    [...]

Journal ArticleDOI
TL;DR: This work draws from the vast body of research on the technology acceptance model (TAM) to develop a comprehensive nomological network of the determinants of individual level IT adoption and use and present a research agenda focused on potential pre- and postimplementation interventions that can enhance employees' adopted and use of IT.
Abstract: Prior research has provided valuable insights into how and why employees make a decision about the adoption and use of information technologies (ITs) in the workplace. From an organizational point of view, however, the more important issue is how managers make informed decisions about interventions that can lead to greater acceptance and effective utilization of IT. There is limited research in the IT implementation literature that deals with the role of interventions to aid such managerial decision making. Particularly, there is a need to understand how various interventions can influence the known determinants of IT adoption and use. To address this gap in the literature, we draw from the vast body of research on the technology acceptance model (TAM), particularly the work on the determinants of perceived usefulness and perceived ease of use, and: (i) develop a comprehensive nomological network (integrated model) of the determinants of individual level (IT) adoption and use; (ii) empirically test the proposed integrated model; and (iii) present a research agenda focused on potential pre- and postimplementation interventions that can enhance employees' adoption and use of IT. Our findings and research agenda have important implications for managerial decision making on IT implementation in organizations.

5,246 citations