{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T22:54:52Z","timestamp":1754261692187,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST-104-2410-H-214-007"],"award-info":[{"award-number":["MOST-104-2410-H-214-007"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s12911-018-0722-7","type":"journal-article","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T07:23:08Z","timestamp":1545117788000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Continuance compliance of privacy policy of electronic medical records: the roles of both motivation and habit"],"prefix":"10.1186","volume":"18","author":[{"given":"Kuang Ming","family":"Kuo","sequence":"first","affiliation":[]},{"given":"Yu Chang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"Talley","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4619-5144","authenticated-orcid":false,"given":"Chi Hsien","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,18]]},"reference":[{"issue":"2","key":"722_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.12826\/18333575.2013.0011.Ma","volume":"43","author":"KM Kuo","year":"2014","unstructured":"Kuo KM, Ma CC, Alexander JW. How do patients respond to violation of their information privacy? Health Inf Manag J. 2014;43(2):23\u201333. \n                    https:\/\/doi.org\/10.12826\/18333575.2013.0011.Ma\n                    \n                  .","journal-title":"Health Inf Manag J"},{"issue":"3","key":"722_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1287\/isre.1100.0335","volume":"22","author":"CL Anderson","year":"2011","unstructured":"Anderson CL, Agarwal R. The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information. Inform Syst Res. 2011;22(3):469\u201390.","journal-title":"Inform Syst Res."},{"issue":"4","key":"722_CR3","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1197\/jamia.M3128","volume":"16","author":"L Zhou","year":"2009","unstructured":"Zhou L, Soran CS, Jenter CA, Volk LA, Orav EJ, Bates DW, et al. The relationship between electronic health record use and quality of care over time. J Am Med Inform Assn. 2009;16(4):457\u201364.","journal-title":"J Am Med Inform Assn"},{"key":"722_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/0046958017711759","volume":"54","author":"ML Sher","year":"2017","unstructured":"Sher ML, Talley PC, Yang CW, Kuo KM. Compliance with electronic medical records privacy policy: an empirical investigation of hospital information technology staff. Inquiry-J Health Car. 2017;54:1\u201312. \n                    https:\/\/doi.org\/10.1177\/0046958017711759\n                    \n                  .","journal-title":"Inquiry-J Health Car"},{"issue":"2","key":"722_CR5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1057\/ejis.2015.9","volume":"25","author":"M Foth","year":"2016","unstructured":"Foth M. Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence. Eur J Inf Syst. 2016;25(2):91\u2013109. \n                    https:\/\/doi.org\/10.1057\/ejis.2015.9\n                    \n                  .","journal-title":"Eur J Inf Syst"},{"key":"722_CR6","volume-title":"Department of Health & Human Services, editor","author":"U.S. Department of Health & Human Services","year":"2017","unstructured":"U.S. Department of Health & Human Services. Standards for privacy of individually identifiable health information. In: Department of Health & Human Services, editor. Washington, DC: U.S. Department of Health & Human Services; 2017."},{"issue":"6","key":"722_CR7","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1111\/j.1540-5915.2012.00383.x","volume":"43","author":"J D\u2019Arcy","year":"2012","unstructured":"D\u2019Arcy J, Devaraj S. Employee misuse of information technology resources: testing a contemporary deterrence model. Decision Sci. 2012;43(6):1091\u2013124.","journal-title":"Decision Sci"},{"key":"722_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1186\/s12911-016-0254-y","volume":"16","author":"CC Ma","year":"2016","unstructured":"Ma CC, Kuo KM, Alexander JW. A survey-based study of factors that motivate nurses to protect the privacy of electronic medical records. BMC Med Inform Decis Mak. 2016;16:13. \n                    https:\/\/doi.org\/10.1186\/s12911-016-0254-y\n                    \n                  .","journal-title":"BMC Med Inform Decis Mak"},{"issue":"2","key":"722_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.2753\/MIS0742-1222300202","volume":"30","author":"J Kwon","year":"2013","unstructured":"Kwon J, Johnson ME. Health-care security strategies for data protection and regulatory compliance. J Manage Inform Syst. 2013a;30(2):41\u201366.","journal-title":"J Manage Inform Syst"},{"key":"722_CR10","unstructured":"Congress of United States of America, editor. Health insurance portability and accountability act. In: Congress of United States of America, editor. Washington, DC: Congress of United States of America. p. 1996."},{"issue":"2","key":"722_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1177\/1833358316671264","volume":"46","author":"ML Sher","year":"2017","unstructured":"Sher ML, Talley PC, Cheng TJ, Kuo KM. How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments. Health Inf Manag J. 2017;46(2):87\u201395. \n                    https:\/\/doi.org\/10.1177\/1833358316671264\n                    \n                  .","journal-title":"Health Inf Manag J"},{"issue":"2","key":"722_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s40299-012-0011-7","volume":"22","author":"CC Chang","year":"2013","unstructured":"Chang CC, Liang C, Yan CF, Tseng JS. The impact of college students\u2019 intrinsic and extrinsic motivation on continuance intention to use english mobile learning systems. Asian-Pac Educ Research. 2013;22(2):181\u201392. \n                    https:\/\/doi.org\/10.1007\/s40299-012-0011-7\n                    \n                  .","journal-title":"Asian-Pac Educ Research"},{"issue":"3","key":"722_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1257\/pol.20150083","volume":"8","author":"N Dwenger","year":"2016","unstructured":"Dwenger N, Kleven H, Rasul I, Rincke J. Extrinsic and intrinsic motivations for tax compliance: evidence from a field experiment in Germany. Am Econ J Econ Polic. 2016;8(3):203\u201332.","journal-title":"Am Econ J Econ Polic"},{"key":"722_CR14","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.3389\/fpsyg.2015.01067","volume":"6","author":"H Henshaw","year":"2015","unstructured":"Henshaw H, McCormack A, Ferguson MA. Intrinsic and extrinsic motivation is associated with computer-based auditory training uptake, engagement, and adherence for people with hearing loss. Front Psychol. 2015;6:1067. \n                    https:\/\/doi.org\/10.3389\/fpsyg.2015.01067\n                    \n                  .","journal-title":"Front Psychol"},{"issue":"1","key":"722_CR15","first-page":"65","volume":"4","author":"M Limayem","year":"2003","unstructured":"Limayem M, Hirt SG. Force of habit and information systems usage: theory and initial validation. J Assoc Inf Syst. 2003;4(1):65\u201397.","journal-title":"J Assoc Inf Syst"},{"issue":"1","key":"722_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1006\/ceps.1999.1020","volume":"25","author":"RM Ryan","year":"2000","unstructured":"Ryan RM, Deci EL. Intrinsic and extrinsic motivations: classic definitions and new directions. Contemp Educ Psychol. 2000;25(1):54\u201367. \n                    https:\/\/doi.org\/10.1006\/ceps.1999.1020\n                    \n                  .","journal-title":"Contemp Educ Psychol"},{"issue":"5","key":"722_CR17","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/s10865-012-9442-0","volume":"36","author":"B Gardner","year":"2013","unstructured":"Gardner B, Lally P. Does intrinsic motivation strengthen physical activity habit? Modeling relationships between self-determination, past behaviour, and habit strength. J Behav Med. 2013;36(5):488\u201397. \n                    https:\/\/doi.org\/10.1007\/s10865-012-9442-0\n                    \n                  .","journal-title":"J Behav Med"},{"key":"722_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2271-7","volume-title":"Intrinsic motivation and self-determination in human behavior. Perspectives in social psychology","author":"EE Deci","year":"1985","unstructured":"Deci EE, Ryan RM. Intrinsic motivation and self-determination in human behavior. Perspectives in social psychology. New York: Plenum Press; 1985."