Skip to main content
Log in

Why do in-patients conceal hospitalization information?: an analysis based on association rule mining

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

As information technology rapidly advances, digitized personal information is becoming more accessible. However, the increasing likelihood of data breaches has negatively aroused privacy concerns that may even affect individuals’ health. This study aims to identify contributory factors to the overall divulgence of personal medical information within a majority of healthcare contexts. Study data collected between 2018 and 2019 is from 3,170 eligible in-patients at a medical center in southern Taiwan who requested concealment of their recorded hospitalization information. By utilizing association rule mining, this study uncovers those factors contributing to in-patients’ privacy concerns. Association rule mining yields six rules that are associated with in-patients’ requests to conceal personal information at the time of hospitalization. These rules include (1) female gender; (2) accompanied when at home; (3) undergoing procedures during hospitalization; (4) severe illness or injury; (5) admission to a general medicine ward; and (6) procedures applied during hospitalization and accompanied when at home. The findings of this study suggest that healthcare facilities should pay special attention to those factors that may raise patients’ privacy concerns and should plan effective corresponding privacy protection policies to meet those concerns. Healthcare facilities must convey these privacy protection policies to patients via a range of digital channels. In this way, healthcare facilities can implement practical measures relating to patient perceptions in order to improve quality healthcare provision.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Due to ethical considerations, supporting data is not available.

References

  1. Street AF, Love A (2005) Dimensions of privacy in palliative care: views of health professionals. Soc Sci Med 60(8):1795–1804

    Google Scholar 

  2. Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4(5):193–220

    Google Scholar 

  3. Westin AF (1967) Privacy and freedom. Atheneum Publishers, New York

    Google Scholar 

  4. Van Slyke C et al (2006) Concern for information privacy and online consumer purchasing. J Assoc Inform Syst 7(6):6

    Google Scholar 

  5. Caine K, Hanania R (2013) Patients want granular privacy control over health information in electronic medical records. J Am Med Inform Assoc 20(1):7–15

    Google Scholar 

  6. Kuo K-M, Ma C-C, Alexander JW (2014) How do patients respond to violation of their information privacy? Health Inform Manage J 43(2):23–33

    Google Scholar 

  7. Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35(4):980–1016

    Google Scholar 

  8. Smith HJ, Milburg SJ, Burke SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20(2):167–196

    Google Scholar 

  9. Chen J, Zhang Y, Heath R (2001) An exploratory investigation of the relationships between consumer characteristics and information privacy. Mark Manage J 11(1):73–81

    Google Scholar 

  10. Fox G, James TL (2021) Toward an understanding of the antecedents to health information privacy concern: a mixed methods study. Inform Syst Front 23(6):1537–1562

    Google Scholar 

  11. Hoy MG, Milne G (2010) Gender differences in privacy-related measures for young adult Facebook users. J Interact Advert 10(2):28–45

    Google Scholar 

  12. Janda S, Fair LL (2004) Exploring consumer concerns related to the internet. J Internet Commer 3(1):1–21

    Google Scholar 

  13. Joinson AN et al (2010) Privacy, trust, and self-disclosure online. Human–Computer Interact 25(1):1–24

    Google Scholar 

  14. Kuo F-Y, Lin C, Hsu M-H (2007) Assessing gender differences in computer professionals’ self-regulatory efficacy concerning information privacy practices. J Bus Ethics 73(2):145–160

    Google Scholar 

  15. Laric MV, Pitta DA, Katsanis LP (2009) Consumer concerns for healthcare information privacy: a comparison of US and Canadian perspectives. Res Healthc Financ Manage 12(1):93–111

    Google Scholar 

  16. Sheehan KB (2002) Toward a typology of Internet users and online privacy concerns. Inform Soc 18(1):21–32

    MathSciNet  Google Scholar 

  17. Youn S, Hall K (2008) Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors. Cyberpsychol Behav 11(6):763–765

    Google Scholar 

  18. Zukowski T, Brown I (2007) Examining the influence of demographic factors on internet users’ information privacy concerns. In: The Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries. ACM, Port Elizabeth

  19. Bélanger F, Crossler RE (2011) Privacy in the Digital Age: a review of information privacy research in Information systems. MIS Q 35(4):1017–1041

    Google Scholar 

  20. Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun Assoc Inform Syst 28:28

    Google Scholar 

  21. Schopp A et al (2003) Perceptions of privacy in the care of Elderly people in five European countries. Nurs Ethics 10(1):39–47

    Google Scholar 

  22. Bansal G, Zahedi FM, Gefen D (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst 49(2):138–150

    Google Scholar 

  23. Lee H et al (2015) Compensation paradox: the influence of monetary rewards on user behaviour. Behav Inform Technol 34(1):45–56

    MathSciNet  Google Scholar 

  24. Lwin M, Wirtz J, Williams JD (2007) Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. J Acad Mark Sci 35(4):572–585

