{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:15:25Z","timestamp":1762506925743},"reference-count":73,"publisher":"Georg Thieme Verlag KG","issue":"04","funder":[{"name":"German Federal Ministry of Economic Affairs and Energy","award":["01MD11062"],"award-info":[{"award-number":["01MD11062"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Clin Inform"],"published-print":{"date-parts":[[2016,10]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Background Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns.<\/jats:p><jats:p>ObjectivesThis study examines the effect of confidentiality assurance in a cloud-computing environment on individuals\u2019 willingness to accept the infrastructure for inter-organizational sharing of medical data.<\/jats:p><jats:p>MethodsWe empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it.<\/jats:p><jats:p>ResultsOur results indicate the importance of confidentiality assurance in individuals\u2019 acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals\u2019 acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.<\/jats:p><jats:p>Citation: Ermakova T, Fabian B, Zarnekow R. Improving individual acceptance of health clouds through confidentiality assurance.<\/jats:p>","DOI":"10.4338\/aci-2016-07-ra-0107","type":"journal-article","created":{"date-parts":[[2016,10,26]],"date-time":"2016-10-26T06:15:35Z","timestamp":1477462535000},"page":"983-993","source":"Crossref","is-referenced-by-count":7,"title":["Improving Individual Acceptance of Health Clouds through Confidentiality Assurance"],"prefix":"10.4338","volume":"07","author":[{"given":"Benjamin","family":"Fabian","sequence":"first","affiliation":[]},{"given":"R\u00fcdiger","family":"Zarnekow","sequence":"first","affiliation":[]},{"given":"Tatiana","family":"Ermakova","sequence":"additional","affiliation":[]}],"member":"194","published-online":{"date-parts":[[2017,12,18]]},"reference":[{"key":"10.4338\/ACI-2016-07-RA-0107-1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"10.4338\/ACI-2016-07-RA-0107-2","doi-asserted-by":"crossref","unstructured":"Acquisti A, Gross R. Imagined Communities: Awareness Information Sharing and Privacy on the Facebook. Proceedings of the 6th International Conference Privacy Enhancing Technologies; 2006","DOI":"10.1007\/11957454_3"},{"issue":"2","key":"10.4338\/ACI-2016-07-RA-0107-3","first-page":"12","volume":"1","author":"Ahuja","year":"2012","journal-title":"Network and Communication Technologies"},{"key":"10.4338\/ACI-2016-07-RA-0107-4","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001062"},{"key":"10.4338\/ACI-2016-07-RA-0107-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2012.02.027"},{"key":"10.4338\/ACI-2016-07-RA-0107-6","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0335"},{"key":"10.4338\/ACI-2016-07-RA-0107-7","doi-asserted-by":"crossref","unstructured":"Angst C, Agarwal R, Downing J. An Empirical Examination of the Importance of Defining PHR for Research and for Practice. Robert H. Smith School Research Paper No. RHS-06-011; 2006","DOI":"10.2139\/ssrn.904611"},{"key":"10.4338\/ACI-2016-07-RA-0107-8","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2010.035624"},{"key":"10.4338\/ACI-2016-07-RA-0107-9","unstructured":"Bansal G, Zahedi F, Gefen D. The Impact of Personal Dispositions on Privacy and Trust in Disclosing Health Information Online. Proceedings of the 13th Americas Conference on Information Systems (AMCIS); 2007"},{"key":"10.4338\/ACI-2016-07-RA-0107-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"10.4338\/ACI-2016-07-RA-0107-11","unstructured":"Bansal G, Davenport R. Moderating Role of Perceived Health Status on Privacy Concern Factors and Intentions to Transact with High versus Low Trustworthy Health Websites. Proceedings of the 5th MWAIS (Midwest Association for Information) Conference; 2010"},{"key":"10.4338\/ACI-2016-07-RA-0107-12","doi-asserted-by":"publisher","DOI":"10.1097\/TA.0000000000000866"},{"key":"10.4338\/ACI-2016-07-RA-0107-13","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"10.4338\/ACI-2016-07-RA-0107-14","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-319-23294-2_2","volume":"19","author":"Dinev","year":"2012","journal-title":"Annals of Information Systems"},{"key":"10.4338\/ACI-2016-07-RA-0107-15","unstructured":"Dijk A, Busman JP, Van der Putten N, Dassen W. Transmural Exchange of Cardiology Related Information between two Academic Centers