Skip to main content
Top
Published in: Journal of Big Data 1/2019

Open Access 01-12-2019 | Research

Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change

Authors: Muhammad Shahbaz, Changyuan Gao, LiLi Zhai, Fakhar Shahzad, Yanling Hu

Published in: Journal of Big Data | Issue 1/2019

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Big data analytics is gaining substantial attention due to its innovative contribution to decision making and strategic development across the healthcare field. Therefore, this study explored the adoption mechanism of big data analytics in healthcare organizations to inspect elements correlated to behavioral intention using the technology acceptance model and task-technology fit paradigm. Using a survey questionnaire, we analyzed 224 valid responses in AMOS v21 to test the hypotheses. Our results posit that the credentials of the technology acceptance model together with task-technology fit contribute substantially to the enhancement of behavioral intentions to use the big data analytics system in healthcare, ultimately leading towards actual use. Meanwhile, trust in and security of the information system also positively influenced the behavioral intention for use. Employee resistance to change is a key factor underlying failure of the innovative system in organizations and has been proven in this study to negatively moderate the relationship between intention to use and actual use of big data analytics in healthcare. Our results can be implemented by healthcare organizations to develop an understanding of the implementation of big data analytics and to promote psychological empowerment of employees to accept this innovative system.
Abbreviations
BDA
big data analytics
TTF
task-technology fit
TAM
technology acceptance model
PEOU
perceived ease of use
PU
perceived usefulness
RTC
resistance to change
BI
behavioral intentions

Introduction

Big data analytics (BDA) is a course of action to examine large and complex data sets (i.e., big data) and select veiled information that can help organizations with efficient decision making [1]. The volume of data related to healthcare organizations has grown dramatically in past years and is expected to increase in coming years due to the use of innovative technologies [2]. Meanwhile, healthcare reimbursement methods are changing, and pay for performance is an emerging factor in the current healthcare environment. Recently, healthcare organizations have only focused on profit and have neglected to acquire the essential tools, infrastructure, and technologies for effective control of big data to ensure citizens’ health care [3, 4]. Big data incorporates features such as variety, velocity, and veracity. BDA techniques can be applied to the massive amount of prevailing patient-related medical information to analyze outcomes for improvement of the healthcare sector [5, 6]. Using BDA in the healthcare sector will help inform each physician of the medical histories of individuals and the population and enable appropriate decision-making regarding treatment of a particular patient [4]. However, compared with the banking and retailing industries, healthcare organizations have lagged behind in the sophisticated use of BDA [7]. The healthcare industry also strives to make internal developments in BDA implementation based on their quality and data performance, which provides timely feedback to interested parties [8]. Therefore, describing the crucial factors that are required for understanding is important prior to creating a strategy for the acceptance of BDA in the healthcare industry, particularly in developing countries such as Pakistan, where the industry requires filling the gap of BDA adoption. Furthermore, data (i.e., big data) related to healthcare are generated at a very high pace [9], and existing systems are unable to store and analyze the huge volume, velocity and variety of data [10]. Therefore, a need exists for a system with the ability to store and analyze data with high volumes, velocities, and variety, all of which are provided by BDA systems [9]. BDA is in the initial adoption phase, and many healthcare organizations want to implement BDA to obtain its benefits [11]. Thus, a comprehensive adoption model related to BDA is needed to fulfill the existing gap in the literature and help healthcare organizations replace traditional systems incapable of competing with BDA systems.
Few studies have described the importance of BDA in healthcare [4, 12, 13], although studies have investigated the technological aspects and required qualifications for big data in healthcare [1418]. Previous studies focused on technological and policy issues and not on adoption factors, such as security, trust, and fitness of technology for the tasks required to manage BDA in healthcare [13]. According to Dishaw [19], the technology acceptance model (TAM) and task-technology fit (TTF) provide better outputs than either TAM or TTF alone in the adoption of information technology systems. The prior literature tries to explain BDA adoption through perceptions of technology, such as perceived ease of use and perceived usefulness [2024]. However, emphasizing only the end user’s perception of technology may not be sufficient. According to Goodhue and Thompson [25], the TTF model claims that the user will adopt the system when the characteristics of the technology fit the task requirements. Adoption will also occur when the user perceives the technology as useful, easy and advanced, but the technology may not be adopted if a mismatch exists with his required tasks and the technology cannot enhance his job performance [2629]. Therefore, not only should the user have the perception that the technology is useful and easy but also the technology characteristics should match with the required job tasks. Furthermore, the previous literature showed that perceived security of information [3032] and perceived trust [3335] were the biggest hurdles for users adopting innovative information systems. Security of information is the main reason for the slow pace of BDA adoption [36, 37]. Perceived trust is a major concern in the BDA acceptance procedure, and thus organizations should generate more trust in BDA adoption [38]. Prior studies by Malaka, Shin, and Sivarajah [23, 39, 40] also highlighted that perceived security and perceived trust were the biggest challenges and hurdles for BDA acceptance. Resistance to change (RTC) from employees is also a key factor that affects the adoption of different innovative systems, especially in developing countries [4143]. In previous literature concerning electronic health record system adoption, RTC from physicians was repeatedly reported as a key barrier for system adoption [44, 45], and RTC of employees mitigated the willingness of those who wanted to adopt the system [46]. RTC also resists or slow down the pace of information system acceptance in the health sector [47, 48]. The study considers RTC a key factor in the adoption of BDA in the healthcare sector, which has never been discussed in this scenario.
Despite the fame of BDA, insufficient empirical research has investigated factors that can influence BDA adoption in healthcare [21, 49]. Empirical evidence from Pakistan’s healthcare organizations represents a big gap in the literature from both dimensions (i.e., knowledge about BDA and adoption of BDA) [50]. This study summarizes real facts from Pakistan for the healthcare BDA literature. The gap between the potential pros of BDA and the slow and low geared adoption represents a superior opportunity for scholars to realize how BDA can be adopted in the healthcare industry. BDA is in the initial adoption phase in Pakistan, and the government should develop a clear policy and mechanism for the acceptance of BDA in government and the private sector [50]. Therefore, to bridge this gap in the literature, the major focus of this paper is to provide comprehensive research insights into the adoption of BDA in healthcare. To fulfill said gap, the study has two main objectives. The first objective is to help government and private healthcare organizations determine the important factors that play key roles in the adoption of BDA in healthcare in developing countries, such as Pakistan. The second objective is to cover the on-hand gap in the literature concerning the influence of RTC from employees for BDA adoption. To achieve the above-mentioned objectives, this study incorporated both TAM and TTF models to explain BDA adoption in the healthcare sector from both viewpoints (the user’s perception of technology and the task-technology fitness) with the most important and substantial factors involved in the adoption of information systems (i.e., perceived security and perceived trust). The study also considers RTC as a moderator in the proposed model to address the most important hurdle for developing countries, such as Pakistan [33, 41]. The results justified the use of a composite of both TAM and TTF with security and trust as significant predictors of behavioral intentions (BIs) to adopt BDA, whereas RTC negatively moderated the relationship between BIs and actual use of BDA.
In the next section, we describe the theoretical background and develop a research model for this study to analyze the predictors linked to BDA adoption. The research methods are discussed in section three, and section four provides results from our data analysis using structural equation modeling and discussions. “Conclusion” section concludes the overall findings. In addition to the research limitations, our study also has theoretical and practical implications, as discussed in “Conclusion” section. References are given in “Reference” section.

