Introduction Unvalidated Sources of Health Information (USHI) like health information presented through social network sites (SNS), blogs, forums, private websites and the likes proliferate the internet. Many times, the information on these platforms are incomplete, incorrect, outdated or plainly misleading and can be perilous to their consumers [1]. Patients, relatives of patients, or friends of patients utilize these platforms for a plethora of reasons ranging from guidance on major and minor health decisions to the desire for support from other users [30]. Support, as used here, could be emotional, social or financial and is usually gained by patients through the sharing of their personal medical issues, asking questions or sharing of …show more content…
Information Quality
Researchers have traditionally considered information quality to be informed by the accuracy, relevance, completeness, presentation and currency of information [25]. Information pieces that possess positive amounts of these factors when measure objectively are expected to have a high propensity for use to consumers [24, 25]. Interestingly, USHI’s success contradicts the traditional beliefs on information quality, thus, questioning the sufficiency of objective methods of measuring information quality in predicting the adoption and success of IS.
These are only some of the questions that the success of USHI poses to the research community. Some others concern the identification of design factors that engender users’ positive perception. Could the simplicity of the content, which are usually written in layman's terms, be an enabling factor? Is there an appealing design structure they employ? Also, understanding the characteristics of the adopters of these systems may provide useful insights to reasons for their vulnerability and how to curtail them or positively use them for other
…show more content…
However, unlike other research that attempt to predict the adoption or success of technologies based on predefined constructs (antecedents), we argue that the most useful studies on USHI will be those that attempt to “reverse-engineer” its success, going even beyond standard antecedents with a view to identifying key components that inform those antecedents which in turn result in the success of the technology. This approach as proposed by Benbasat and Barki [26] for the technology acceptance model is believed to be able to help generate actionable information on how to “create” the antecedents to the desired success of information technology artifacts. Some applicable theories that can be reverse-engineered
Moreover, social media can be very beneficial to patients suffering from chronic conditions as well as their family and friends (Norton & Strauss, 2013). For rare diseases local community support groups may not be available. Social media steps in to fill this void by offering users a variety of different online support groups, blogs, newsletters, and networks. Individuals can use such resources to reach out to others with similar issues, find much needed support during difficult times, and become aware of treatments and medications that worked for others with their same illness that may prompt them to contact their doctor about other possibilities in treatment options. When used properly, smartphones and social media can be very beneficial to healthcare providers and patients.
Caveat lector is a Latin phrase meaning, “let the reader beware.” Health information on the internet is growing at an alarming rate. However, some information on the internet is not accurate or current, and unfortunately, many web sites regarding healthcare offer misleading, incomplete, and incorrect information. Many consumers do not have the knowledge to judge and evaluate the quality of online information. This paper aims to discuss how the website WebMD presents information to readers. It will evaluate WebMD according to its source, where was the source obtained; type of funding, is it commercially funded or private; the validity and quality, how valid is the information and can it be verified; and privacy, is your personal information
Education of patients and families regarding the reliability of internet information is prudent. Given the enormous amount of information available via the World Wide Web, not all of which, as you illustrate, is reliable, it is of great importance that patients and families comprehend the unreliability of some of the information they may acquire. Patients who are unable to gain access to health care secondary to a lack of funds, insurance, or availability of their provider, may be inclined to review their symptoms utilizing a search engine. Moreover, patients who were incapable of accessing healthcare due to reasons other than a lack of insurance are more likely to utilize the internet to obtain health related
Joining the American Health Information Management Association (AHIMA) benefits individuals and distinguishes them apart from others. AHIMA labels individual’s as competent, knowledgeable and committed to the association through quality healthcare delivery and quality information.
Chapter Seventeen’s topic on the consumer’s quest for health information via the Internet, posed a “challenge for consumers and healthcare professionals alike” (McGonigle & Mastrian, 2015, p. 288) to ensure that the sites offer “reliable and credible sources of information” (Hall, 2009, p. 607). Nurses’ access to reliable and valid information is a must not only as clinicians but also as patient educators (McGonigle & Mastrian, 2015). Thus, “nurses are challenged to find and use reliable, credible information to support clinical decision-making and to meet expectations for evidence-based nursing practice” (Miller, Jones, Graves, & Sievert, (2010, Abstract, para. 1) both for themselves and for their patients.
