[1] | Class, D. (2024). Importance of information technology in today world - Digital Class. Blogs - Digital Class. https:// www.digitalclassworld.com/blog/importance-of-information-technology/#google_vignette. |
|
[2] | Taherdoost, H. (2018). A review of technology acceptance and adoption models and theories. Procedia Manufacturing, 22, 960-967. |
|
[3] | Bajwa, J., Munir, U., Nori, A., & Williams, B. (2021). Artificial intelligence in healthcare: transforming the practice of medicine. Future Healthcare Journal, 8(2), e188–e194. NCBI. |
|
[4] | Marikyan, D., & Papagiannidis, S. (2021). Theory Hub. Open.ncl.ac.uk. https://open.ncl.ac.uk/theories/2/unified-theory-of-acceptance-and-use-of-technology/. |
|
[5] | Dhagarra, D., Goswami, M., & Kumar, G. (2020). Impact of Trust and Privacy Concerns on Technology Acceptance in Healthcare: An Indian Perspective. International Journal of Medical Informatics, 141, 104164. https:// www.sciencedirect.com/ science/article/pii/ S1386505620302276#bib0390. |
|
[6] | Jalo, H., & Pirkkalainen, H. (2024). Effect of user resistance on the organizational adoption of extended reality technologies: A mixed methods study. International Journal of Information Management, 75, 102731. |
|
[7] | Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., & Carlson, J. (2021). Setting the Future of Digital and Social Media Marketing research: Perspectives and Research Propositions. International Journal of Information Management, 59(1), 1–37. Sciencedirect. |
|
[8] | Phichitchaisopa, N., & Naenna, T. (2013). Factors affecting the adoption of healthcare information technology. EXCLI Journal, 12, 413-436. https:// www.ncbi.nlm.nih.gov/ pmc/ articles/ PMC4566918/. |
|
[9] | Alsyouf, A., Lutfi, A., Alsubahi, N., Alhazmi, F. N., Al-Mugheed, K., Anshasi, R. J., Alharbi, N. I., & Albugami, M. (2023). The Use of a Technology Acceptance Model (TAM) to Predict Patients’ Usage of a Personal Health Record System: The Role of Security, Privacy, and Usability. International Journal of Environmental Research and Public Health, 20(2), 1347. ,https:// www.ncbi.nlm.nih.gov/ pmc/articles/PMC9859518/. |
|
[10] | Abbad, M. M. M. (2021). Using the UTAUT model to understand students’ usage of e-learning systems in developing countries. Education and Information Technologies, 26. |
|
[11] | Okazaki, S., Eisend, M., Plangger, K., Ruyter, K. de, & Grewal, D. (2020). Understanding the Strategic Consequences of Customer Privacy Concerns: A Meta-Analytic Review. Journal of Retailing, 96(4). |
|
[12] | Burr, C., Taddeo, M., & Floridi, L. (2020). The ethics of digital well-being: A thematic review. Science and Engineering Ethics, 26. |
|
[13] | Kim, Y. J., Choi, J. H., & Fotso, G. M. N. (2024). Medical professionals’ adoption of AI-based medical devices: UTAUT model with trust mediation. Journal of Open Innovation: Technology, Market, and Complexity, 10(1), 100220. |
|
[14] | Ammenwerth, E. (2019). Technology Acceptance Models in Health Informatics: TAM and UTAUT. Studies in Health Technology and Informatics, 263, 64-71. |
|
[15] | Camilleri, M. A. (2024). Factors affecting performance expectancy and intentions to use ChatGPT: Using SmartPLS to advance an information technology acceptance framework. Technological Forecasting and Social Change, 201, 123247. |
|
[16] | Gesk, T. S., & Leyer, M. (2022). Artificial intelligence in public services: When and why citizens accept its usage. Government Information Quarterly, 39(3), 101704. |
|
[17] | Rivadeneira, J. E., Sá Silva, J., Colomo-Palacios, R., Rodrigues, A., & Boavida, F. (2023). User-centric privacy preserving models for a new era of the Internet of Things. Journal of Network and Computer Applications, 217, 103695. |
|
[18] | Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability, 15(18), 13369. |
|
[19] | Chen, Y., Khalid Khan, S., Shiwakoti, N., Stasinopoulos, P., & Aghabayk, K. (2023). Analysis of Australian public acceptance of fully automated vehicles by extending technology acceptance model. Case Studies on Transport Policy, 14, 101072. |
|
[20] | Yan, F., Li, N., Iliyasu, A. M., Salama, A. S., & Hirota, K. (2023). Insights into security and privacy issues in smart healthcare systems based on medical images. Journal of Information Security and Applications, 78, 103621–103621. |
|
[21] | Yeo, L. H., & Banfield, J. (2022). Human factors in electronic health records cybersecurity breach: An exploratory analysis. Perspectives in Health Information Management, 19(Spring). https:// www.ncbi.nlm.nih.gov/ pmc/ articles/PMC9123525/. |
|
[22] | Shojaei, P., Gjorgievska, E. V., & Chow, Y.-W. (2024). Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review. Computers, 13(2), 41. |
|
[23] | Yeng, P., Szekeres, A., Yang, B., & Snekkenes, E. A. (2019). A Framework for Healthcare Professionals’ Information Security Practice Analysis: Psycho-Socio-Cultural Context (Preprint). JMIR Human Factors. |
|
[24] | Raza Nowrozy, Ahmed, K., Wang, H., & McIntosh, T. (2023). Towards a Universal Privacy Model for Electronic Health Record Systems: An Ontology and Machine Learning Approach. MDPI, 10(3), 60-60. |
|