    Google Scholar 

  25. Rohm AJ, Milne GR (2004) Just what the doctor ordered: the role of information sensitivity and trust in reducing medical information privacy concern. J Bus Res 57(9):1000–1011

    Google Scholar 

  26. Xun L, Radhika S (2008) Will it be disclosure or fabrication of personal information? An examination of persuasion strategies on prospective employees. Int J Inform Secur Priv 2(4):91–113

    Google Scholar 

  27. Bromwich M, Bromwich R (2016) Privacy risks when using mobile devices in health care. Can Med Assoc J 188(12):855–856

    Google Scholar 

  28. Yüksel B, Küpçü A, Özkasap Ö (2017) Research issues for privacy and security of electronic health services. Future Gener Comput Syst 68:1–13

    Google Scholar 

  29. Goldstein MM (2014). Health information privacy and health information technology in the us correctional setting. American Journal of Public Health, 104(5), 803–809. https://doi.org/10.2105/AJPH.2013.301845

  30. Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018) Big healthcare data: preserving security and privacy. J Big Data 5(1):1

    Google Scholar 

  31. Yadav P et al (2018) Mining Electronic Health Records (EHRs): a survey. ACM Comput Surv 50(6):1–40

    Google Scholar 

  32. Pinsonneault A, Kraemer KL (1993) Survey research methodology in management information systems: an assessment. J Manage Inform Syst 10(2):75–106

    Google Scholar 

  33. Werner S, Praxedes M, Kim H-G (2007) The reporting of nonresponse analyses in survey research. Organ Res Methods 10(2):287–295

    Google Scholar 

  34. Barbie E (2021) The practice of social research, 15th edn. Cengage, Boston

    Google Scholar 

  35. Telikani A et al (2020) Privacy-preserving in association rule mining using an improved discrete binary artificial bee colony. Expert Syst Appl 144:113097

    Google Scholar 

  36. Tran DT, Huh J-H (2023) Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm. J Supercomputing 79(11):12691–12736

    Google Scholar 

  37. Hwang H-G et al (2012) The differing privacy concerns regarding exchanging Electronic Medical records of internet users in Taiwan. J Med Syst 36(6):3783–3793

    Google Scholar 

  38. Steijn W, Schouten A, Vedder A (2016) Why concern regarding privacy differs: the influence of age and (non-) participation on Facebook. Cyberpsychol-J Psychosocial Res Cyberspace 10(1):1

    Google Scholar 

  39. Kordzadeh N, Warren J, Seifi A (2016) Antecedents of privacy calculus components in virtual health communities. Int J Inf Manag 36(5):724–734

    Google Scholar 

  40. Tanantaputra J (2017) Influence of individual factors on concern for information privacy (CFIP), a perspective from Malaysian higher educational students. Libr Rev 66(4/5):182–200

    Google Scholar 

  41. Agaku IT et al (2014) Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. J Am Med Inform Assoc 21(2):374–378

    Google Scholar 

  42. Saxena S (2018) Role of perceived risks in adopting mobile government (m-government) services in India. Foresight 20(2):190–205

    Google Scholar 

  43. Malhotra NK, Kim SS, Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform Syst Res 15(4):336–355

    Google Scholar 

  44. Britto MT, Tivorsak TL, Slap GB (2010) Adolescents’ needs for health care privacy. Pediatrics 126(6):e1469–e1476

    Google Scholar 

  45. King T, Brankovic L, Gillard P (2012) Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. Int J Med Informatics 81(4):279–289

    Google Scholar 

  46. Clerkin P et al (2013) Patients’ views about the use of their personal information from general practice medical records in health research: a qualitative study in Ireland. Fam Pract 30(1):105–112

    Google Scholar 

  47. Andriole KP (2014) Security of electronic medical information and patient privacy: What You Need to Know. J Am Coll Radiol 11(12, Part B):1212–1216

    Google Scholar 

  48. Kim K, Han Y, Kim J-s (2016) Nurses’ and patients’ perceptions of privacy protection behaviours and information provision. Nurs Ethics 24(5):598–611

    Google Scholar 

  49. Lu Y, Cai H, Bosch SJ (2016) Key spatial factors influencing the perceived privacy in nursing units: an exploration study with eight nursing units in Hong Kong. HERD: Health Environ Res Des J 10(4):37–48

    Google Scholar 

  50. Dilauro M, Thornhill R, Fasih N (2016) How well are we respecting patient privacy in Medical Imaging? Lessons Learnt from a departmental audit. Can Assoc Radiol J 67(4):339–344

    Google Scholar 

  51. Nayeri ND, Aghajani M (2010) Patients’ privacy and satisfaction in the emergency department: a descriptive analytical study. Nurs Ethics 17(2):167–177

    Google Scholar 

  52. Yaraghi N, Gopal RD, Ramesh R (2019) Doctors’ orders or patients’ preferences? Examining the role of Physicians in patients’ privacy decisions on Health Information Exchange platforms. J Assoc Inform Syst 20(7):14