Relevant work and hypotheses

During this phase, we underpin the relevant theories and work based on the prior literature regarding the acceptance of a BDA system across various sectors (see Table 1) and produce the research hypotheses for analysis based on the research framework (see Fig. 1).
Table 1
Relevant work
Authors
Year
Important aspects
Limitations
Esteves and Curto [21]
2013
Predicted behavioral intention to use big data technology by using the theory of planed behavior based on risk and benefits point of view
Small sample size was used to test the proposed model and insufficient theoretical base provided
Mahmood and Afzal [51]
2013
Provided survey on description, technology, trend, and tools of cybercrime security in Pakistan by using big data analytics
Big data analytics adoption model not provided
Tsai et al. [52]
2015
Provided a brief introduction of big data analytics to help in developing high performance platform and mining algorithm for big data analytics
Did Not predict the behavior of a user regarding use of big data analytics
Malaka and Brown [40]
2015
Investigated the adoption of big data analytics in organization prospective by using technology organization environment model
User centric approach was ignored by the study
Archenaa and Anita [53]
2015
Conducted a survey to explore the importance, benefits, and need of big data analytics in healthcare and government
Empirical evidence regarding adoption from citizen prospective and security of information was ignored in the study
Soon et al. [54]
2016
Demonstrated the big data analytics adoption by using the technology acceptance model and diffusion of innovation model and explored the moderating effects of training in Malaysia
The scope of the study was restricted to only private organizations which inferred the generalization of the study
LaBrie et al. [55]
2017
Provided a comparative study of china and USA to understand the technology change and big data analytics adoption from a societal perspective
Study missed the fit between technology and cultural dimensions of people
Sivarajah et al. [39]
2017
The systematic literature view was performed to identify the challenges in big data analytics
To develop the link between theories and practice the empirical analysis was not performed
Memon et al. [56]
2017
Apache Hadoop open source technology was used to check the big data analytics application in the healthcare sector of Pakistan
Big data analytics application from a user’s perspective in the healthcare sector of Pakistan was not provided
Brock and Khan [24]
2017
Combined technology acceptance model and organization learning capabilities to explore the factors linked with big data analytics usage
Pre-implementation assessment for practitioners was not performed considering the user’s perspective in the adoption of big data analytics
Weerakkody et al. [57]
2017
To investigate the user’s behavioral intentions of big open data. The study applied extended technology acceptance model
The study only focused on intention to use only instead of focusing also on actual use of big open data
Arunachalam et al. [58]
2018
Provided comprehensive literature view on capabilities of big data analytics to demonstrate the challenges which help to develop a big data analytics maturity model
A phenomenon of restriction to change in the user perspective was not discussed
Gupta et al. [59]
2018
Reviewed big data analytics and provide future research directions of big data analytics
Trust, privacy, and information security can be further explained by utilizing the characteristics of big data and cognitive computing

Perceived trust

Trust is described as a belief that a person or a particular thing will respond in a helpful way without manipulating the results [60]. Perceived trust is a state of mind in which an individual has acquired assurance and confidence in the information provided by the system [61]. Individual expectations towards technology build trust in its use. Typically, trust in use of technology is used to mitigate the uncertainty of mind when a person lacks experience and knowledge with using innovated technology and information systems [35]. Perceived trust is particularly important in the context of BDA, because adoption of a BDA system is a risk. Many studies have proved that perceived trust is a fundamental reason for the success or failure of information system adoption, including E-payment adoption [62], online purchasing [63], adoption of crypto currencies [64] and internet banking [65]. Trusting BDA is not the only issue, because mistrusting the capabilities of technology to deliver valuable services without interruption and data loss also reduce its adoption intentions [66]. Thus, based on the above cited literature, we assume that perceived trust will also affect BDA adoption.
H1
Perceived trust has a significant relationship with BIs to use BDA.

Perceived security

Perceived security refers to the degree to which a person believes that use of a specific system is safe and sound for transmitting and recording sensitive information [31, 61]. Perceived security of information is an important concern for healthcare, which contains sensitive patient information [39]. Perceived security is the factor that restricts user thinking about the benefits of a system and convinces him to use a system that is negatively perceived [40]. In the previous literature, many studies described the value of perceived security for the adoption of different analytical information systems (i.e., cloud computing [67], B2C electronic commerce [68], online markets [69], and electronic health record systems [70]). The use of BDA systems has some reservations in the minds of users regarding information security in the form of informational fraud, misuse of sensitive information and use by various unconcerned departments [71, 72]. Prior literature on BDA and its adoption has not emphasized security of information sufficiently [72, 73]. Based on the prior literature, one key feature that can affect BDA adoption by healthcare organizations is the security of the analytical tools used to generate useful information. Employees’ perceptions of the security level of technology possibly affect its adoption rate. Organizations that have high-level capabilities for dealing with information security will possibly develop the intention to use BDA.
H2
Perceived security has a significant relationship with BIs to use BDA.

Task-technology fit

The effective adoption of an information system relies on identification of the task for which the technology is used and whether a suitable match exists between the task and technology. As described by Goodhue [25], decomposition of TTF investigates the user’s requirements for the information system, which ultimately impact the individual performance. The study of Lin and Huang [74] defines the task as activities performed to create valued outputs that satisfy human wants. Technology refers to the combination of various supportive activities to perform such tasks (i.e., computers, software, and others).
Prior studies by Benford, D’Ambra and Khan et al. [50, 75] described the various dimensions of tasks (e.g., nonroutines, interdependence, data access, and quantitative data analysis), which were related to several technical aspects that fulfilled individuals’ needs. Task and technology both have significant impacts on the ability of TTF to estimate users’ performances from several perspectives [76]. Innovative information technology and the system will be useless if they fail to satisfy individual requirements for performance of a specific task [27]. Therefore, recognizing the task-technology fit of a BDA system is significant, because it leads towards adoption of the system by healthcare organizations.
Prior studies discussed TTF in several aspects to determine the user task fitness for technology and group decision making, which led towards the successful adoption of an information system in various organizational settings (i.e., massive open online courses [MOOCs] [77], E-commerce [78], electronic health records [79], group decision support systems [80], high-speed data services [81], and mobile banking [27]). Therefore, based on the abovementioned literature, we believe that successful adoption of BDA by healthcare organizations significantly depends on matching of technology with the user task requirements, which has not been studied by prior researchers. The study of Zhou et al. [27] designed a TTF measure that could evaluate the fit between task and technology [79], with no need to evaluate the impact of the task and technology characteristics on TTF. Therefore, we use only TTF as used by Klopping and Qiwei [78, 79], and we use the task and technology characteristics separately.
H3
TTF has a significant relationship with BIs to use BDA.

Technology acceptance model

This paper applied the TAM to observe the adoption of BDA because it satisfactorily determined users’ perceptions of the ease of use and usefulness of a new system [82]. TAM model determinants are optimal for determining user perceptions about its adoption [54]. TAM has been adopted by many researchers to successfully check and manage new system adoptions [54, 57, 83, 84]. Since the invention of TAM, an abundance of studies have produced different research models to effectively predict user attitudes and behavioral intentions towards technology adoption. Interestingly, all of these studies used approximately similar attributes to evaluate technology adoption [85]. Many studies have concluded that TAM is one of the best models in different contexts (e.g., forecasting general buyer behavioral intentions [86], telemedicine adoption [87] and radio frequency identification (RFID) integrated system adoption [85]). Previous literature has witnessed the adoption of innovations with massive implementation of TAM in the evaluation of user intentions regarding new technology diffusion [88]. The literature widely backs the use of TAM constructs [i.e., perceived usefulness (PU) and perceived ease of use (PEOU)] in measuring adoption solutions for new technology [24, 39, 89, 90].
The study proposes that TAM will provide superior understanding of BDA adoption, because BDA is a heavily technology-driven research area that is also user-oriented and innovation-focused [23]. Previous studies by Esteves, Rahman, and Shin [21, 23, 91] also concluded that TAM constructs (i.e., PEOU and PU) were significant predictors of BDA adoption/usage.

Perceived ease of use

The study of Davis [82] defined PEOU as the degree of ease involved when using an information system. Subsequently, Soon [54] clarified that ease in using the information system and technology would help enhance its acceptability among users. The use of an effortless system will help enhance individual and organizational performances [24, 92]. BDA potentially generates benefits for organizations, including cutting costs, controlling risk factors and helping with efficient decision making. Adoption of BDA depends on user considerations in terms of its convenience of use, which employs processing of large-scale and heterogeneous data [23]. However, the intensity of difficulty and ease of using BDA vary from person to person.
The prior literature has proven the existence of a significant direct relationship between the PEOU and a user’s intentional behavior to adopt the system in various fields of study [54, 93, 94]; this relationship was also discussed by Esteves, Shin, and Weerakkody [21, 23, 39] when studying user intentional behaviors regarding the adoption of big data, although these studies were less focused on this study context. For example, measuring the relationship of PEOU with the intention to use BDA is essential for healthcare organizations. The idea of BDA is not much older and can create much confusion in the user’s mind about its ease of use, which may decrease user intentions towards its use in healthcare organizations.
Based on the aforesaid opinion, we propose the following hypothesis.
H4
PEOU has a significant relationship with BIs to use BDA.

