<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR Human Factors</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Hum Factors</journal-id>
      <journal-title>JMIR Human Factors</journal-title>
      <issn pub-type="epub">2292-9495</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v9i2e33951</article-id>
      <article-id pub-id-type="pmid">35699973</article-id>
      <article-id pub-id-type="doi">10.2196/33951</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Modeling Trust in COVID-19 Contact-Tracing Apps Using the Human-Computer Trust Scale: Online Survey Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Kushniruk</surname>
            <given-names>Andre</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Tannoubi</surname>
            <given-names>Amayra</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Maaß</surname>
            <given-names>Laura</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Sousa</surname>
            <given-names>Sonia</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Digital Technologies</institution>
            <institution>Tallinn University</institution>
            <addr-line>Narva mnt, 29</addr-line>
            <addr-line>Tallinn, 10120</addr-line>
            <country>Estonia</country>
            <phone>372 53921116</phone>
            <email>scs@tlu.ee</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5865-1389</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Kalju</surname>
            <given-names>Tiina</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0973-7458</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Digital Technologies</institution>
        <institution>Tallinn University</institution>
        <addr-line>Tallinn</addr-line>
        <country>Estonia</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Institute for Systems and Computer Engineering, Technology and Science</institution>
        <institution>University of Trás-os-Montes and Alto Douro</institution>
        <addr-line>Vila Real</addr-line>
        <country>Portugal</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Sonia Sousa <email>scs@tlu.ee</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <season>Apr-Jun</season>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>13</day>
        <month>6</month>
        <year>2022</year>
      </pub-date>
      <volume>9</volume>
      <issue>2</issue>
      <elocation-id>e33951</elocation-id>
      <history>
        <date date-type="received">
          <day>30</day>
          <month>9</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>7</day>
          <month>11</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>20</day>
          <month>2</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>19</day>
          <month>4</month>
          <year>2022</year>
        </date>
      </history>
      <copyright-statement>©Sonia Sousa, Tiina Kalju. Originally published in JMIR Human Factors (https://humanfactors.jmir.org), 13.06.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Human Factors, is properly cited. The complete bibliographic information, a link to the original publication on https://humanfactors.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://humanfactors.jmir.org/2022/2/e33951" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The COVID-19 pandemic has caused changes in technology use worldwide, both socially and economically. This pandemic crisis has brought additional measures such as contact-tracing apps (CTAs) to help fight against spread of the virus. Unfortunately, the low adoption rate of these apps affected their success. There could be many reasons for the low adoption, including concerns of security and privacy, along with reported issues of trust in CTAs. Some concerns are related with how CTAs could be used as surveillance tools or their potential threats to privacy as they involve health data. For example, in Estonia, the CTA named HOIA had approximately 250,000 downloads in the middle of January 2021. However, in 2021, only 4.7% of the population used HOIA as a COVID-19 CTA. The reasons for the low adoption include lack of competency, and privacy and security concerns. This lower adoption and the lack of trustworthiness persist despite efforts of the European Union in building ethics and trustworthy artificial intelligence (AI)-based apps.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this study was to understand how to measure trust in health technologies. Specifically, we assessed the usefulness of the Human-Computer Trust Scale (HCTS) to measure Estonians’ trust in the HOIA app and the causes for this lack of trust.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The main research question was: Can the HCTS be used to assess citizens’ perception of trust in health technologies? We established four hypotheses that were tested with a survey. We used a convenience sample for data collection, including sharing the questionnaire on social network sites and using the snowball method to reach all potential HOIA users in the Estonian population.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Among the 78 respondents, 61 had downloaded the HOIA app with data on usage patterns. However, 20 of those who downloaded the app admitted that it was never opened despite most claiming to regularly use mobile apps. The main reasons included not understanding how it works, and privacy and security concerns. Significant correlations were found between participants’ trust in CTAs in general and their perceived trust in the HOIA app regarding three attributes: competency (<italic>P</italic>&#60;.001), risk perception (<italic>P</italic>&#60;.001), and reciprocity (<italic>P</italic>=.01).</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study shows that trust in the HOIA app among Estonian residents did affect their predisposition to use the app. Participants did not generally believe that HOIA could help to control the spread of the virus. The result of this work is limited to HOIA and health apps that use similar contact-tracing methods. However, the findings can contribute to gaining a broader understanding and awareness of the need for designing trustworthy technologies. Moreover, this work can help to provide design recommendations that ensure trustworthiness in CTAs, and the ability of AI to use highly sensitive data and serve society.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>human-computer interaction</kwd>