and Referring Hospitals Using XDS(-I). Proceedings of the IEEE Conference Computing in Cardiology; 2010"},{"key":"10.4338\/ACI-2016-07-RA-0107-16","doi-asserted-by":"crossref","unstructured":"Ermakova T, Fabian B. Secret Sharing for Health Data in Multi-Provider Clouds. Proceedings of the 15th IEEE Conference on Business Informatics (CBI); 2013","DOI":"10.1109\/CBI.2013.22"},{"key":"10.4338\/ACI-2016-07-RA-0107-17","unstructured":"Ermakova T, Fabian B, Zarnekow R. Acceptance of Health Clouds - a Privacy Calculus Perspective. Proceedings of the 22nd European Conference on Information Systems (ECIS); 2014"},{"key":"10.4338\/ACI-2016-07-RA-0107-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.05.004"},{"key":"10.4338\/ACI-2016-07-RA-0107-19","doi-asserted-by":"publisher","DOI":"10.1001\/jama.1997.03550120089044"},{"key":"10.4338\/ACI-2016-07-RA-0107-20","first-page":"1077","volume":"192","author":"Fujita","year":"2013","journal-title":"Studies in Health Technology and Informatics"},{"key":"10.4338\/ACI-2016-07-RA-0107-21","doi-asserted-by":"crossref","unstructured":"Griebel L, Prokosch HU, K\u00f6pcke F, Toddenroth D, Christoph J, Leb I, Engel I, Sedlmayr M. A Scoping Review of Cloud Computing in Healthcare. BMC Medical Informatics and Decision Making 2015; 15(1)","DOI":"10.1186\/s12911-015-0145-7"},{"key":"10.4338\/ACI-2016-07-RA-0107-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.01.005"},{"key":"10.4338\/ACI-2016-07-RA-0107-23","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph10116131"},{"key":"10.4338\/ACI-2016-07-RA-0107-24","doi-asserted-by":"crossref","unstructured":"Ion I, Sachdeva N, Kumaraguru P, Capkun S. Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage. Proceedings of the 7th Symposium on Usable Privacy and Security; 2011","DOI":"10.1145\/2078827.2078845"},{"key":"10.4338\/ACI-2016-07-RA-0107-25","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9875-6"},{"key":"10.4338\/ACI-2016-07-RA-0107-26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0139252"},{"key":"10.4338\/ACI-2016-07-RA-0107-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2012.01.005"},{"key":"10.4338\/ACI-2016-07-RA-0107-28","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1867"},{"key":"10.4338\/ACI-2016-07-RA-0107-29","doi-asserted-by":"publisher","DOI":"10.1177\/183335831404300204"},{"key":"10.4338\/ACI-2016-07-RA-0107-30","doi-asserted-by":"publisher","DOI":"10.1177\/1460458211399403"},{"issue":"1","key":"10.4338\/ACI-2016-07-RA-0107-31","first-page":"93","volume":"12","author":"Laric","year":"2009","journal-title":"Research in Healthcare Financial Management"},{"key":"10.4338\/ACI-2016-07-RA-0107-32","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0128-8"},{"key":"10.4338\/ACI-2016-07-RA-0107-33","unstructured":"Laudon KC, Laudon JP, Schoder D. Wirtschaftsinformatik - Eine Einf\u00fchrung, 2. aktualisierte Auflage. Pearson Studium; 2010"},{"key":"10.4338\/ACI-2016-07-RA-0107-34","doi-asserted-by":"crossref","unstructured":"Li Y, Baron J. Behavioral Research Data Analysis with R. New York: Springer; 2012","DOI":"10.1007\/978-1-4614-1238-0"},{"key":"10.4338\/ACI-2016-07-RA-0107-35","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-12-S12-S7"},{"key":"10.4338\/ACI-2016-07-RA-0107-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.04.001"},{"key":"10.4338\/ACI-2016-07-RA-0107-37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfma.2014.02.009"},{"key":"10.4338\/ACI-2016-07-RA-0107-38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2013.10.005"},{"key":"10.4338\/ACI-2016-07-RA-0107-39","unstructured":"Lowry R. Concepts, Applications of Inferential Statistics; 2013. Available from http:\/\/vassarstatsnet\/textbook\/indexhtml"},{"key":"10.4338\/ACI-2016-07-RA-0107-40","unstructured":"Manyika J, Chui M, Bughin J, Dobbs R, Bisson P, Marrs A. Disruptive Technologies: Advances That Will Transform Life Business and the Global Economy; 2013. Available from http:\/\/wwwmckinseycom\/insights\/business_technology\/disruptive_technologies"},{"key":"10.4338\/ACI-2016-07-RA-0107-41","doi-asserted-by":"publisher","DOI":"10.1002\/j.1556-6676.1985.tb01096.x"},{"key":"10.4338\/ACI-2016-07-RA-0107-42","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.28.2.416"},{"key":"10.4338\/ACI-2016-07-RA-0107-43","doi-asserted-by":"publisher","DOI":"10.3414\/ME14-01-0052"},{"key":"10.4338\/ACI-2016-07-RA-0107-44","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T. The