Perceived usefulness

PU can be defined as whether an individual considers that their job performance will be improved by using the system [24, 82]. PU is the most commonly used variable and the primary driver of technology adoption [92, 95]; PU is also expected to be the primary driver of intention to use BDA in healthcare in this study. PU is an essential variable for studies of the adoption intentions of innovation from the user’s perspective [54]. The previous literature has provided evidence of a positive relationship with intention to use many times, which has been successfully measured in various fields [26, 54, 94], including the field of big data [21, 23, 57], but BDA not has not been a focus in healthcare.
The user cannot shape a positive perception of usefulness until he or she feels any practical worth of BDA in healthcare organizations. According to the theoretical principle of the TAM model, the study hypothesized that PU had a positive relationship with BIs.
H5
PU has a significant relationship with BIs to use BDA.

Behavioral intention to use

A BI is an intention to achieve some specified future behavior [21] and is a key predictor of an individual’s actual use of technology [96, 97]. BI is an essential first step towards actual adoption of any system [24]. According to Venkatesh and Davis [92], BI was an important mediator in the relationship between predictors and specific system adoption. The prior literature has proven that a person is more likely to adopt a technology if he has an intention to use it [98]. The social sciences literature has provided evidence that BIs have a direct impact on actual use [77, 82], and various studies have concluded that BIs have a significant influence on adoption of BDA [21, 23]. This study suggests that individuals with the intention to use BDA will lead to the actual use of BDA.
H6
BIs have a significant relationship with actual use of BDA.

The moderating role of resistance to change

According to French [99], change is a state in which differences exist between new and old ways of thinking. The behavior of individuals who protects them from the consequences of either real or imagined change is called RTC [100]. Oliver [101] defines RTC as protection of the status quo via individuals creating resistance against the innovative system. Every innovative system is commonly a source of panic and bears RTC due to its perception as a possible threat to the solidity of old habits [43, 101]. To avoid RTC in organizations when implementing new systems or ways of working, Oreg [102] proposed that the organization should encourage employees to learn new skills, tasks, and programs. One aspect of personality is that RTC is very important for technology adoption [103]. The previous literature has shown that RTC is a demotivator and negatively influences the acceptance of information technology [104106].
The study of Alomari [107] concluded that RTC was one factor that caused non-adoption and failure of new information systems. Lallmahomed et al. [33] investigated the adoption behavior of an e-government system by focusing on RTC and established a significant negative relationship between RTC and adoption of the system. Many other researchers also proved the importance and negative associations of RTC with acceptance of information and communication technology systems [42, 43, 108]. A study of green supply chain management (GSCM) adoption [41] investigated RTC as a moderator between BIs and adoption of GSCM and concluded that higher RTC among employees would lead to non-implementation of GSCM. Similarly, Bral III et al. [109] investigated the moderating role of RTC between psychological capital and organizational citizenship behavior. Regarding BDA in healthcare organizations, RTC is likely to moderate between intentional behaviors and actual usage of the BDA system by employees. The previous literature also reported that RTC either did not significantly affect or had a minor direct impact on the actual use of technology [41, 109]. Therefore, this study also focuses on the moderating role of RTC rather than on the direct influence of RTC on actual use.
The American Health and Human Services Department faced huge resistance to change from physicians when they were adopting an electronic health records system, especially during the initial phase [110]. The study of Bhattacherjee [111] empirically investigated and concluded that RTC was a key barrier to actual adoption of information technology in the healthcare sector in both the initial and post-adoption phases but was more of an obstacle during the initial phase. Other researchers also found that RTC was often regarded as the cause of failure of the actual use of information technology in healthcare organizations [112, 113]. Here, we focus on RTC because we also investigate the initial adoption of BDA. However, although RTC has a key impact on the adoption of information systems in healthcare, previous research has not paid attention to RTC during this process. Therefore, to bridge this big gap in the literature, we considered the following hypothesis:
H7
RTC moderates the relationship between BIs to use and actual use of BDA.

Methodology

Here, the researchers describe the methodology followed by this study. Figure 2 represents the flow diagram of the research progress.

Development of measures

In this study, we adopted all of the measures from previous studies with the same context to preserve the content validity. All constructs were measured on a 7-point Likert scale in which the agreement of the participants to a given statement was assigned a score ranging from 1 (strongly disagree) to 7 (strongly agree). The 3-item perceived trust scale was adapted from [114], the four-item perceived security scale was adapted from [31], and the three-item task-technology fit scale was adapted from [27, 74]. Similarly, the three-item scales for both PU and PEOU were adapted from [39]. The three-item scale for BI to use was adapted from [98], and the three-item scale for actual use was adapted from [98]. The four-item scale for RTC was adapted from [104].

Sampling and data collection

The structured questionnaire-based survey method was used in this empirical study to measure the proposed model. The survey method is helpful for measurement of behaviors and the relationships among constructs [115]. Typically, the survey method has been used in previous studies in which researchers assess adoption or user intention-behavior [116]. First, a pilot study was conducted with 20 prospective users of the BDA system. The results of the pilot study were discussed with four senior professors with great command of construct building, and then the measurement items were refined based on the discussions, which also confirmed the face validity of the measurement scale. All prospective BDA system end users from 25 hospitals in four big cities of Punjab Pakistan (Lahore, Faisalabad, Rawalpindi, and Multan) and the Islamabad capital territory of Pakistan were selected for data collection using a convenience sampling technique. A convenience sampling technique is a suitable sampling technique by virtue of the accessibility of the researcher to the participants [117]. A refined questionnaire with a cover letter that assured the respondents that the data would be used only for academic research purposes and kept confidential was distributed to all participants through an online survey. The online survey ensures research consistency with data collection [118]. A total of 400 questionnaires were distributed among the participants, and 260 filled questionnaires were received, of which 36 questionnaires that contained missing values or biased responses were not included in the study. The remaining 224 responses were selected for the analysis. Furthermore, the study considered age and gender as control variables to ensure that the results of the model were not influenced adversely by covariance, because the previous literature suggested that age and gender might influence the intention to use [63, 118].

Results and discussion

We employed structural equation modeling (SEM) using the IBM-AMOS (v21) software to evaluate the proposed research model. It is evident from the previous literature that the AMOS software is a powerful tool for performing confirmatory factor analysis (CFA) and SEM [119]. AMOS is also a complete package for evaluation of formative measures and moderating relationships [120]. Because AMOS is user-friendly and provides a graphical interface that enables easier handling, we used this software for the CFA and SEM and SPSS (v 21) to measure the validity and reliability and conduct an exploratory factor analysis (EFA) prior to the CFA and SEM. We also used SPSS for the demographic statistics. Table 2 presents the demographic information for the respondents, of whom 128 out of 224 were male, 82% were in the age bracket of 25–45 years, and 98% had a bachelor’s or higher degree; the remaining 2% had a high school certificate or relevant diploma as well as knowledge and experience with using technological systems.
Table 2
Demographical information of respondents
Category
Frequency
Percentage (%)
Gender
 Male
128
57.1
 Female
96
42.9
 Total
224
100.0
Age
 18–25
29
12.9
 25–35
89
39.7
 35-45
94
42.0
 45 and above
12
5.4
 Total
224
100.0
Education
 High school/diploma
4
1.8
 Bachelor
109
48.7
 Master
101
45.1
 Doctoral
10
4.5
 Total
224
100.0