        <kwd>COVID-19</kwd>
        <kwd>human factors</kwd>
        <kwd>trustworthy AI</kwd>
        <kwd>contact-tracing</kwd>
        <kwd>app</kwd>
        <kwd>safety</kwd>
        <kwd>trust</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>Estonia</kwd>
        <kwd>case study</kwd>
        <kwd>monitoring</kwd>
        <kwd>surveillance</kwd>
        <kwd>perspective</kwd>
        <kwd>awareness</kwd>
        <kwd>design</kwd>
        <kwd>covid</kwd>
        <kwd>mobile app</kwd>
        <kwd>mHealth</kwd>
        <kwd>mobile health</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The COVID-19 pandemic has changed how we view technology as a resource to stop the spread of disease. To address the need to control the spread of the virus, many governments and public health authorities worldwide have launched several technological initiatives, including the development of artificial intelligence (AI) contact-tracing mobile apps (CTAs). As a result, by the end of 2020, there were more than 50 CTAs available in both Google Play and iOS App Store [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. According to Nguyen et al [<xref ref-type="bibr" rid="ref3">3</xref>], security and privacy are crucial in designing AI-based CTA technologies. If users perceive CTAs as a threat to their privacy, this might affect their predisposition to use the app, ultimately affecting its adoption rate and tool effectiveness. This evidence has led to an increased discourse for design systems toward focusing on ensuring that CTAs are secure and private. Previous studies have recommended several criteria such as ensuring a low level of complexity of the security feature so that it is easy to use and understandable for the general population [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>], visibility and interaction from the user, and unambiguous and clear messages to follow while designing security measures [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. Similar arguments were put forth in Europe’s stated goals to ensure ethical and responsible technological development. Although COVID-19 CTAs in Europe followed the General Data Protection Regulation and ISO/IEC 27001 [<xref ref-type="bibr" rid="ref9">9</xref>] regulations, and were also designed in consideration of current AI principles to regulate technology use (ie, Ethical guidelines for Trustworthy AI [<xref ref-type="bibr" rid="ref10">10</xref>]), this was not sufficient to ensure the trustworthiness from citizens. This lack of trustworthiness exists despite widely available information on how these technologies were built with transparent and ethical principles in mind. Moreover, despite government initiatives to push through their adoption, the download rates and actual usage rates of these apps remained low [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref11">11</xref>-<xref ref-type="bibr" rid="ref13">13</xref>]. One reason for this low adoption might be that security and privacy in computer science are still mainly approached from a technical perspective [<xref ref-type="bibr" rid="ref14">14</xref>]. Privacy attributes in technology can be more profound and complex than technical qualities. Privacy is defined as a person’s control over the information that is manipulated and communicated to others [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref18">18</xref>].</p>
        <p>Privacy also includes interpersonal characteristics such as the perception of privacy, system honesty or benevolence communication, and shared control to minimize associated risk and uncertainty. For instance, despite appropriate regulations and principles being considered when designing Estonia’s COVID-19 CTA (HOIA), the adoption of HOIA by citizens did not increase. The critical reasons for the low adoption of HOIA included lack of effectiveness (10%) and concerns of security and privacy (19%) according to a survey initiated by The Ministry of Social Affairs, surveying 92% of Estonian residents [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. Thus, all efforts made in designing AI-based transparent and ethically responsible CTAs that can prevent data misuse and ensure the development of responsible trustworthy AI interactions were unsuccessful.</p>
        <p>We believe that it is essential to find new ways to ensure incorporating trust values in the design of such apps that could lead to building more technological, socially responsible societies. One should expect trust to be increasingly in demand as a means of enduring the complexity of a future that technology will generate. The quality and depth of technology use are also significantly affected by users’ trust in the technology. Trust is defined according to the ability to determine who to trust, and represents the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref22">22</xref>].</p>
      </sec>
      <sec>
        <title>Research Gaps</title>
