1 |
T. C. Rindfleisch, "Privacy, information technology, and health care," Communications of the ACM, Vol. 40, No. 8, pp. 93-100, 1997.
|
2 |
A. Appari and E. M. Johnson, "Information Security and Privacy in Healthcare: Current State of Research," International Journal of Internet and Enterprise Management, Vol. 6, No. 4, pp. 279-314, 2010.
DOI
|
3 |
G. Bansal, F. M. Zaheid, and D. Gefen, "The Impact of Personal Dispositions on Privacy and Trust in Disclosing Health Information Online," Americas Conference on Information Systems, 2007.
|
4 |
B. Campbell, H. Thomson, J. Slater, C. Coward, K. Wyatt, and K. Sweeney, "Extracting Information from Hospital Records: What Patients Think about Consent," Quality and Safety in Healthcare, Vol. 16, No. 6, pp. 404-408, 2007.
DOI
|
5 |
C. M. Angst, R. Agrawal, and J. Downing, "An Empirical Examination of the Importance of Defining the PHR for Research and for Practice," Robert H. Smith School Research Paper, No. RHS-06-011, 2006.
|
6 |
H. Park, S-I. Lee, Y. Kim, E-Y. Heo, J. Lee, J. H. Park, and K. Ha, "Patients' Perceptions of a Health Information Exchange: A Pilot Program in South Korea," International Journal of Medical Informatics, Vol. 82, No. 2, pp. 98-107, 2013.
DOI
|
7 |
K-H. Choi, K-Y. Chung, and D-K. Shin, "A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information," Journal of Digital Convergence, Vol. 11, No. 3, pp. 273-277, 2013.
DOI
|
8 |
K. Choe, "Grounded Theory Methodology: Strauss' Version vs Glaserian Version," Journal of Korean Academy of Psychiatric Mental Health Nursing, Vol. 14, No. 1, pp. 82-90, 2005.
|
9 |
Y-Y. Kim and S-S. Shin, "A Study on Reliable Electronic Medical Record Systems," Journal of Digital Convergence, Vol. 10, No. 2, pp. 193-200, 2012.
DOI
|
10 |
H. S. Jang, J. T. Lee, J. S. Yoo, S. J. Ahn, and I. K. Kim, "Smart Medical Technology Standards-based Electronic Health Record," Communications of the Korean Institute of Information Scientists and Engineers, Vol. 33, No. 3, pp. 10-20, 2015.
|
11 |
D. Lee and Y. Kim, "An Inquiry on the Philosophical Backgrounds and Methodological Characteristics of Grounded Theory as Qualitative Research Method," The Journal of Yeolin Education, Vol. 20, No. 2, pp. 1-26, 2012.
|
12 |
A. L. Strauss and J. M. Corbin, "Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory," 2nd ed., SAGE Publications, 1998.
|
13 |
H. S. Lee, "Court Ruling in favor of Korean Pharmaceutical Information Center," Available: http://www.docdocdoc.co.kr/news/articleView.html?idxno=1046476.
|
14 |
B. G. Glaser, "Basics of Grounded Theory Analysis: Emergence vs. Forcing," Sociology Press, 1992.
|
15 |
A. L. Strauss and J. M. Corbin, "Basics of Qualitative Research: Grounded Theory Procedures and Techniques," Newbury Park, CA: Sage Publications, 1990.
|
16 |
S. S. Kim, "Theory: Grounded Theory," Journal of Nursing Query, Vol. 12, No. 1, pp. 69-81, 2003.
|
17 |
H. J. Lee, "A Study of Legislation on the Personal Medical Information Protection Law," Journal of Constitutional Law, Vol. 3, No. 2, pp. 95-123, 2016.
|
18 |
Y. Song and K. Park, "Security/Privacy Requirements for Medical Data Services," Review of KIISC, Vol. 20, No. 3, pp. 90-96, 2010.
|
19 |
R. Parks, C.-H. Chu, and H. Xu, "Healthcare Information Privacy Research: Issues, Gaps and What Next?" Paper presented at the AMCIS 2011 Proceedings, 2011.
|
20 |
E. Park, "EMR.EHR Information Exchange Scores 0,"Available: http://medipana.com/news/news_viewer.asp?NewsNum=172574&MainKind=A&NewsKind=5&vCount=12&vKind=1.
|
21 |
M. H. Kim, "Status of Korea's Healthcare Information Technology," KIRI Monthly Vol. 10, 2017.
|
22 |
C. M. Angst and R. Agarwal, "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion," MIS Quarterly, Vol. 33, No. 2, pp. 339-370, 2009.
DOI
|
23 |
M. J. Culnan, and P. K. Armstrong, "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, Vol. 10, No. 1, pp. 104-115, 1999.
DOI
|
24 |
C-W. Park and J-W. Kim, "An Empirical Research on Information Privacy Concern in the IoT Era," Journal of Digital Convergence, Vol. 14, No. 2, pp. 65-72, 2016.
DOI
|
25 |
H. J. Smith, S. J. Milberg, and S. J. Burke, "Information Privacy: Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly, Vol. 20, No. 2, pp. 167-196, 1996.
DOI
|
26 |
K. A. Stewart and A. H. Segars, "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research, Vol. 13, No. 1, pp. 36-49, 2002.
DOI
|
27 |
N. K. Malhotra, S. S. Kim, and J. Agarwal, "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004.
DOI
|
28 |
T. Zhou, "Examining Location-based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk," Journal of Electronic Commerce Research, Vol. 13, No. 2, pp. 135-144, 2005.
|
29 |
M-H. Shin, "Influences Information Privacy Concerns and Personal Innovation of Smartphone-based Shopping Mall on Usefulness, Ease-of-Use and Satisfaction," Journal of Digital Convergence, Vol. 12, No. 8, pp. 197-209, 2014.
DOI
|
30 |
K. Ishikawa, "Health Data Use and Protection Policy; Based on Differences by Cultural and Social Environment," International Journal of Medical Informatics, Vol. 60, No. 2, pp. 119-125, 2000.
DOI
|
31 |
National Research Council(NRC), "For the Record: Protecting Electronic Health Information," Washington DC: National Academy Press, 1997.
|