{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T17:20:01Z","timestamp":1776705601669,"version":"3.51.2"},"reference-count":86,"publisher":"Association for Information Systems","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Technology for Development"],"published-print":{"date-parts":[[2021,4,3]]},"DOI":"10.1080\/02681102.2020.1806018","type":"journal-article","created":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T02:58:07Z","timestamp":1597805887000},"page":"208-234","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":17,"title":["Factors influencing individuals\u2019 personal health information privacy concerns. A study in Ghana"],"prefix":"10.17705","volume":"27","author":[{"given":"Ernest K.","family":"Adu","sequence":"first","affiliation":[{"name":"Department of Accounting and Information Systems, UC School of Business, University of Canterbury, Christchurch, New Zealand"}]},{"given":"Annette","family":"Mills","sequence":"additional","affiliation":[{"name":"Department of Accounting and Information Systems, UC School of Business, University of Canterbury, Christchurch, New Zealand"}]},{"given":"Nelly","family":"Todorova","sequence":"additional","affiliation":[{"name":"Department of Accounting and Information Systems, UC School of Business, University of Canterbury, Christchurch, New Zealand"}]}],"member":"7521","published-online":{"date-parts":[[2020,8,18]]},"reference":[{"key":"CIT0001","unstructured":"Acquah-Swanzy, M. (2015). Evaluating electronic health record systems in Ghana: The case of Effia Nkwanta Regional Hospital (MSc. The Artic University of Norway, Norway)."},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"CIT0004","unstructured":"Adu, E., Mills, A. & Todorova, N. (2018). Drivers of personal health information privacy concerns among individuals in developing countries: A conceptual model. GlobDev 2018. 12. https:\/\/aisel.aisnet.org\/globdev2018\/12"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0335"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.2307\/20650295"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.022"},{"key":"CIT0010","unstructured":"Bedeley, R. & Palvia, P. (2014).\n                      A study of the issues of E-health care in developing countries: The case of Ghana\n                      . AMCIS 2014 Proceedings. https:\/\/aisel.aisnet.org\/amcis2014\/HealthIS\/GeneralPresentations\/5\/"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"issue":"1","key":"CIT0013","first-page":"73","volume":"11","author":"Chen J.","year":"2001","journal-title":"Marketing Management Journal"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.04.004"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23294-2_2"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102056"},{"key":"CIT0021","unstructured":"Ermakova, T., Fabian, B. & Zarnekow, R. (2014).\n                      Acceptance of health clouds-a privacy calculus perspective\n                      . ECIS 2014 Proceedings. https:\/\/aisel.aisnet.org\/ecis2014\/proceedings\/track09\/11\/"},{"key":"CIT0022","unstructured":"Ernest and Young. (2018). Is cyber security about more than protection? EY global information security survey 2018-19. https:\/\/www.ey.com\/en_gl\/advisory\/global-information-security-survey-2018-2019"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2018.1471336"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0382"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1176\/appi.ps.54.11.1539"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2009.424"},{"key":"CIT0028","unstructured":"Gyamfi, A. (2016). Use of electronic medical records in emergency care at Komfo Anokye Teaching Hospital in Kumasi, Ghana (BSc. Kwame Nkrumah University of Science and Technology, Ghana)."},{"key":"CIT0029","volume-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","author":"Hair J. F.","year":"2016"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"CIT0031","first-page":"1","author":"Hong W","year":"2019","journal-title":"Journal of Business Ethics"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.12"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9851-1"},{"key":"CIT0034","unstructured":"International Institute of Communication and Development (IICD). (2014). Toward e-health 2.0 in Ghana: A programme and opportunities for private and public ICT initiatives. The Netherlands."},{"key":"CIT0035","volume-title":"Measuring digital developments: ICT facts and figures 2019","author":"International Telecommunication Union","year":"2019"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1086\/376806"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/07370020903586662"},{"key":"CIT0038","unstructured":"Kenny, G. (2016). \u2018\n                      To protect my health, or to protect my health data?\u2019Examining the influence of health information privacy concerns on citizens\u2019 health technology adoption\n                      [Dotoral Dissertation, Dublin City University, Ireland]."},{"key":"CIT0039","unstructured":"Kenny, G. & Connolly, R. (2016).