NIST Definition of Cloud Computing; 2012. Available from http:\/\/csrcnistgov\/publications\/nistpubs\/800-145\/SP800-145pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"10.4338\/ACI-2016-07-RA-0107-45","doi-asserted-by":"crossref","unstructured":"Nass SJ, Levit LA, Gostin LO. Beyond the HIPAA Privacy Rule: Enhancing Privacy. Improving Health Through Research, Washington: National Academies Press; 2009","DOI":"10.17226\/12458"},{"key":"10.4338\/ACI-2016-07-RA-0107-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.11.005"},{"key":"10.4338\/ACI-2016-07-RA-0107-47","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2011.02.014"},{"key":"10.4338\/ACI-2016-07-RA-0107-48","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"10.4338\/ACI-2016-07-RA-0107-49","doi-asserted-by":"publisher","DOI":"10.1504\/IJEH.2013.057407"},{"key":"10.4338\/ACI-2016-07-RA-0107-50","unstructured":"R Development Core Team. R: A Language and Environment for Statistical Computing R Foundation for Statistical Computing, 2012. Available from http:\/\/wwwR-projectorg\/"},{"key":"10.4338\/ACI-2016-07-RA-0107-51","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"10.4338\/ACI-2016-07-RA-0107-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.01.008"},{"key":"10.4338\/ACI-2016-07-RA-0107-53","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2494"},{"key":"10.4338\/ACI-2016-07-RA-0107-54","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(02)00345-4"},{"key":"10.4338\/ACI-2016-07-RA-0107-55","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0509-2"},{"key":"10.4338\/ACI-2016-07-RA-0107-56","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"issue":"3","key":"10.4338\/ACI-2016-07-RA-0107-57","doi-asserted-by":"crossref","first-page":"473","DOI":"10.2307\/20650305","volume":"33","author":"Sharma","year":"2009","journal-title":"MIS Quarterly"},{"key":"10.4338\/ACI-2016-07-RA-0107-58","doi-asserted-by":"crossref","unstructured":"Sheskin DJ. Handbook of Parametric and Nonparametric Statistical Procedures (3rd ed). Chapman, Hall \/ CRC; 2004","DOI":"10.4324\/9780203489536"},{"key":"10.4338\/ACI-2016-07-RA-0107-59","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1164"},{"key":"10.4338\/ACI-2016-07-RA-0107-60","doi-asserted-by":"publisher","DOI":"10.1093\/ijpor\/4.3.256"},{"key":"10.4338\/ACI-2016-07-RA-0107-61","doi-asserted-by":"publisher","DOI":"10.1086\/269458"},{"key":"10.4338\/ACI-2016-07-RA-0107-62","doi-asserted-by":"publisher","DOI":"10.1378\/chest.11-0523"},{"key":"10.4338\/ACI-2016-07-RA-0107-63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.12.011"},{"key":"10.4338\/ACI-2016-07-RA-0107-64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.12.012"},{"key":"10.4338\/ACI-2016-07-RA-0107-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.pec.2010.07.013"},{"key":"10.4338\/ACI-2016-07-RA-0107-66","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthpol.2007.08.002"},{"key":"10.4338\/ACI-2016-07-RA-0107-67","doi-asserted-by":"publisher","DOI":"10.1001\/archpedi.154.9.885"},{"key":"10.4338\/ACI-2016-07-RA-0107-68","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0147253"},{"key":"10.4338\/ACI-2016-07-RA-0107-69","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0430-8"},{"key":"10.4338\/ACI-2016-07-RA-0107-70","doi-asserted-by":"publisher","DOI":"10.1108\/17506120910948485"},{"key":"10.4338\/ACI-2016-07-RA-0107-71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2005.08.009"},{"key":"10.4338\/ACI-2016-07-RA-0107-72","doi-asserted-by":"publisher","DOI":"10.1177\/1460458212442933"},{"key":"10.4338\/ACI-2016-07-RA-0107-73","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-155-12-201112200-00002"}],"container-title":["Applied Clinical Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.thieme-connect.de\/products\/ejournals\/pdf\/10.4338\/ACI-2016-07-RA-0107.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T10:59:50Z","timestamp":1657537190000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.thieme-connect.de\/DOI\/DOI?10.4338\/ACI-2016-07-RA-0107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":73,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2017,12,18]]},"published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.4338\/aci-2016-07-ra-0107","relation":{},"ISSN":["1869-0327"],"issn-type":[{"value":"1869-0327","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}