    Google Scholar 

  53. Abdelhamid M, Gaia J, Sanders LG (2017) Putting the Focus Back on the patient: how privacy concerns affect Personal Health Information sharing intentions. J Med Internet Res 19(9):e169

    Google Scholar 

  54. Brown SM et al (2016) Balancing digital information-sharing and patient privacy when engaging families in the intensive care unit. J Am Med Inform Assoc 23(5):995–1000

    Google Scholar 

  55. Lantz B (2015) Machine learning with R, 2nd edn. Packt Publishing Ltd, Birmingham

    Google Scholar 

  56. Provost F, Fawcett T (2013) Data science for business: what you need to know about data mining and data-analytic thinking, 2nd edn. O’Reilly Media, Inc, Sebastopol

    Google Scholar 

  57. Han J, Pei J, Tong H (2022) Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann, San Francisco

    Google Scholar 

  58. Tandan M et al (2021) Discovering symptom patterns of COVID-19 patients using association rule mining. Comput Biol Med 131:104249

    Google Scholar 

  59. Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In: 20th International Conference on Very Large Databases. Morgan Kaufmann, San Francisco

  60. Patil BM, Joshi RC, Toshniwal D (2010) Association rule for classification of type-2 diabetic patients. In: 2010 Second International Conference on Machine Learning and Computing (ICMLC). IEEE, Bangalore

  61. Huang YC (2013) The application of data mining to explore association rules between metabolic syndrome and lifestyles. Health Inform Manage J 42(3):29–36

    Google Scholar 

  62. Lee DG et al (2013) Discovering medical knowledge using Association Rule Mining in Young adults with Acute myocardial infarction. J Med Syst 37(2):9896

    Google Scholar 

  63. Agrawal R, Imielinski T, Swami A (1993) Database mining: a performance perspective. IEEE Trans Knowl Data Eng 5(6):914–925

    Google Scholar 

  64. Core Team R (2023) R: a language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria

    Google Scholar 

  65. Van Rossum G, Drake FL (2009) Python 3 reference Manual. CreateSpace, Scotts Valley

    Google Scholar 

  66. Raschka S (2018) MLxtend: providing machine learning and data science utilities and extensions to Python’s Scientific Computing Stack. J Open Source Softw 3(24):638

    Google Scholar 

  67. Belyi E et al (2016) Combining association rule mining and network analysis for pharmacosurveillance. J Supercomputing 72(5):2014–2034

    Google Scholar 

  68. Janda S (2008) Does gender moderate the effect of online concerns on Purchase Likelihood? J Internet Commer 7(3):339–358

    Google Scholar 

  69. Beisecker AE (1989) The influence of a companion on the Doctor-Elderly Patient Interaction. Health Commun 1(1):55–70

    Google Scholar 

  70. Sheeran P et al (2016) The impact of changing attitudes, norms, and self-efficacy on health-related intentions and behavior: a meta-analysis. Health Psychol 35(11):1178–1188

    Google Scholar 

  71. Gong Z et al (2019) Factors influencing the adoption of online health consultation services: the role of subjective norm, trust, perceived benefit, and offline habit. Front Public Health 7:286

    Google Scholar 

  72. Kaushik K, Jain NK, Singh AK (2018) Antecedents and outcomes of information privacy concerns: role of subjective norm and social presence. Electron Commer Res Appl 32:57–68

    Google Scholar 

  73. Whitehead J, Wheeler H (2008) Patients’ experiences of privacy and dignity. Part 1: a literature review. Br J Nurs 17(6):381–385

    Google Scholar 

  74. Akyüz E, Erdemir F (2013) Surgical patients’ and nurses’ opinions and expectations about privacy in care. Nurs Ethics 20(6):660–671

    Google Scholar 

  75. Courtenay-Quirk C et al (2010) Perceptions of HIV-Related websites among persons recently diagnosed with HIV. AIDS Patient Care STDs 24(2):105–115

    Google Scholar 

  76. Horvath KJ et al (2012) Technology Use and reasons to participate in social networking Health websites among people living with HIV in the US. AIDS Behav 16(4):900–910

    Google Scholar 

  77. Kezer M et al. (2016) Age differences in privacy attitudes, literacy and privacy management on Facebook Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(1): 2.

    Google Scholar 

Download references

Funding

This study has been supported by the Ministry of Science and Technology, Taiwan, under grant number MOST-109-2410-H-239-017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tain-Junn Cheng.

Ethics declarations

Competing interests

The authors have no conflicts of interest to report.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kuo, KM., Talley, P.C. & Cheng, TJ. Why do in-patients conceal hospitalization information?: an analysis based on association rule mining. Multimed Tools Appl 83, 80799–80821 (2024). https://doi.org/10.1007/s11042-024-18743-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-024-18743-6

Keywords