Extending the UTAUT2 model with a privacy calculus model to enhance the adoption of a health information application in Malaysia
This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended—in previous literature—the application of technology adoption mo...
| Main Authors: | Hassan, Ismail Bile, Azmi Murad, Masrah Azrifah, El-Shekeil, Ibrahim, Liu, Jigang |
|---|---|
| Format: | Article |
| Published: |
Multidisciplinary Digital Publishing Institute
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/101440/ |
Similar Items
Privacy and security problems in using health information application in Smart National Identity Card (SNIC)
by: Hassan, Ismail Bile, et al.
Published: (2014)
by: Hassan, Ismail Bile, et al.
Published: (2014)
Adoption of extended UTAUT model on e-learning in UAE higher education institutions
by: Alblooshi, Saeed Abdullatif
Published: (2021)
by: Alblooshi, Saeed Abdullatif
Published: (2021)
Factors Influencing Behavioural Intention to Adopt the QR-Code Payment: Extending UTAUT2 Model
by: Suo, Wen Jing, et al.
Published: (2022)
by: Suo, Wen Jing, et al.
Published: (2022)
Factors Influencing Behavioural Intention to Adopt the QR-Code Payment: Extending UTAUT2 Model
by: Suo, Wen Jing, et al.
Published: (2022)
by: Suo, Wen Jing, et al.
Published: (2022)
Exploring the adoption of AI-enabled English learning applications among university students using extended UTAUT2 model
by: Liu, Nannan, et al.
Published: (2025)
by: Liu, Nannan, et al.
Published: (2025)
Extending the two-stage information systems continuance model: incorporating UTAUT predictors and the role of context
by: Venkatesh, V., et al.
Published: (2011)
by: Venkatesh, V., et al.
Published: (2011)
An extended UTAUT model of factors affecting Malaysian undergradutes’ ICT skills / Ayad A Yass
by: Ayad, A Yass
Published: (2018)
by: Ayad, A Yass
Published: (2018)
Determinants of contact tracing apps: an adoption study using UTAUT model
by: E, Pei Ven, et al.
Published: (2023)
by: E, Pei Ven, et al.
Published: (2023)
Teachers' acceptance of technologies for 4IR adoption: implementation of the UTAUT model
by: Ab Jalil, Habibah, et al.
Published: (2022)
by: Ab Jalil, Habibah, et al.
Published: (2022)
Investigating the adoption of digital library by postgraduate students in Jordan: An enhanced of UTAUT model
by: Al-Oraina, Jawad Khalaf Salman, et al.
Published: (2024)
by: Al-Oraina, Jawad Khalaf Salman, et al.
Published: (2024)
Exploring sexual health information technology adoption intention: a systematic review through the lens of UTAUT
by: Zhang, Xin, et al.
Published: (2024)
by: Zhang, Xin, et al.
Published: (2024)
UTAUT2 influencing the behavioural intention to adopt mobile applications
by: Kuan, Adelyn Lai Kit, et al.
Published: (2014)
by: Kuan, Adelyn Lai Kit, et al.
Published: (2014)
Online information seeking: a review of the literature in the health domain
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2018)
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2018)
A Literature Study on GenAI Adoption Behavior from the UTAUT Perspective
by: Sun, Dongshuo, et al.
Published: (2025)
by: Sun, Dongshuo, et al.
Published: (2025)
A model for enhancing pattern recognition in clinical narrative datasets through text-based feature selection and SHAP technique
by: Dalhatu, Sirajo Muhammad, et al.
Published: (2024)
by: Dalhatu, Sirajo Muhammad, et al.
Published: (2024)
The effect of information systems criterion on the EFQM model in institutions of higher education
by: Ismail, Rosli, et al.
Published: (2015)
by: Ismail, Rosli, et al.
Published: (2015)
Integration of EFQM excellence model and information systems criterion
by: Ismail, Rosli, et al.
Published: (2016)
by: Ismail, Rosli, et al.
Published: (2016)
Factors Influencing Email Usage: Applying The UTAUT Model
by: Lim, Bee Lee
Published: (2005)
by: Lim, Bee Lee
Published: (2005)
Information Behavior Model of e-Health Literacy for online health information-seeking effectiveness
by: Wang, Xuewen, et al.
Published: (2024)
by: Wang, Xuewen, et al.
