2019
DOI: 10.1016/j.ijinfomgt.2019.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Context matters: A review of the determinant factors in the decision to adopt cloud computing in healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
35
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 69 publications
(39 citation statements)
references
References 110 publications
2
35
0
2
Order By: Relevance
“…Currently, although the healthcare industry is aggressively implementing cloud computing applications [ 19 , 20 , 21 ], a proper structure to evaluate the effectiveness of their adoption in the marketplace has received little attention. To satisfy these research gaps, this paper proposed a combined multicriteria decision making (MCDM) model to build an influential relations map (IRM) that combines DEMATEL (decision-making trial and evaluation laboratory) and DANP (DEMATEL-based Analytic Network Process) to investigate the influence weights of factors.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, although the healthcare industry is aggressively implementing cloud computing applications [ 19 , 20 , 21 ], a proper structure to evaluate the effectiveness of their adoption in the marketplace has received little attention. To satisfy these research gaps, this paper proposed a combined multicriteria decision making (MCDM) model to build an influential relations map (IRM) that combines DEMATEL (decision-making trial and evaluation laboratory) and DANP (DEMATEL-based Analytic Network Process) to investigate the influence weights of factors.…”
Section: Introductionmentioning
confidence: 99%
“…Concerning healthcare organizations, CC is accompanied by many challenges, particularly the management, technology, security, and legal aspects [41] [42]. In addition, the use of cloud encourages dependence on the Internet because it must have a network to access it [1].…”
Section: Discussionmentioning
confidence: 99%
“…With more and more sensitive information sharing among enterprise employees, preserving data integrity and guaranteeing access control for only authorized users to access the data has become the core security problem. Therefore, security problems of data sharing in cloud mainly focus on access control and data integrity [10][11][12][13][14]. At present, data sharing schemes mainly employ access control mechanism to achieve authorized access.…”
Section: The Related Workmentioning
confidence: 99%