Measurement model

Kaiser–Meyer–Olkin (KMO) and Bartlett’s test of sphericity were used to measure sample adequacy [121]. The KMO value was 0.857, which was within the cutoff range of 0.8–1 that showed sample adequacy. Data were collected without regard to differences in time; we checked the common method bias (CMB) in the data using Harman’s single-factor test [122]. After categorizing the items into eight subgroups, the results indicated that the first factor explained 31.1% of the variance, which was below the 40% cutoff rate. Thus, CMB is not an issue in the study.
Prior to the path analysis, the reliability and validity were measured. The value of Cronbach’s alpha was greater than 0.7 for all factors. The composite reliability (CR) and AVE values ranged from 0.847 to 0.962 and from 0.652 to 0.864, respectively, which were within the accepted ranges [123, 124]. Table 3 shows all of the Cronbach’s alpha, CR and AVE values. Table 4 proves that no issue existed with the discriminant validity of the constructs in the study, because the square root of AVE was higher than all inter-construct correlations [125]. The study conducted EFA using SPSS to ensure that the measures in the study were correct with respect to the concerned variables. The factor loading values shown in Table 3 ranged from 0.744 to 0.953, which proved that no issue existed regarding cross loading of the constructs [126].
Table 3
Results of factor loadings, validity, and reliability
Variables
Items
Loadings
Cronbach’s alpha
CR
AVE
Perceived trust
PT1
0.849
0.834
0.847
0.654
PT2
0.879
PT3
0.778
Perceived security
PS1
0.838
0.903
0.905
0.705
PS2
0.849
PS3
0.806
PS4
0.744
Task-technology fit
TTF1
0.864
0.898
0.900
0.751
TTF2
0.797
TTF3
0.768
Perceived ease of use
PEOU1
0.857
0.877
0.877
0.704
PEOU2
0.859
PEOU3
0.805
perceived usefulness
PU1
0.816
0.838
0.847
0.652
PU2
0.881
PU3
0.841
Behavioral intention to use BDA
BI1
0.778
0.909
0.911
0.773
BI2
0.796
BI3
0.809
Resistance to change
RTC1
0.939
0.962
0.962
0.864
RTC2
0.937
RTC3
0.953
RTC4
0.944
Actual use of BDA
AU1
0.872
0.918
0.919
0.792
AU2
0.889
AU3
0.879
Table 4
Correlations matrix and square root of AVE
 
RTC
PS
AU
PEOU
TTF
PT
PU
IB
RTC
0.929
       
PS
0.092
0.840
      
AU
0.168*
0.396***
0.890
     
PEOU
0.111
0.433***
0.403***
0.839
    
TTF
− 0.002
0.619***
0.429***
0.448***
0.866
   
PT
− 0.041
0.413***
0.075
0.152*
0.357***
0.809
  
PU
− 0.034
0.291***
0.047
0.270***
0.258***
0.337***
0.808
 
IB
0.004
0.556***
0.490***
0.524***
0.616***
0.370***
0.348***
0.879
Inclined italic lines represent the square root of the AVE of each variable
Significance of correlations: *p < 0.050, **p < 0.010, ***p < 0.001
CFA was conducted through AMOS to check the consistency and validity of the constructs for the proposed study framework. The CFA values are CMIN/DF = 1.545, root mean square error of approximation (RMSEA) = 0.049 with a PCLOSE value of 0.529, comparative fit index (CFI) = 0.967 and Tucker-Lewis fit index (TLI) = 0.960. All values are in accordance with the threshold values [126]. These results proved the good fitness of the model.

Structural model

The above results proved good fitness of the model and that the data were highly reliable and valid. Therefore, we continued with the path analysis. In the path analysis, CMIN/DF = 1.748, RMSEA = 0.058 with a PCLOSE value of 0.278, CFI = 0.939, and TLI = 0.901, which proved that the model was a good fit. Then, the study measured the path coefficients and found that all coefficients were significant. The results shown in Fig. 3 demonstrate that perceived trust (β = 0.124, p < 0.05), perceived security (β = 0.209, p < 0.001), TTF (β = 0.263, p < 0.001), PEOU (β = 0.240, p < 0.001), and PU (β = 0.118, p < 0.05) have significant positive relationships with BIs to use BDA. Thus, H1, H2, H3, H4, and H5 are supported. In addition, BIs to use BDA (β = 0.412, p < 0.001) have a significant positive relationship with the actual use of BDA, and thus H6 is also accepted. The model also demonstrates that 45% of the variance exists in the BIs to use BDA and 25% of the variance represents the actual use of BDA. The control variables age and gender did not have a significant relationship with the actual use of BDA. Therefore, we concluded that the hypothesized study model was accepted.

Moderating the effect of RTC

The study proved that RTC moderated the relationship between BIs to use the BDA system and actual use of the BDA system. The interaction term (behavioral intentions to use × resistance to change) (β = − 0.201, p < 0.001) had a significant and negative effect on the actual use of the BDA system. Thus, a higher RTC weakened the relationship between BIs to use and actual use of the BDA system, which accepted H7.
BDA change the decision-making style in the healthcare sector. An interactive and task-oriented system can make possible use of BDA in any sector, especially in healthcare organizations. With these objectives in mind, this study provided useful findings and a framework for practical adoption of BDA systems and future research. The study focused on security and trust of information, which were observed to be big concerns of system users. Similar to the results of [23], perceived trust and perceived security had a positive effect on BIs to adopt BDA. The study also investigated TTF, which had a positive impact on the behavioral intentions to adopt BDA, indicating that features of the system must be matched to the specific task of the user for successful adoption of a BDA system. Our results are consistent with the results of Afshan and Brock [127]. Similar to previous studies by Shin and Soon et al. [23] concerning BDA adoption, this study also demonstrated the positive effects of PEOU and PU on BIs to adopt BDA, which suggested that the system should be easy to use and have attractive features that make it look useful to the user. Furthermore, the study investigated RTC in employees, which played a key role in the convergence of BIs to put the system into actual use. The results of this study illustrate that as RTC from employees increases, actual use of BDA systems will decrease. The RTC result is consistent with that of Beal III and Nejati [41, 109].

Conclusion

The adoption of BDA is in the initial stage, in which many healthcare organizations are thinking about adopting BDA systems. The present is an optimal time to adopt/implement BDA systems, especially in healthcare organizations, with an aim of providing better healthcare facilities by maintaining patients’ health records and formulating better strategies. This study contributes to the literature by showing the main factors that are important when adopting the BDA system. This study results are also imperative for strategy makers who want to implement a BDA system by demonstrating factors that are important initially. In contrast to existing studies, this study also expressed the huge positive combined effect of the TTF and TAM theories on behavioral intentions to adopt BDA. Combining TAM and TTF gives more effective results than use of TAM or TTF individually [19, 26]. The prior literature demonstrates use of the TAM model alone in the adoption of a BDA system. The current study also incorporated important concerns from users regarding adoption of any innovative system, such as perceived security and perceived trust. These factors provide an additional significant aspect to the literature regarding BDA. Our sampling territory is Pakistan, which is a developing country. RTC is the largest barrier in the adoption of innovative systems, particularly in developing countries but also in developed countries. According to our best information, this study is the first to enrich the literature by linking resistance to change of employees with BDA adoption as a moderator. This moderation result will help implementers control this factor at the time of adopting the BDA system.

Theoretical contribution

This study contributes noteworthy research insights into BDA system implementation. The study fills the main gap in the literature concerning the empirical evidence for BDA in Pakistani healthcare organizations for the first time. Second, the majority of previous studies only highlighted the importance, challenges, and opportunities of BDA, because BDA was in the initial stage of adoption and was a comparatively new topic. Second, few researchers have investigated the adoption of BDA, and the existing studies have focused on a specific perspective (i.e., an economic or financial perspective) or have simply emphasized TAM theory. This study is probably the first on BDA adoption to propose a model that combines the TAM and TTF theories as predictors of behavioral intentions to use BDA. Thus, integration and implementation of the TAM theory with the TTF theory for BDA adoption is a new perspective that enhances the literature. Second, to switch from the previous healthcare system to a BDA system, the literature needs a strong theoretical basis for further research and a broad and general research model that is not specific to one aspect of the business. This study model will be helpful and will advance a theory for future BDA research. Furthermore, the study included security and trust aspects of information in the model to elucidate their impacts on BI. Our results will contribute to the security and trust perspectives in the technology acceptance literature and provide security and trust grounds for further research. In addition, the results obtained for resistance to change represent an immense theoretical contribution for researchers, because the current study has highlighted this important barrier in the implementation of BDA. This investigation can be used as a reference for future research and to increase understanding of the adoption of BDA research.