Published: (2024)
AI adoption in accounting education: a UTAUT-based analysis of mediating and moderating mechanisms
by: Han, Mengrong, et al.
Published: (2025)
by: Han, Mengrong, et al.
Published: (2025)
Acceptance and Use of Lecture Capture System (LCS) in Executive Business Studies: Extending UTAUT2
by: Muhammad Shoaib, Farooq, et al.
Published: (2017)
by: Muhammad Shoaib, Farooq, et al.
Published: (2017)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Online health information seeking and information quality: a preliminary contemplation
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2019)
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2019)
The Role Of Intelligence In E-Learning Usage: An Extension Of Utaut Model
by: Panjaitan, Erwin Setiawan
Published: (2019)
by: Panjaitan, Erwin Setiawan
Published: (2019)
A conceptual framework integration of UTAUT and HBM on evaluating the adoption of electronic payment system in Malaysia
by: Jaafar, Ishaq, et al.
Published: (2020)
by: Jaafar, Ishaq, et al.
Published: (2020)
Librarians’ acceptance of open source Library Information System using the Osis-Utaut Model / Zainab Ajab Mohideen
by: Zainab Ajab, Mohideen
Published: (2017)
by: Zainab Ajab, Mohideen
Published: (2017)
A survey of searching and information extraction on a classical text using ontology-based semantics modeling: a case of Quran
by: Ahmad, Omar, et al.
Published: (2013)
by: Ahmad, Omar, et al.
Published: (2013)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Malaysian SMEs m-commerce adoption : TAM 3, UTAUT 2 and TOE approach
by: Salimon, Maruf Gbadebo, et al.
Published: (2023)
by: Salimon, Maruf Gbadebo, et al.
Published: (2023)
Learning management system usage with postgraduate school: an application of UTAUT model
by: Samaila, Kamaludeen, et al.
Published: (2017)
by: Samaila, Kamaludeen, et al.
Published: (2017)
The Difference in Adoption of Apple Pay in the United States Compared to the United Kingdom, Discovered Using the TAM and UTAUT Technology Adoption Models: A Connection Between Technology Advancement and Cultural Dimensions
by: Peters, Samantha
Published: (2022)
by: Peters, Samantha
Published: (2022)
A negation query engine for complex query transformations
by: Iqbal, Rizwan, et al.
Published: (2013)
by: Iqbal, Rizwan, et al.
Published: (2013)
Extended p-adic q-invariant integrals on ℤp associated with applications of umbral calculus
by: Araci, Serkan, et al.
Published: (2013)
by: Araci, Serkan, et al.
Published: (2013)
A neural network-based model to learn agent's utility function
by: Jazayeriy, Hamid, et al.
Published: (2008)
by: Jazayeriy, Hamid, et al.
Published: (2008)
A hybrid method of feature extraction and naive bayes classification for splitting identifiers
by: Alanee, Nahla, et al.
Published: (2017)
by: Alanee, Nahla, et al.
Published: (2017)
The usability of training management system for teachers’ professional development: a preliminary study
by: Mohd, Noradlina, et al.
Published: (2022)
by: Mohd, Noradlina, et al.
Published: (2022)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
The design of knowledge-based sentiment analysis to detect depression based on youths' song listening behaviour: a preliminary study
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2021)
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2021)
Regression analysis on experience based factory model for software development process
by: Hanafiah, Mastura, et al.
Published: (2017)
by: Hanafiah, Mastura, et al.
Published: (2017)
Similar Items
-
Privacy and security problems in using health information application in Smart National Identity Card (SNIC)
by: Hassan, Ismail Bile, et al.
Published: (2014) -
Adoption of extended UTAUT model on e-learning in UAE higher education institutions
by: Alblooshi, Saeed Abdullatif
Published: (2021) -
Factors Influencing Behavioural Intention to Adopt the QR-Code Payment: Extending UTAUT2 Model
by: Suo, Wen Jing, et al.
Published: (2022) -
Factors Influencing Behavioural Intention to Adopt the QR-Code Payment: Extending UTAUT2 Model
by: Suo, Wen Jing, et al.
Published: (2022) -
Exploring the adoption of AI-enabled English learning applications among university students using extended UTAUT2 model
by: Liu, Nannan, et al.
Published: (2025)