},{"issue":"1","key":"722_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/14792779943000035","volume":"10","author":"B Verplanken","year":"1999","unstructured":"Verplanken B, Aarts H. Habit, attitude, and planned behaviour: is habit an empty construct or an interesting case of goal-directed automaticity? Eur Rev Soc Psychol. 1999;10(1):101\u201334. \n                    https:\/\/doi.org\/10.1080\/14792779943000035\n                    \n                  .","journal-title":"Eur Rev Soc Psychol"},{"issue":"3","key":"722_CR20","first-page":"Article 1","volume":"14","author":"J Wu","year":"2013","unstructured":"Wu J, Lu X. Effects of extrinsic and intrinsic motivators on using utilitarian, hedonic, and dual-purposed information systems: a meta-analysis. J Assoc Inf Syst. 2013;14(3):Article 1.","journal-title":"J Assoc Inf Syst"},{"issue":"1","key":"722_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/obhd.1999.2837","volume":"79","author":"V Venkatesh","year":"1999","unstructured":"Venkatesh V, Speier C. Computer technology training in the workplace: a longitudinal investigation of the effect of mood. Organ Behav Hum Dec. 1999;79(1):1\u201328. \n                    https:\/\/doi.org\/10.1006\/obhd.1999.2837\n                    \n                  .","journal-title":"Organ Behav Hum Dec"},{"issue":"3","key":"722_CR22","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1093\/her\/12.3.363","volume":"12","author":"H Aarts","year":"1997","unstructured":"Aarts H, Paulussen T, Schaalma H. Physical exercise habit: on the conceptualization and formation of habitual health behaviours. Health Educ Res. 1997;12(3):363\u201374. \n                    https:\/\/doi.org\/10.1093\/her\/12.3.363\n                    \n                  .","journal-title":"Health Educ Res"},{"issue":"4","key":"722_CR23","doi-asserted-by":"publisher","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"M Limayem","year":"2007","unstructured":"Limayem M, Hirt SG, Cheung CMK. How habit limits the predictive power of intention the case of information systems continuance. Mis Quart. 2007;31(4):705\u201337.","journal-title":"Mis Quart."},{"issue":"1","key":"722_CR24","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1037\/0033-2909.124.1.54","volume":"124","author":"JA Ouellette","year":"1998","unstructured":"Ouellette JA, Wood W. Habit and intention in everyday life: the multiple processes by which past behavior predicts future behavior. Psychol Bull. 1998;124(1):54\u201374.","journal-title":"Psychol Bull"},{"issue":"1","key":"722_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1037\/0022-3514.78.1.53","volume":"78","author":"H Aarts","year":"2000","unstructured":"Aarts H, Dijksterhuis A. Habits as knowledge structures: automaticity in goal-directed behavior. J Pers Soc Psychol. 2000;78(1):53\u201363.","journal-title":"J Pers Soc Psychol"},{"issue":"4","key":"722_CR26","doi-asserted-by":"publisher","first-page":"767","DOI":"10.2307\/25750704","volume":"34","author":"P Puhakainen","year":"2010","unstructured":"Puhakainen P, Siponen M. Improving employees\u2019 compliance through information systems security training: an action research study. Mis Quart. 2010;34(4):767\u201378.","journal-title":"Mis Quart."},{"issue":"4","key":"722_CR27","doi-asserted-by":"publisher","first-page":"303","DOI":"10.2307\/2786758","volume":"51","author":"HW Charng","year":"1988","unstructured":"Charng HW, Piliavin JA, Callero PL. Role identity and reasoned action in the prediction of repeated behavior. Soc Psychol Quart. 1988;51(4):303\u201317.","journal-title":"Soc Psychol Quart"},{"issue":"4","key":"722_CR28","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1057\/ejis.2014.19","volume":"24","author":"O Turel","year":"2015","unstructured":"Turel O. Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of facebook users. Eur J Inform Syst. 2015;24(4):431\u201346. \n                    https:\/\/doi.org\/10.1057\/ejis.2014.19\n                    \n                  .","journal-title":"Eur J Inform Syst"},{"issue":"3","key":"722_CR29","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1177\/1094670512473200","volume":"16","author":"C Wang","year":"2013","unstructured":"Wang C, Harris J, Patterson P. The roles of habit, self-efficacy, and satisfaction in driving continued use of self-service technologies. J Serv Res-US. 2013;16(3):400\u201314. \n                    https:\/\/doi.org\/10.1177\/1094670512473200\n                    \n                  .","journal-title":"J Serv Res-US"},{"issue":"5","key":"722_CR30","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1002\/(SICI)1099-0992(199709\/10)27:5<539::AID-EJSP831>3.0.CO;2-A","volume":"27","author":"B Verplanken","year":"1997","unstructured":"Verplanken B, Aarts H, Van Knippenberg A. Habit, information acquisition, and the process of making travel mode choices. Eur J Soc Psychol. 