        <p>Prior research confirms that technology acceptance and adoption are affected by the level of trust users have in the technology [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref23">23</xref>]. However, evidence shows that designing trustworthy technologies is complex and needs to be better understood. Like privacy, trust is an interpersonal quality that is present in many moments of our daily lives, and is thus often considered unconsciously. Whether being conscious or unconscious of its existence, trust represents an important key of the relationships encountered in daily life, including interactions between humans and machines. Establishing a trustful relationship implies peoples’ permission to share knowledge, delegation, and cooperative actions [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. Thus, in addition to the current research challenge for ensuring that all ethical, privacy, and technical security requirements are considered [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref9">9</xref>], we argue that trust might be the reason why users do not feel comfortable using CTAs that depend on citizens’ data to function properly. If this is indeed the case, besides existing design regulations and principles, designers will also need mechanisms to analyze individuals’ perceived trustworthiness in AI apps. In this way, designers and other stakeholders can gain a deeper understanding of how individuals perceive the benefits of AI, and assess their predisposition to cooperate and be more willing to use the technologies. Thus, it is important to gauge the extent to which such AI data–driven technologies are perceived as trustworthy (ie, the gains of using CTAs are higher than the possible losses).</p>
        <p>There are three main rationales for the above argument. First, with the current culture of increased introduction and use of complex systems in our daily activities, researchers need to focus more on conceiving responsible human-computer interactions. Second, current paradigms supporting ethical and responsible design practices are insufficient to ensure technology trustworthiness. Third, a new human-machine interaction mechanism is needed to effectively evaluate users’ trust perceptions in technology (eg, assess users’ experience toward incorporated trust values). Namely, we propose new human-centered design frameworks and mechanisms to guide the design and technology evaluation process. Overall, in the past decade, human-computer interaction has contributed significantly toward improving the quality of living with technology. Consequently, regular individuals are getting more involved, engaged, and dependent on technology to achieve their goals. It is true that we no longer live without technology. Despite this, the above arguments indicate that we are entering a new era that depends on data to thrive. This symbiotic dependence of humans in systems abilities and of systems dependence in our data to provide meaningful information has increased the complexity of the technology provided. Consequently, we have become more reliant on trust to survive in these complex symbiotic relationships. This is clearly shown in how digital CTAs were affected by these symbiotic relationships. Most of these apps are collecting highly sensitive data from individuals, including where they have been and with whom they have been in contact.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Aims and Design</title>
        <p>This study builds on the prior work of Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>] and Sousa et al [<xref ref-type="bibr" rid="ref22">22</xref>], and is guided by one central research question: Can the Human-Computer Trust Scale (HCTS) be used to assess an individual’s perception of trust in health technologies? The main goal of this study was to propose a novel design evaluation mechanism to incorporate trust values in health care technologies, and make health care interventions and technologies more trustworthy and accepted. Namely, we used partial least-squares structural equation modeling (PLS-SEM) to empirically ascertain which attributes of the proposed scale (HCTS) hold in health care contexts and can be used as lenses to evaluate individuals’ trust predisposition to interact. The study was divided into two main stages: (1) adaptation and translation of the scale, and (2) measurement and validation of the questionnaire (HCTS).</p>
      </sec>
      <sec>
        <title>Theoretical Model</title>
        <p>The adopted theoretical model, the HCTS [<xref ref-type="bibr" rid="ref20">20</xref>], illustrates the multidimensional nature of trust, taking into account several attributes of trust, as shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>. This model was validated with statistical modeling techniques. The proposed attributes of the model were gathered from a systematic multidisciplinary literature review, combined with (1) a word elicitation study to capture a rich set of multidisciplinary notions encapsulating trust; (2) participatory design sessions and exploratory interviews with users to further identify antecedents of trust; (3) the unification of technology acceptance models [<xref ref-type="bibr" rid="ref22">22</xref>]; and (4) separate studies to ensure statistical certainty of the scale proposed: trust in Siri, trust in the Estonian electronic voting system, trust in futuristic scenarios, and trust in human-robot interaction [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. The final scale to measure trust consists of three main attributes: risk perception, competency, and benevolence. In line with the above findings and with the awareness that trust assessment is context- and culture-dependent, we assessed the validity of the scale to measure citizens’ trust attitudes in CTAs. To achieve our goal, we developed four sets of assumptions that might affect or predict a user’s trust when interacting with the HOIA app. The four hypotheses (H1-H4) established in regard to our main research question are outlined in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Human-computer trust model under investigation. H: Hypothesis.</p>