Practical contribution

The study also contributed practically in several ways similar to its theoretical contributions. The findings of the study propose salient guidelines and important implications for practitioners and implementers of BDA systems that can assist with successful adoption of BDA systems. First, connecting system functions with the required tasks of the organization as well as the PU and PEOU of the system are important. This approach will provide results that are more fruitful for practitioners when implementing BDA systems. Second, the findings of the study also indicate that perceived security and perceived trust are the key predictors of intentions regarding acceptance of a BDA system. Third, this study explores the moderating effect of RTC, which reduces the adoption of BDA systems in developing countries. This study will provide broad insights for implementers of BDA systems in developing countries and allow the design of strategies to ultimately reduce employees’ resistance levels. Finally, this study provides an initial platform for practitioners for adoption and promotion of BDA practices within the organization to obtain maximum advantages of innovative technology, especially in developing countries.

Limitations and future directions

The authors acknowledge some limitations of the current study. First, the focus of this study is on healthcare organizations in Pakistan regarding adoption of a BDA system. The impact of organizational culture was ignored by this study, which might have an effect on the level of adoption of this system. Future researchers may test the same research model in other organizations considering different cultural setups, because the organizational setup and culture vary from industry to industry; therefore, the findings of this study may vary when applied to different sector organizations. This study provided understanding of BDA system adoption in developing countries in particular and developed countries in general. Thus, future researchers can test this model in developed countries to increase the generalization of the study, because the severity of resistance to change from employees is greater in developing than in developed countries [41]. The research model can be tested in different cultural settings with a focus on adoption of BDA systems. This study was aimed to investigate the user adoption factors of BDA, which neglect the other side of system implementation. Therefore, future researchers can identify the developers/architects intentions for development and implementation of BDA system. Finally, this study was based on cross-sectional settings, which restricted measurement of the consistency in respondent behavior; this gap should be tested in a longitudinal setup to improve the significant contribution to knowledge.

Authors’ contributions

MS conceptualized the idea, prepared the literature and build theory, designed research framework and collect data, analyzed results, drafted and proof-read the manuscript, GCY and ZL provided supervision and guide throughout the process. FS and YH contribute in analysis and results writing. All authors read and approved the final manuscript.

Acknowledgements

This study has been supported by “National Natural Science Foundation of China (NSFC)” Grant Numbers: 71774044, 71672050, and 71272191.

Competing interests

The authors declare that they have no competing interests.

Availability of data and materials

Data can be available on demand.
We, the authors, consent to the publication of this manuscript in the Journal of Big Data.
Not applicable.