Among other associations, The Association of Healthcare Documentation Integrity (ADHI) has a set of guidelines and standards for their workers. As a registered medical transcriptionist, professionals are expected to uphold both the moral and legal rights of patients, safeguard their privacy, and collaborate with others to ensure patient safety to provide the best quality of care. Through the Code of Ethics ADHI establishes a high standard of conduct that workers in the profession are expected to meet, otherwise they face having their certification revoked from failure to comply. Within the Code of Ethics some of the expectations that professionals are expected to abide by include: maintaining confidentiality of all patient information , implementing
Emergency department’s health care information exchange was a proven factor in the Hawthorne effect. “The health care information exchange is a new type of electronic medical record that enables appropriate information sharing between caregivers at multiple health care facilities within a given region”( The Journal of Emergency Medicine, 2014). This system was able to survey patients who go to different medical facilities for treatment and medications. Patients who answered the survey were very truthful with their answers because of fear of being monitored. It saved medical providers time, cost effective and they were able to treat patients accordingly. Their response lead to quality care improvement across the board in treating patients
The Office of the National Coordinator for Health IT [ONC], on behalf of the US Department of Health and Human Services [HHS] Secretary, establishes criteria, standards, and specifications that health information technology [IT] must follow in order to meet minimum requirements for certification. The ONC oversees the certification of electronic health technology and oversees the ONC Health IT Certification Program [Program]. The Program was enacted in order to determine whether products meet set standards and criteria to be considered certified. Certification is important for health IT because it ensures that products are functional, capable, and secure in order to meet the requirements of Meaningful Use. Healthcare providers must demonstrate that they are “meaningfully using” health IT in order to receive incentive payments.
To further develop the model, Venkatesh & Davis (2000) added new constructs that came from social environment and rational process. They believed that these constructs will be able to explain causal relationship of the model. The new constructs in Technology Acceptance Model 2 are:
It should be noted that there are interactions between use, user satisfaction, and intention to use the system (Kavanagh & Thite, 2009). Intentions to use the system often lead to use. The use can lead to higher levels of user satisfaction and further increased intentions to use the system. The reverse is true as well. If there is a low level of user satisfaction, then the intention to use the system will decrease. The use and user satisfaction relate directly to the net benefits. If the use of the system leads to significant benefits, then the net benefits will lead to increases in user satisfaction and intention to use the system. In other words, if individuals begin using that system and find that it has a number of net benefits, they are likely to be satisfied and plan to use the system more frequently in the future (Wang & Liao, 2008).
Almost daily a new information technology is introduced into our personal, professional, or educational lives. Studying acceptance of new technologies has become a focus of industry as well as academia. Application developers realize that lack of user acceptance of their technology can lead to loss of money, resources, and the failure of their product. In studying this key factor of user acceptance and use of technology, the Technology Acceptance Model (TAM) is one of the most cited models.TAM was developed by Fred Davis and Richard Bogazzi to explain computer technology user decisions. The theoretical basis of the TAM model was from Fishbein and Ajzen’s Theory of Reasoned Action (TRA).
Two models are connected to the technology performance. Utilization model is the most common model that is connected to the users’ attitudes, beliefs and also behaviors (Lin, 2012). The model shows that increased utilization leads to the positive performance impacts (Lin, 2012). The task-technology fit is the second model that indicates performance increases when the technology initiated features and support tends to fit the requirements of the tasks (Lin, 2012; Safar, 2008). In most cases, the performance impacts that are obtained and associated with the information systems tend to be difficult in measuring them directly. The information systems researchers focus on the surrogates’ system success measures through under evaluations (Saarinen, 1996). The user evaluation indicates the assessment that is made by the identified user that is conducted through a survey that has associated series of questions as the user is supposed to respond on the positive to negative features and experience concerning the information systems qualities. Depending on the selected users of the information systems such as blind students in tis study, the evaluation is effective if the information systems success measures are undertaken through identification of specific positive impact and constructs (Anderson, 1989). The user evaluation should be undertaken on the basis of task-technology fit.
Information quality is often a key dimension of end-user satisfaction instruments (Ives et al., 1983; Baroudi & Orlikowski, 1988; Doll et al., 1994). Information quality is often not distinguished as a unique construct to measure success but is measured as a component of user satisfaction. Fraser & Salter (1995) developed a generic scale of information quality, and others have developed their own scales using the literature that is relevant to the type of information system under study (Coombs et al., 2001; Wixom & Watson, 2001; Gable et al., 2003) whereby the domain basically depend a lot on the dimension of user satisfaction, how they perceive the information quality and whether it increases their job effectiveness.
Information systems are vital to the operation and management of every organization. Managers investing in IS are interested in the benefit their organizations gain from this investment. However, neither managers nor researchers have found a way to justify investment in IS based on its contribution to an organization’s performance. Most studies examining the relationship between IS and performance level have found no positive relationship between the two variables [7]. But these studies have been holistic, relating the total IS investment—software, hardware, personnel—to the total profit of the organization. Our study now suggests that the analysis should be particulate, not holistic. An
This chapter makes some conclusions from this study, which drawn from chapter 1 to chapter 6.This research aims to spread a knowledge on the circumstances of user satisfaction and adoption of a WPS using the TPB framework. The study move toward AP using CI approaches on measuring success in WP to bridge from US using IS theories as an establishing approaches. Since IS study is comprised from many discipline such as marketing, social psychology, economics, computer sciences, and etc., this research proposed operationalized, and empirically examine a comprehensive, frugal model that explains and predicts three dimension of user’s behavior toward adoption of a WPS and