1997;27(5):539\u201360.","journal-title":"Eur J Soc Psychol"},{"issue":"3","key":"722_CR31","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1348\/014466605X49122","volume":"45","author":"B Verplanken","year":"2006","unstructured":"Verplanken B. Beyond frequency: habit as mental construct. Brit J Soc Psychiat. 2006;45(3):639\u201356. \n                    https:\/\/doi.org\/10.1348\/014466605X49122\n                    \n                  .","journal-title":"Brit J Soc Psychiat"},{"issue":"4","key":"722_CR32","doi-asserted-by":"publisher","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","volume":"39","author":"SR Boss","year":"2015","unstructured":"Boss SR, Galletta DF, Benjamin Lowry P, Moody GD, Polak P. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. Mis Quart. 2015;39(4):837\u201364.","journal-title":"Mis Quart"},{"issue":"2","key":"722_CR33","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","volume":"51","author":"M Siponen","year":"2014","unstructured":"Siponen M, Adam Mahmood M, Pahnila S. Employees\u2019 adherence to information security policies: an exploratory field study. Inform Manage. 2014;51(2):217\u201324.","journal-title":"Inform Manage."},{"issue":"3\u20134","key":"722_CR34","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance A, Siponen M, Pahnila S. Motivating is security compliance: insights from habit and protection motivation theory. Inform Manage. 2012;49(3\u20134):190\u20138.","journal-title":"Inform Manage."},{"key":"722_CR35","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dss.2016.09.013","volume":"92","author":"M Warkentin","year":"2016","unstructured":"Warkentin M, Johnston AC, Shropshire J, Barnett WD. Continuance of protective security behavior: a longitudinal study. Decis Supp Syst. 2016;92:25\u201335. \n                    https:\/\/doi.org\/10.1016\/j.dss.2016.09.013\n                    \n                  .","journal-title":"Decis Supp Syst."},{"issue":"3","key":"722_CR36","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD. Perceived usefulness, perceived ease of use, and user acceptance of information technology. Mis Quart. 1989;13(3):319\u201340.","journal-title":"Mis Quart."},{"issue":"2","key":"722_CR37","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath T, Rao HR. Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis Supp Syst. 2009;47(2):154\u201365.","journal-title":"Decis Supp Syst."},{"issue":"4","key":"722_CR38","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1108\/09685220910993980","volume":"17","author":"J Zhang","year":"2009","unstructured":"Zhang J, Reithel BJ, Li H. Impact of perceived technical protection on security behaviors. Inform Manage Comput Secur. 2009;17(4):330\u201340.","journal-title":"Inform Manage Comput Secur"},{"issue":"8","key":"722_CR39","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.im.2011.08.004","volume":"48","author":"SJ Barnes","year":"2011","unstructured":"Barnes SJ. Understanding use continuance in virtual worlds: empirical test of a research model. Inform Manage. 2011;48(8):313\u20139. \n                    https:\/\/doi.org\/10.1016\/j.im.2011.08.004\n                    \n                  .","journal-title":"Inform Manage."},{"issue":"2","key":"722_CR40","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.tele.2015.08.014","volume":"33","author":"CH Hsiao","year":"2016","unstructured":"Hsiao CH, Chang JJ, Tang KY. Exploring the influential factors in continuance usage of mobile social apps: satisfaction, habit, and customer value perspectives. Telemat Inform. 