2 research outputs found

    Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records

    Get PDF
    Some policymakers argue that consumers need legal protection of their privacy before they adopt interactive technologies. Others contend that privacy regulations impose costs that deter adoption. We contribute to this growing debate by quantifying the effect of state privacy regulation on the diffusion of Electronic Medical Record technology (EMR). EMR allows medical providers to store and exchange patient information using computers rather than paper records. Hospitals may not adopt EMR if patients feel their privacy is not safeguarded by regulation. Alternatively, privacy protection may inhibit adoption if hospitals cannot benefit from exchanging patient information with one another. In the US, medical privacy laws that restrict the ability of hospitals to disclose patient information vary across time and across states. We exploit this variation to explore how privacy laws affect whether hospitals adopt EMR. Our results suggest that inhibition of EMR's network benefits reduces hospital adoption by up to 25 percent. We find similar evidence when we control for the endogeneity of state laws using variation in signups to the 'Do Not Call' list

    System Size, Lock-in and Network Effects for Patient Records

    Get PDF
    We examine empirically whether the size of a firm using a network affects the scope of its network usage, and consequently network effects and lock-in within the network. We use the example of hospital information exchange. We find that hospitals in larger hospital systems are more likely to exchange electronic patient information only within their system and less likely to exchange patient information externally. We show that hospitals are also more likely to exchange information externally if others hospitals also do so. This implies that the disinclination of large hospital systems to exchange data externally harms overall levels of network use. Our results highlight that makers of technology policy designed to encourage the optimal use of networks should consider regulating the behavior of network users as well as technology vendors
    corecore