Funding

Not applicable.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Literature
1.
go back to reference Müller O, Junglas I, Vom Brocke J, Debortoli S. Utilizing big data analytics for information systems research: challenges, promises and guidelines. Eur J Inf Syst. 2016;25:289–302.CrossRef Müller O, Junglas I, Vom Brocke J, Debortoli S. Utilizing big data analytics for information systems research: challenges, promises and guidelines. Eur J Inf Syst. 2016;25:289–302.CrossRef
2.
go back to reference Cottle M, Hoover W. Transforming health care through big data. Washington DC: Institute for Health Technology Transformation; 2013. p. 6–19. Cottle M, Hoover W. Transforming health care through big data. Washington DC: Institute for Health Technology Transformation; 2013. p. 6–19.
3.
go back to reference Lavalle S, Lesser E, Shockley R, Hopkins MS, Kruschwitz N. Big data, analytics and the path from insights to value. MIT Sloan Manag Rev. 2011;52:21–32. Lavalle S, Lesser E, Shockley R, Hopkins MS, Kruschwitz N. Big data, analytics and the path from insights to value. MIT Sloan Manag Rev. 2011;52:21–32.
6.
go back to reference Connolly S, Wooledge S. Harnessing the value of big data analytics. Big Data Analytics. 2012; p. 1–14. Connolly S, Wooledge S. Harnessing the value of big data analytics. Big Data Analytics. 2012; p. 1–14.
7.
go back to reference Wang Y, Hajli N. Exploring the path to big data analytics success in healthcare. J Bus Res. 2017;70:287–99.CrossRef Wang Y, Hajli N. Exploring the path to big data analytics success in healthcare. J Bus Res. 2017;70:287–99.CrossRef
9.
go back to reference Sandhya Kumari S, Sandhya Rani K. Big data analytics for healthcare system. In: 2018 IADS international conference on computing, communications & data engineering (CCODE), 7–8 February 2018. Sandhya Kumari S, Sandhya Rani K. Big data analytics for healthcare system. In: 2018 IADS international conference on computing, communications & data engineering (CCODE), 7–8 February 2018.
10.
11.
go back to reference Wang Y, Kung LA, Byrd TA. Big data analytics: understanding its capabilities and potential benefits for healthcare organizations. Technol Forecast Soc Change. 2018;126:3–13.CrossRef Wang Y, Kung LA, Byrd TA. Big data analytics: understanding its capabilities and potential benefits for healthcare organizations. Technol Forecast Soc Change. 2018;126:3–13.CrossRef
12.
go back to reference Groves P, Knott D. The ‘big data’ revolution in healthcare. New York: McKinsey & Company; 2013. Groves P, Knott D. The ‘big data’ revolution in healthcare. New York: McKinsey & Company; 2013.
13.
go back to reference Kim MK, Park JH. Identifying and prioritizing critical factors for promoting the implementation and usage of big data in healthcare. Inf Dev. 2017;33:257–69.CrossRef Kim MK, Park JH. Identifying and prioritizing critical factors for promoting the implementation and usage of big data in healthcare. Inf Dev. 2017;33:257–69.CrossRef
15.
go back to reference Huang T, Lan L, Fang X, An P, Min J, Wang F. Promises and challenges of big data computing in health sciences. Big Data Res. 2015;2:2–11.CrossRef Huang T, Lan L, Fang X, An P, Min J, Wang F. Promises and challenges of big data computing in health sciences. Big Data Res. 2015;2:2–11.CrossRef
16.
go back to reference Kim MK, Cho YW, Park JH. The prospects and development directions for healthcare big data industry. Electronics and Telecommunications Research Institute. 2013. Kim MK, Cho YW, Park JH. The prospects and development directions for healthcare big data industry. Electronics and Telecommunications Research Institute. 2013.
17.
go back to reference Heitmueller A, Henderson S, Warburton W, Elmagarmid A, Pentland AS, Darzi A. Developing public policy to advance the use of big data in health care. Health Aff (Millwood). 2014;33:1523–30.CrossRef Heitmueller A, Henderson S, Warburton W, Elmagarmid A, Pentland AS, Darzi A. Developing public policy to advance the use of big data in health care. Health Aff (Millwood). 2014;33:1523–30.CrossRef
18.
go back to reference Bughin J. Reaping the benefits of big data in telecom. J Big Data. 2016;3:14.CrossRef Bughin J. Reaping the benefits of big data in telecom. J Big Data. 2016;3:14.CrossRef
19.
go back to reference Dishaw MT, Strong DM. Extending the technology acceptance model with task-technology fit constructs. Inf Manag. 1999;36:9–21.CrossRef Dishaw MT, Strong DM. Extending the technology acceptance model with task-technology fit constructs. Inf Manag. 1999;36:9–21.CrossRef
20.
go back to reference Petersen Glen S. High impact sales force automation. Boca Raton: FL St Lucie Press; 1997. Petersen Glen S. High impact sales force automation. Boca Raton: FL St Lucie Press; 1997.
23.
go back to reference Shin DH. Demystifying big data: anatomy of big data developmental process. Telecomm Policy. 2016;40:837–54.CrossRef Shin DH. Demystifying big data: anatomy of big data developmental process. Telecomm Policy. 2016;40:837–54.CrossRef
24.
go back to reference Brock V, Khan HU. Big data analytics: does organizational factor matters impact technology acceptance? J Big Data. 2017;4:21.CrossRef Brock V, Khan HU. Big data analytics: does organizational factor matters impact technology acceptance? J Big Data. 2017;4:21.CrossRef
26.
go back to reference Wu B, Chen X. Continuance intention to use MOOCs: integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Comput Human Behav. 2017;67:221–32.CrossRef Wu B, Chen X. Continuance intention to use MOOCs: integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Comput Human Behav. 2017;67:221–32.CrossRef
27.
go back to reference Zhou T, Lu Y, Wang B. Integrating TTF and UTAUT to explain mobile banking user adoption. Comput Human Behav. 2010;26:760–7.CrossRef Zhou T, Lu Y, Wang B. Integrating TTF and UTAUT to explain mobile banking user adoption. Comput Human Behav. 2010;26:760–7.CrossRef
29.
go back to reference Lee C-C, Cheng HK, Cheng H-H, Cheng HK. An empirical study of mobile commerce in insurance industry: task–technology fit and individual differences. Decis Support Syst. 2007;43:95–110. www.elsevier.com/locate/dss. Lee C-C, Cheng HK, Cheng H-H, Cheng HK. An empirical study of mobile commerce in insurance industry: task–technology fit and individual differences. Decis Support Syst. 2007;43:95–110. www.​elsevier.​com/​locate/​dss.
30.
go back to reference Damghanian H, Zarei A, Siahsarani Kojuri MA. Impact of perceived security on trust, perceived risk, and acceptance of online banking in Iran. J Internet Commer. 2016;15:214–38.CrossRef Damghanian H, Zarei A, Siahsarani Kojuri MA. Impact of perceived security on trust, perceived risk, and acceptance of online banking in Iran. J Internet Commer. 2016;15:214–38.CrossRef
32.
go back to reference Fife E, Orjuela J. The privacy calculus: mobile apps and user perceptions of privacy and security. Int J Eng Bus Manag. 2012;4:1–10.CrossRef Fife E, Orjuela J. The privacy calculus: mobile apps and user perceptions of privacy and security. Int J Eng Bus Manag. 2012;4:1–10.CrossRef
33.
go back to reference Lallmahomed MZI, Lallmahomed N, Lallmahomed GM. Factors influencing the adoption of e-government services in Mauritius. Telemat Inform. 2017;34:57–72.CrossRef Lallmahomed MZI, Lallmahomed N, Lallmahomed GM. Factors influencing the adoption of e-government services in Mauritius. Telemat Inform. 2017;34:57–72.CrossRef
34.
go back to reference Wang EST, Lin RL. Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behav Inf Technol. 2017;36:2–10.CrossRef Wang EST, Lin RL. Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behav Inf Technol. 2017;36:2–10.CrossRef
37.
go back to reference Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. J Big Data. 2016;3:25.CrossRef Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. J Big Data. 2016;3:25.CrossRef
38.
go back to reference Heart T. Who is out there? Exploring the effects of trust and perceived risk on SaaS adoption intentions. DATA BASE Adv Inf Syst. 2010;41:49–67.CrossRef Heart T. Who is out there? Exploring the effects of trust and perceived risk on SaaS adoption intentions. DATA BASE Adv Inf Syst. 2010;41:49–67.CrossRef
39.
go back to reference Sivarajah U, Kamal MM, Irani Z, Weerakkody V. Critical analysis of big data challenges and analytical methods. J Bus Res. 2017;70:263–86.CrossRef Sivarajah U, Kamal MM, Irani Z, Weerakkody V. Critical analysis of big data challenges and analytical methods. J Bus Res. 2017;70:263–86.CrossRef
40.
go back to reference Malaka I, Brown I. Challenges to the organisational adoption of big data analytics : a case study in the South African telecommunications industry. In: Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists. 2015; p. 27. Malaka I, Brown I. Challenges to the organisational adoption of big data analytics : a case study in the South African telecommunications industry. In: Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists. 2015; p. 27.
41.
go back to reference Nejati M, Rabiei S, Chiappetta Jabbour CJ. Envisioning the invisible: understanding the synergy between green human resource management and green supply chain management in manufacturing firms in Iran in light of the moderating effect of employees’ resistance to change. J Clean Prod. 2017;168:163–72.CrossRef Nejati M, Rabiei S, Chiappetta Jabbour CJ. Envisioning the invisible: understanding the synergy between green human resource management and green supply chain management in manufacturing firms in Iran in light of the moderating effect of employees’ resistance to change. J Clean Prod. 2017;168:163–72.CrossRef