          </caption>
          <graphic xlink:href="humanfactors_v9i2e33951_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <boxed-text id="box1" position="float">
          <title>Hypotheses of the study.</title>
          <p>
            <bold>Hypothesis 1</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>There is a significant and positive association between risk perception in the HOIA app and general trust in HOIA. Risk perception is defined as <italic>the extent to which one party is willing to participate in a given action while considering the risk and incentives involved</italic>. Here, we assumed that the extent to which individuals are willing to participate in a given action (ie, to use HOIA) while considering that the risk and incentives involved are directly associated with their perception of technology trustworthiness: with a higher perceived risk, there will be less willingness to interact; with a lower perceived risk, users will be more willing to interact.</p>
            </list-item>
          </list>
          <p>
            <bold>Hypothesis 2</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>There is a significant and positive association between competence and general trust in HOIA. HOIA competence is defined as <italic>the ease of use associated with the use of a system in that it is perceived to perform its tasks accurately and correctly</italic>. Here, we assumed that an individual’s perception of a contact-tracing app as competent is based on its functionality, closely linked to the concept of usefulness of a system. Higher perceived competency indicates that participants perceived the tool to be capable of doing what is expected, be useful, and will help them achieve desired goals.</p>
            </list-item>
          </list>
          <p>
            <bold>Hypothesis 3</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>There is a significant and positive association between benevolence and general trust in HOIA. Benevolence is defined as a citizen’s <italic>perception that a particular system will act in their best interest and that most people using the system share similar social behaviors and values</italic>. Here, we assumed that an individual’s perception that a particular system will act in their best interest, and that most people using the system share similar social behaviors and values that a particular technology will provide. Higher perceptions of benevolence are associated with fewer risks and uncertainties in its use.</p>
            </list-item>
          </list>
          <p>
            <bold>Hypothesis 4</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>There is a significant and positive association between reciprocity and trust in HOIA use. The notion of reciprocity is understood as <italic>the degree to which an individual sees oneself as a part of a group</italic>. It is built on the principle of mutual benefit, feeling a sense of belonging, and feeling connected, based on the give-and-take principles associated with the notion of computers as social actors. Here, we assumed that a citizen’s perception of contact tracing apps is reciprocal based on the degree to which an individual sees oneself as a part of a group.</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Study Procedure</title>
        <sec>
          <title>Questionnaire</title>
          <p>We used a semistructured questionnaire to collect data. Before distributing the questionnaire, we adapted the original scale to the context and translated the content from English into Estonian. The translation and adaptation of the instrument followed the guidelines of the adaptation, translation, and validation process [<xref ref-type="bibr" rid="ref27">27</xref>]. The survey was designed based on the HCTS in the Estonian language and was administered during April 2021. The objective of this study was to build on prior works and empirically assess HCTS to ascertain which attributes of the model hold true in health user–technology interactions.</p>
          <p>The survey was created using both Lime Survey and Google Forms. During the pilot study, the feedback from the respondents was that the visual design of the Google Forms is less confusing; therefore, it was decided to adopt Google Forms as the final survey format.</p>
        </sec>
        <sec>
          <title>Stimuli</title>
          <p>To ensure that all participants understood the technical artefact in question and their perceptions of trust regarding similar experiences, we provided the official video that explains HOIA to the users as a stimulus, following the concept of technology probe and design fiction, also known as a vignette-based study in psychology.</p>
        </sec>
        <sec>
          <title>Recruitment</title>
          <p>The survey was carried out among the Estonian population, which was distributed online, mainly through Facebook and other social network groups available to the authors. A convenience sample was used in data collection because this enables reaching members of the population who are easily accessible, available, and willing to participate [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>This study complies with the basic ethical principles for the responsible conduct of research involving human subjects. Informed consent was requested from all participants, and authorization was obtained from the authors of the scale [<xref ref-type="bibr" rid="ref20">20</xref>] to carry out the contextual adaptation and validation of the scale. The study was approved by the Tallinn University Ethics committee on July 9th, 2021 (study name: “Survey on the dynamic trust relationships between technology, society and culture"; approval number: Taotlus nr 6-5.1/17).</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Participant Characteristics</title>