2016;33(2):342\u201355. \n                    https:\/\/doi.org\/10.1016\/j.tele.2015.08.014\n                    \n                  .","journal-title":"Telemat Inform"},{"key":"722_CR41","unstructured":"Triandis HC, editor. Values, attitudes, and interpersonal behavior Nebraska Symposium on Motivation; 1980; Lincoln, NE: University Nebraska Press."},{"issue":"4","key":"722_CR42","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1057\/ejis.2013.36","volume":"24","author":"A Bhattacherjee","year":"2015","unstructured":"Bhattacherjee A, Lin CP. A unified model of it continuance: three complementary perspectives and crossover effects. Eur J Inf Syst. 2015;24(4):364\u201373. \n                    https:\/\/doi.org\/10.1057\/ejis.2013.36\n                    \n                  .","journal-title":"Eur J Inf Syst"},{"issue":"4","key":"722_CR43","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1016\/j.dss.2012.05.021","volume":"53","author":"CM Chiu","year":"2012","unstructured":"Chiu CM, Hsu MH, Lai H, Chang CM. Re-examining the influence of trust on online repeat purchase intention: the moderating role of habit and its antecedents. Decis Supp Syst. 2012;53(4):835\u201345. \n                    https:\/\/doi.org\/10.1016\/j.dss.2012.05.021\n                    \n                  .","journal-title":"Decis Supp Syst"},{"issue":"8","key":"722_CR44","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1016\/j.im.2003.10.007","volume":"42","author":"MKO Lee","year":"2005","unstructured":"Lee MKO, Cheung CMK, Chen ZH. Acceptance of internet-based learning medium: the role of extrinsic and intrinsic motivation. Inform Manage. 2005;42(8):1095\u2013104.","journal-title":"Inform Manage."},{"key":"722_CR45","unstructured":"Joint Commission of Taiwan. List of qualified accreditation hospitals and teaching hospitals by the ministry of health and welfare from 2011 to 2015. 2016. \n                    https:\/\/www.jct.org.tw\n                    \n                  . Accessed 7 May 2016."},{"key":"722_CR46","unstructured":"Ministry of Health and Welfare. Bulletin of emrs adoption. 2017. \n                    https:\/\/emr.mohw.gov.tw\/emrlist.aspx\n                    \n                  . Accessed 7 May 2017."},{"issue":"1","key":"722_CR47","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1177\/002224377901600110","volume":"16","author":"GA Churchill Jr","year":"1979","unstructured":"Churchill GA Jr. A paradigm for developing better measures of marketing constructs. J Marketing Res. 1979;16(1):64\u201373.","journal-title":"J Marketing Res"},{"issue":"1","key":"722_CR48","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larcker DF. Evaluating structural equation models with unobservable variables and measurement error. J Marketing Res. 1981;18(1):39\u201350.","journal-title":"J Marketing Res."},{"key":"722_CR49","volume-title":"A primer on partial least squares structural equation modeling (pls-sem)","author":"JF Hair","year":"2014","unstructured":"Hair JF, Hult GTM, Ringle CM, Sarstedt M. A primer on partial least squares structural equation modeling (pls-sem). Thousand Oaks: Sage; 2014."},{"issue":"3","key":"722_CR50","doi-asserted-by":"publisher","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"A Bhattacherjee","year":"2001","unstructured":"Bhattacherjee A. Understanding information systems continuance: an expectation-confirmation model. Mis Quart. 2001;25(3):351\u201370.","journal-title":"Mis Quart."},{"issue":"2","key":"722_CR51","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor S, Todd PA. Understanding information technology usage - a test of competing models. Inform Syst Res. 1995;6(2):144\u201376.","journal-title":"Inform Syst Res"},{"issue":"4","key":"722_CR52","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.im.2008.02.005","volume":"45","author":"M Limayem","year":"2008","unstructured":"Limayem M, Cheung CMK. Understanding information systems continuance: the case of internet-based learning technologies. Inform Manage. 2008;45(4):227\u201332.","journal-title":"Inform Manage"},{"key":"722_CR53","volume-title":"R: a language and environment for statistical computing","author":"R Core Team","year":"2018","unstructured":"R Core Team. R: a language and environment for statistical computing. Vienna: R Foundation for Statistical Computing; 2018. \n                    https:\/\/www.R-project.org\/"},{"key":"722_CR54","doi-asserted-by":"crossref","unstructured":"Monecke A, Leisch F. Sempls: structural equation modeling using partial least squares. J Stat Softw. 