\n                      Drivers of health information privacy concern: A comparison study\n                      . AMCIS 2016 Proceedings. https:\/\/aisel.aisnet.org\/amcis2016\/Health\/Presentations\/3\/"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2012.01.005"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00302"},{"key":"CIT0042","volume-title":"Safety in the midst of stigma: Experiencing HIV\/AIDS in two Ghanaian communities","author":"Kwansa B. K.","year":"2013"},{"key":"CIT0043","unstructured":"Kyei-Boateng, J. (2018).\n                      Of the nudity spree, what storm is breaking in our digital world?\n                      https:\/\/www.modernghana.com\/news\/836482\/of-the-nudity-spree-what-storm-is-breaking-in-our-digital-w.html"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1177\/1460458211399403"},{"issue":"1","key":"CIT0045","first-page":"93","volume":"12","author":"Laric M. V.","year":"2009","journal-title":"Research in Healthcare Financial Management"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.2471\/BLT.11.099820"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.010"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.08.002"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02828"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23068"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.17"},{"key":"CIT0054","unstructured":"Moody\u2019s Analytics. (2019). Ghana - economic indicators. https:\/\/www.economy.com\/ghana"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-015-0202-2"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.2307\/25148783"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.11.005"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.2307\/25148814"},{"key":"CIT0059","unstructured":"Pew Research Center. (2015).\n                      Internet seen as positive influence on education but negative influence on morality in emerging and developing nations\n                      . USA."},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"CIT0061","unstructured":"Policy Engagement Network (PEN). (2010). Electronic health privacy and security in developing countries and humanitarian operations. Protecting medical information in eHealth projects. London School of Economics and Political Science, 1-28. London."},{"key":"CIT0062","unstructured":"Ponemon Institute. (2016). Sixth annual benchmark study on privacy and security of healthcaredata. Retrieved May 17, 2019, from https:\/\/www.ponemon.org\/local\/upload\/file\/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf"},{"key":"CIT0063","volume-title":"SmartPLS 3","author":"Ringle C. M.","year":"2015"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002579"},{"key":"CIT0066","volume-title":"Africa cyber security report 2016","author":"Serianu","year":"2016"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.2989\/16085906.2011.637730"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.022"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1108\/JCM-07-2014-1078"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1108\/07363760911001529"},{"key":"CIT0074","unstructured":"UNCTAD. (2018). Data privacy: New global survey reveals growing internet anxiety: http:\/\/unctad.org\/en\/pages\/newsdetails.aspx?OriginalVersionID=1719"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2670"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1177\/1460458212442933"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1038\/nm0310-249a"},{"key":"CIT0078","volume-title":"Global diffusion of eHealth: Making universal health coverage achievable. Report of the third global survey on eHealth","author":"World Health Organisation","year":"2016"},{"key":"CIT0079","unstructured":"Xu, H., Dinev, T., Smith, H. J. & Hart, P. (2008).\n                      Examining the formation of individual's privacy concerns: Toward an integrative view\n                      . ICIS 2008 proceedings. 6. https:\/\/aisel.aisnet.org\/icis2008\/6"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20530"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0252"},{"key":"CIT0083","unstructured":"Yun, H., Lee, G. & Kim, D. (2014).\n                      A meta-analytic review of empirical research on online information privacy concerns: Antecedents, outcomes, and moderators\n                      . ICIS 2014 Proceedings. https:\/\/aisel.aisnet.org\/icis2014\/proceedings\/ISSecurity\/20"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.10.001"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1300\/J179v01n02_01"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.11.003"}],"container-title":["Information Technology for Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/02681102.2020.1806018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T16:28:07Z","timestamp":1776702487000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/02681102.2020.1806018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,18]]},"references-count":86,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4,3]]}},"alternative-id":["10.1080\/02681102.2020.1806018"],"URL":"https:\/\/doi.org\/10.1080\/02681102.2020.1806018","relation":{},"ISSN":["0268-1102","1554-0170"],"issn-type":[{"value":"0268-1102","type":"print"},{"value":"1554-0170","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=titd20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=titd20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-08-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}