43.
go back to reference Reginato E, Fadda I, Paglietti P. The influence of resistance to change on public-sector reform implementation: the case of Italian municipalities’ internal control system. Int J Public Adm. 2016;39:989–99.CrossRef Reginato E, Fadda I, Paglietti P. The influence of resistance to change on public-sector reform implementation: the case of Italian municipalities’ internal control system. Int J Public Adm. 2016;39:989–99.CrossRef
45.
go back to reference Bates DW. Physicians and ambulatory electronic health records. Health Aff. 2005;24:1180–9.CrossRef Bates DW. Physicians and ambulatory electronic health records. Health Aff. 2005;24:1180–9.CrossRef
46.
go back to reference Bartos CE, Butler BS, Crowley RS. Ranked levels of influence model: selecting influence techniques to minimize IT resistance. J Biomed Inform. 2011;44:497–504.CrossRef Bartos CE, Butler BS, Crowley RS. Ranked levels of influence model: selecting influence techniques to minimize IT resistance. J Biomed Inform. 2011;44:497–504.CrossRef
47.
go back to reference Guo X, Sun Y, Wang N, Peng Z, Yan Z. The dark side of elderly acceptance of preventive mobile health services in China. Electron Mark. 2013;23:49–61.CrossRef Guo X, Sun Y, Wang N, Peng Z, Yan Z. The dark side of elderly acceptance of preventive mobile health services in China. Electron Mark. 2013;23:49–61.CrossRef
49.
go back to reference Yan X, Song T, Wu Q. An improved cultural algorithm and its application in image matching. Multimed Tools Appl. 2017;76:14951–68.CrossRef Yan X, Song T, Wu Q. An improved cultural algorithm and its application in image matching. Multimed Tools Appl. 2017;76:14951–68.CrossRef
50.
go back to reference Latif Z, Tunio MZ, Pathan ZH, Jianqiu Z, Ximei L, Sadozai SK. A review of policies concerning development of big data industry in Pakistan: Subtitle: Development of big data industry in Pakistan. In: 2018 international conference on computing, mathematics and engineering technologies (iCoMET), 2018; 2018; p. 1–5. Latif Z, Tunio MZ, Pathan ZH, Jianqiu Z, Ximei L, Sadozai SK. A review of policies concerning development of big data industry in Pakistan: Subtitle: Development of big data industry in Pakistan. In: 2018 international conference on computing, mathematics and engineering technologies (iCoMET), 2018; 2018; p. 1–5.
52.
go back to reference Tsai CW, Lai CF, Chao HC, Vasilakos AV. Big data analytics: a survey. J Big Data. 2015;2:21.CrossRef Tsai CW, Lai CF, Chao HC, Vasilakos AV. Big data analytics: a survey. J Big Data. 2015;2:21.CrossRef
53.
go back to reference Archenaa J, Anita EAM. A survey of big data analytics in healthcare and government. Procedia Comput Sci. 2015;50:408–13.CrossRef Archenaa J, Anita EAM. A survey of big data analytics in healthcare and government. Procedia Comput Sci. 2015;50:408–13.CrossRef
54.
go back to reference Soon KWK, Lee CA, Boursier P. A study of the determinants affecting adoption of big data using integrated technology acceptance model (TAM) and diffusion of innovation (DOI) in Malaysia. Int J Appl Bus Econ Res. 2016;14:17–47. Soon KWK, Lee CA, Boursier P. A study of the determinants affecting adoption of big data using integrated technology acceptance model (TAM) and diffusion of innovation (DOI) in Malaysia. Int J Appl Bus Econ Res. 2016;14:17–47.
55.
go back to reference LaBrie RC, Steinke GH, Li X, Cazier JA. Big data analytics sentiment: US-China reaction to data collection by business and government. Technol Forecast Soc Change. 2018;130:45–55.CrossRef LaBrie RC, Steinke GH, Li X, Cazier JA. Big data analytics sentiment: US-China reaction to data collection by business and government. Technol Forecast Soc Change. 2018;130:45–55.CrossRef
57.
go back to reference Weerakkody V, Kapoor K, Balta ME, Irani Z, Dwivedi YK. Factors influencing user acceptance of public sector big open data. Prod Plan Control. 2017;28:891–905.CrossRef Weerakkody V, Kapoor K, Balta ME, Irani Z, Dwivedi YK. Factors influencing user acceptance of public sector big open data. Prod Plan Control. 2017;28:891–905.CrossRef
58.
go back to reference Arunachalam D, Kumar N, Kawalek JP. Understanding big data analytics capabilities in supply chain management: unravelling the issues, challenges and implications for practice. Transp Res Part E Logist Transp Rev. 2018;114:416–36.CrossRef Arunachalam D, Kumar N, Kawalek JP. Understanding big data analytics capabilities in supply chain management: unravelling the issues, challenges and implications for practice. Transp Res Part E Logist Transp Rev. 2018;114:416–36.CrossRef
59.
go back to reference Gupta S, Kar AK, Baabdullah A, Al-Khowaiter WAA. Big data with cognitive computing: a review for the future. Int J Inf Manag. 2018;42:78–89.CrossRef Gupta S, Kar AK, Baabdullah A, Al-Khowaiter WAA. Big data with cognitive computing: a review for the future. Int J Inf Manag. 2018;42:78–89.CrossRef
62.
go back to reference Nguyen TD, Huynh PA. The roles of perceived risk and trust on e–payment adoption. In: International Econometric Conference of Vietnam. 2018; p. 926–40. Nguyen TD, Huynh PA. The roles of perceived risk and trust on e–payment adoption. In: International Econometric Conference of Vietnam. 2018; p. 926–40.
65.
go back to reference Kim KK, Prabhakar B, Park SK. Trust, perceived risk, and trusting behavior in internet banking. Asia Pacific J Inf Syst. 2009;19:1–23. Kim KK, Prabhakar B, Park SK. Trust, perceived risk, and trusting behavior in internet banking. Asia Pacific J Inf Syst. 2009;19:1–23.
68.
go back to reference Hartono E, Holsapple CW, Kim KY, Na KS, Simpson JT. Measuring perceived security in B2C electronic commerce website usage: a respecification and validation. Decis Support Syst. 2014;62:11–21.CrossRef Hartono E, Holsapple CW, Kim KY, Na KS, Simpson JT. Measuring perceived security in B2C electronic commerce website usage: a respecification and validation. Decis Support Syst. 2014;62:11–21.CrossRef
69.
go back to reference Mekovec R, Hutinski Ž. The role of perceived privacy and perceived security in online market. In: MIPRO, 2012 Proceedings of the 35th International Convention. 2012; p. 1883–8. Mekovec R, Hutinski Ž. The role of perceived privacy and perceived security in online market. In: MIPRO, 2012 Proceedings of the 35th International Convention. 2012; p. 1883–8.
70.
go back to reference Zandieh SO, Yoon-Flannery K, Kuperman GJ, Langsam DJ, Hyman D, Kaushal R. Challenges to EHR implementation in electronic- versus paper-based office practices. J Gen Intern Med. 2008;23:755–61.CrossRef Zandieh SO, Yoon-Flannery K, Kuperman GJ, Langsam DJ, Hyman D, Kaushal R. Challenges to EHR implementation in electronic- versus paper-based office practices. J Gen Intern Med. 2008;23:755–61.CrossRef
72.
go back to reference Broeders D, Schrijvers E, van der Sloot B, van Brakel R, de Hoog J, Hirsch Ballin E. Big Data and security policies: towards a framework for regulating the phases of analytics and use of big data. Comput Law Secur Rev. 2017;33:309–23.CrossRef Broeders D, Schrijvers E, van der Sloot B, van Brakel R, de Hoog J, Hirsch Ballin E. Big Data and security policies: towards a framework for regulating the phases of analytics and use of big data. Comput Law Secur Rev. 2017;33:309–23.CrossRef
73.
go back to reference Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. J Big Data. 2018;5:1.CrossRef Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. J Big Data. 2018;5:1.CrossRef
74.
go back to reference Lin TC, Huang CC. Understanding knowledge management system usage antecedents: an integration of social cognitive theory and task technology fit. Inf Manag. 2008;45:410–7.CrossRef Lin TC, Huang CC. Understanding knowledge management system usage antecedents: an integration of social cognitive theory and task technology fit. Inf Manag. 2008;45:410–7.CrossRef
75.
go back to reference D’Ambra J, Wilson CS, Akter S. Application of the task-technology fit model to structure and evaluate the adoption of e-books by academics. J Am Soc Inf Sci Technol. 2013;64:48–64.CrossRef D’Ambra J, Wilson CS, Akter S. Application of the task-technology fit model to structure and evaluate the adoption of e-books by academics. J Am Soc Inf Sci Technol. 2013;64:48–64.CrossRef
76.
go back to reference Aljukhadar M, Senecal S, Nantel J. Is more always better? Investigating the task-technology fit theory in an online user context. Inf Manag. 2014;51:391–7.CrossRef Aljukhadar M, Senecal S, Nantel J. Is more always better? Investigating the task-technology fit theory in an online user context. Inf Manag. 2014;51:391–7.CrossRef
77.
go back to reference Khan IU, Hameed Z, Yu Y, Islam T, Sheikh Z, Khan SU. Predicting the acceptance of MOOCs in a developing country: application of task-technology fit model, social motivation, and self-determination theory. Telemat Informat. 2018;35:964–78.CrossRef Khan IU, Hameed Z, Yu Y, Islam T, Sheikh Z, Khan SU. Predicting the acceptance of MOOCs in a developing country: application of task-technology fit model, social motivation, and self-determination theory. Telemat Informat. 2018;35:964–78.CrossRef
78.