2012;48(3).","DOI":"10.18637\/jss.v048.i03"},{"key":"722_CR55","volume-title":"Pls path modeling with r","author":"G Sanchez","year":"2013","unstructured":"Sanchez G. Pls path modeling with r. Berkeley: Trowchez ed; 2013."},{"issue":"3","key":"722_CR56","doi-asserted-by":"publisher","first-page":"692","DOI":"10.3758\/s13428-011-0076-x.","volume":"43","author":"D Tofighi","year":"2011","unstructured":"Tofighi D, Rmediation MKDP. An r package for mediation analysis confidence intervals. Behav Res Methods. 2011;43(3):692\u2013700. \n                    https:\/\/doi.org\/10.3758\/s13428-011-0076-x.","journal-title":"Behav Res Methods"},{"key":"722_CR57","volume-title":"Methodology in the social sciences","author":"RB Kline","year":"2005","unstructured":"Kline RB. Principles and practice of structural equation modeling. In: Methodology in the social sciences. 2nd ed. New York: The Guilford Press; 2005.","edition":"2"},{"issue":"12","key":"722_CR58","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/s10916-017-0833-1","volume":"41","author":"KM Kuo","year":"2017","unstructured":"Kuo KM, Talley PC, Hung MC, Chen YL. A deterrence approach to regulate nurses\u2019 compliance with electronic medical records privacy policy. J Med Syst. 2017;41(12):198. \n                    https:\/\/doi.org\/10.1007\/s10916-017-0833-1\n                    \n                  .","journal-title":"J Med Syst"},{"key":"722_CR59","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.dss.2015.06.003","volume":"77","author":"A Ayanso","year":"2015","unstructured":"Ayanso A, Herath TC, O'Brien N. Understanding continuance intentions of physicians with electronic medical records (emr): an expectancy-confirmation perspective. Decis Supp Syst. 2015;77:112\u201322. \n                    https:\/\/doi.org\/10.1016\/j.dss.2015.06.003\n                    \n                  .","journal-title":"Decis Supp Syst."},{"issue":"21","key":"722_CR60","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1001\/jama.2015.15015","volume":"314","author":"TJ Judson","year":"2015","unstructured":"Judson TJ, Volpp KG, Detsky AS. Harnessing the right combination of extrinsic and intrinsic motivation to change physician behavior. JAMA. 2015;314(21):2233\u20134.","journal-title":"JAMA"},{"issue":"4","key":"722_CR61","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1177\/002224378001700405","volume":"17","author":"RL Oliver","year":"1980","unstructured":"Oliver RL. A cognitive model of the antecedents and consequences of satisfaction decisions. J Marketing Res. 1980;17(4):460\u20139.","journal-title":"J Marketing Res."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-018-0722-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s12911-018-0722-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-018-0722-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T19:13:11Z","timestamp":1576609991000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-018-0722-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["722"],"URL":"https:\/\/doi.org\/10.1186\/s12911-018-0722-7","relation":{},"ISSN":["1472-6947"],"issn-type":[{"type":"electronic","value":"1472-6947"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"3 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The study was conducted with an approval by the Institutional Review Board (IRB) of Chi-Mei Medical Center, Taiwan. The IRB waived the mandate for obtaining a written informed consent from subjects. Participants were provided with an information sheet which detailed relevant information about the study, potential benefits and risks of participation in this study, the opportunity and means to ask questions, and also the options regarding voluntary agreement to participate in this study. Verbal consent was then requested prior to commencement of the survey. This study was provided as an anonymous survey of adults over the age of 20 for which no personal, identifiable information was collected.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The manuscript does not contain any individual\u2019s data in any form.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"135"}}