go back to reference Klopping IM, Mckinney E. Extending the technology acceptance model and the task-technology fit model to consumer e-commerce. Inf Technol Learn Perform J. 2004;22:35–48. Klopping IM, Mckinney E. Extending the technology acceptance model and the task-technology fit model to consumer e-commerce. Inf Technol Learn Perform J. 2004;22:35–48.
81.
go back to reference Pagani M. Determinants of adoption of high speed data services in the business market: evidence for a combined technology acceptance model with task technology fit model. Inf Manag. 2006;43:847–60.CrossRef Pagani M. Determinants of adoption of high speed data services in the business market: evidence for a combined technology acceptance model with task technology fit model. Inf Manag. 2006;43:847–60.CrossRef
86.
go back to reference Gentry L, Calantone R. A comparison of three models to explain shop-bot use on the web. Psychol Mark. 2002;19:945–56.CrossRef Gentry L, Calantone R. A comparison of three models to explain shop-bot use on the web. Psychol Mark. 2002;19:945–56.CrossRef
89.
go back to reference Pei Y, Xue W, Su Y, Li D. Discussion on influence factors and evaluation of customer experience for B2C E-commerce enterprises. In: 2015 International Conference on Logistics, Informatics and Service Sciences (LISS), 2015. 2015. Pei Y, Xue W, Su Y, Li D. Discussion on influence factors and evaluation of customer experience for B2C E-commerce enterprises. In: 2015 International Conference on Logistics, Informatics and Service Sciences (LISS), 2015. 2015.
90.
go back to reference Prieto JCS, Migueláñez SO, García-Peñalvo FJ. ICTs integration in education: mobile learning and the technology acceptance model (TAM). In: Proceedings of the second international conference on technological ecosystems for enhancing multiculturality. 2014;683–7. https://doi.org/10.1145/2669711.2669974. Prieto JCS, Migueláñez SO, García-Peñalvo FJ. ICTs integration in education: mobile learning and the technology acceptance model (TAM). In: Proceedings of the second international conference on technological ecosystems for enhancing multiculturality. 2014;683–7. https://​doi.​org/​10.​1145/​2669711.​2669974.
94.
go back to reference Ambak K, Harun NE, Rosli N, Daniel BD, Prasetijo J, Abdullah ME, et al. Driver intention to use electric cars using technology acceptance model. ARPN J Eng Appl Sci. 2016;11:1–4. Ambak K, Harun NE, Rosli N, Daniel BD, Prasetijo J, Abdullah ME, et al. Driver intention to use electric cars using technology acceptance model. ARPN J Eng Appl Sci. 2016;11:1–4.
95.
go back to reference Claes V, Devriendt E, Tournoy J, Milisen K. Attitudes and perceptions of adults of 60 years and older towards in-home monitoring of the activities of daily living with contactless sensors: an explorative study. Int J Nurs Stud. 2015;52:134–48.CrossRef Claes V, Devriendt E, Tournoy J, Milisen K. Attitudes and perceptions of adults of 60 years and older towards in-home monitoring of the activities of daily living with contactless sensors: an explorative study. Int J Nurs Stud. 2015;52:134–48.CrossRef
96.
go back to reference Castañeda JA, Muñoz-Leiva F, Luque T. Web acceptance model (WAM): moderating effects of user experience. Inf Manag. 2007;44:384–96.CrossRef Castañeda JA, Muñoz-Leiva F, Luque T. Web acceptance model (WAM): moderating effects of user experience. Inf Manag. 2007;44:384–96.CrossRef
97.
go back to reference Brock C, Blut M, Linzmajer M, Zimmer B. F-commerce and the crucial role of trust. In: Thirty Second International Conference on Information Systems. 2011; p. 1–11. Brock C, Blut M, Linzmajer M, Zimmer B. F-commerce and the crucial role of trust. In: Thirty Second International Conference on Information Systems. 2011; p. 1–11.
98.
go back to reference Venkatesh V, Morris MG, Davis GB, Davis FD. User acceptance of information technology: toward a unified view. MIS Q. 2003;27:425–78.CrossRef Venkatesh V, Morris MG, Davis GB, Davis FD. User acceptance of information technology: toward a unified view. MIS Q. 2003;27:425–78.CrossRef
102.
go back to reference Oreg S. Resistance to change: developing an individual differences measure. J Appl Psychol. 2003;88:680–93.CrossRef Oreg S. Resistance to change: developing an individual differences measure. J Appl Psychol. 2003;88:680–93.CrossRef
103.
go back to reference Venkatesh V, Morris M, Ackerman P. A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organ Behav Hum Decis Process. 2000;83:33–60.CrossRef Venkatesh V, Morris M, Ackerman P. A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organ Behav Hum Decis Process. 2000;83:33–60.CrossRef
104.
go back to reference Huang RT. Exploring the moderating role of self-management of learning in mobile english learning. Educ Technol Soc. 2014;17:255–67. Huang RT. Exploring the moderating role of self-management of learning in mobile english learning. Educ Technol Soc. 2014;17:255–67.
106.
go back to reference Nov O, Ye C. Users’ personality and perceived ease of use of digital libraries: the case for resistance to change. J Am Soc Inf Sci Technol. 2008;59:845–51.CrossRef Nov O, Ye C. Users’ personality and perceived ease of use of digital libraries: the case for resistance to change. J Am Soc Inf Sci Technol. 2008;59:845–51.CrossRef
108.
go back to reference Nov O, Ye C. Resistance to change and the adoption of digital libraries: an integrative model. J Am Soc Inf Sci Technol. 2009;60:1702–8.CrossRef Nov O, Ye C. Resistance to change and the adoption of digital libraries: an integrative model. J Am Soc Inf Sci Technol. 2009;60:1702–8.CrossRef
110.
go back to reference Ford EW, Menachemi N, Peterson LT, Huerta TR. Resistance is futile: but it is slowing the pace of EHR adoption nonetheless. J Am Med Informat Assoc. 2009;16:274–81.CrossRef Ford EW, Menachemi N, Peterson LT, Huerta TR. Resistance is futile: but it is slowing the pace of EHR adoption nonetheless. J Am Med Informat Assoc. 2009;16:274–81.CrossRef
111.
go back to reference Bhattacherjee A, Hikmet N. Physicians’ resistance toward healthcare information technology: a theoretical model and empirical test. Eur J Inf Syst. 2007;16:725–37.CrossRef Bhattacherjee A, Hikmet N. Physicians’ resistance toward healthcare information technology: a theoretical model and empirical test. Eur J Inf Syst. 2007;16:725–37.CrossRef
113.
go back to reference Alkraiji A, Jackson T, Murray I. Barriers to the widespread adoption of health data standards: an exploratory qualitative study in tertiary healthcare organizations in Saudi Arabia. J Med Syst. 2013;37:9895.CrossRef Alkraiji A, Jackson T, Murray I. Barriers to the widespread adoption of health data standards: an exploratory qualitative study in tertiary healthcare organizations in Saudi Arabia. J Med Syst. 2013;37:9895.CrossRef
114.
go back to reference Jang SH, Kim RH, Lee CW. Effect of u-healthcare service quality on usage intention in a healthcare service. Technol Forecast Soc Change. 2016;113:396–403.CrossRef Jang SH, Kim RH, Lee CW. Effect of u-healthcare service quality on usage intention in a healthcare service. Technol Forecast Soc Change. 2016;113:396–403.CrossRef
115.
go back to reference Newsted PR, Huff SL, Munro MC. Survey instruments in information systems. MIS Q. 1998;22:553.CrossRef Newsted PR, Huff SL, Munro MC. Survey instruments in information systems. MIS Q. 1998;22:553.CrossRef
118.
go back to reference Liu H, Chu H, Huang Q, Chen X. Enhancing the flow experience of consumers in China through interpersonal interaction in social commerce. Comput Human Behav. 2016;58:306–14.CrossRef Liu H, Chu H, Huang Q, Chen X. Enhancing the flow experience of consumers in China through interpersonal interaction in social commerce. Comput Human Behav. 2016;58:306–14.CrossRef
122.
go back to reference Podsakoff PM, MacKenzie SB, Lee JY, Podsakoff NP. Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Psychol. 2003;88:879–903.CrossRef Podsakoff PM, MacKenzie SB, Lee JY, Podsakoff NP. Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Psychol. 2003;88:879–903.CrossRef
123.
go back to reference Flynn B. Empirical research methods in operations management. J Oper Manag. 1990;9:250–84.CrossRef Flynn B. Empirical research methods in operations management. J Oper Manag. 1990;9:250–84.CrossRef
124.
go back to reference Hair JF, Anderson RE, Tatham RL, Black WC. Multivariate data analysis with readings. 5th ed. Prentice-Hill: Up. Saddle River; 1998. Hair JF, Anderson RE, Tatham RL, Black WC. Multivariate data analysis with readings. 5th ed. Prentice-Hill: Up. Saddle River; 1998.
126.
go back to reference Hair JF, Black WC, Babin BJ, Anderson RE. Multivariate data analysis. Vectors. Upper Saddle River: Prentice Hall; 2010. p. 816. Hair JF, Black WC, Babin BJ, Anderson RE. Multivariate data analysis. Vectors. Upper Saddle River: Prentice Hall; 2010. p. 816.
127.
go back to reference Afshan S, Sharif A. Acceptance of mobile banking framework in Pakistan. Telemat Inform. 2016;33:370–87.CrossRef Afshan S, Sharif A. Acceptance of mobile banking framework in Pakistan. Telemat Inform. 2016;33:370–87.CrossRef
Metadata
Title
Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change
Authors
Muhammad Shahbaz
Changyuan Gao
LiLi Zhai
Fakhar Shahzad
Yanling Hu
Publication date
01-12-2019
Publisher
Springer International Publishing
Published in
Journal of Big Data / Issue 1/2019
Electronic ISSN: 2196-1115
DOI
https://doi.org/10.1186/s40537-019-0170-y

Other articles of this Issue 1/2019

Journal of Big Data 1/2019 Go to the issue

Premium Partner