        <p>A total of 78 responses were obtained and used for data analyses; very few responses were excluded as all respondents fully completed the survey. The three excluded cases included answers leaning in majority toward neutral options. Data collected included the following information: demographics, usage patterns of mobile apps and HOIA, trust in HOIA (including risk perception, benevolence, competence, and general trust), and opinions about HOIA’s existing and additional functionalities. Among the 78 respondents, 73% (n=57) were women and only 27% (n=21) were men. Almost half of the respondents (36/78, 47%) were between the ages of 31-42 years and approximately one third (25/78, 32%) were 43-55 years old.</p>
      </sec>
      <sec>
        <title>HOIA Usage Patterns</title>
        <p>Among the 78 respondents, 61 had downloaded the HOIA CTA. Among them, the 47 women showed the highest rate of downloads compared with the 14 male respondents. Younger respondents (aged 18-30 years) had a higher number of downloads (88%), but they also represented the smallest sample. Slightly more than half of the participants (56%) admitted that they do not feel confident in how to use HOIA; this perception was more prominent among men (n=13). Twenty participants admitted that they had never opened the app, despite 61 claiming to use mobile apps daily.</p>
        <p>Among the 17 respondents who had not downloaded the HOIA app, the majority were men. The main reasons claimed by participants for not downloading HOIA included: do not understand how it works, and concerns about the privacy and security of their data. When asked what additional features they expect from the CTA, some mentioned the need to understand the benefits of using it actively. When asked about their most common activities on their mobile devices, 76 participants stated that they are used for communication, 66 stated social networking, 60 stated entertainment purposes, and 40 indicated uses related to health and well-being.</p>
      </sec>
      <sec>
        <title>Assessment of the Scale</title>
        <p>The HCTS under investigation includes five constructs: risk perception, competency, benevolence, reciprocity, and trust [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref26">26</xref>] (see <xref rid="figure1" ref-type="fig">Figure 1</xref>). Following the recommendation of Hair et al [<xref ref-type="bibr" rid="ref29">29</xref>], the minimum sample size needed to effectively perform a PLS-SEM for our study was calculated to be 40 (ie, 10 times the maximum number of arrowheads pointing at a latent variable in a PLS path model). This method was selected because measuring trust in technology is complex, including four constructs and model relationships in this case. The measures used in the study were adapted from Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>]. Their work models trust in technology with different studies, including trust in Siri using design fiction (future scenarios), the Estonian electronic voting service, and trust in human-robot interactions [<xref ref-type="bibr" rid="ref24">24</xref>]. Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>] measured risk perception using the concept of willingness and motivation developed through two independent studies [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. This study added two additional items created through Schoorman et al’s [<xref ref-type="bibr" rid="ref21">21</xref>] conceptualizations of trust. Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>] measured competency and reciprocity based on the methodology of Mcknight et al [<xref ref-type="bibr" rid="ref30">30</xref>], and measured benevolence based on adaptation of the prior work of Harwood and Garry [<xref ref-type="bibr" rid="ref31">31</xref>] and McKnight et al [<xref ref-type="bibr" rid="ref30">30</xref>]. The survey used a 7-point Likert scale to collect data, where 1 indicates strongly disagree and 7 indicates strongly agree. All of the items were positively worded except for the risk perception scale, which was adapted as a negatively worded statement and reversed before analyzing the data. The HCTS measures are summarized in <xref ref-type="boxed-text" rid="box2">Textbox 2</xref>.</p>
        <boxed-text id="box2" position="float">
          <title>Human-Computer Trust Scale measures.</title>
          <p>
            <bold>Risk perception</bold>
          </p>
          <p>RP1: I believe that there could be negative consequences from using HOIA</p>
          <p>RP2: I feel I must be cautious when using HOIA</p>
          <p>RP3: It is risky to interact with HOIA</p>
          <p>RP4: I feel unsafe to interact with HOIA</p>
          <p>RP5: I feel vulnerable when I interact with HOIA</p>
          <p>
            <bold>Competency</bold>
          </p>
          <p>COM1: I believe HOIA is competent and effective in identifying if I have been in close contact with a COVID-19–positive person</p>
          <p>COM2: I believe HOIA has all the functionalities I would expect from a COVID-19 contact-tracing system</p>
          <p>COM3: I believe that HOIA performs its role as a warning for close contacts with a COVID-19–positive person</p>
          <p>
            <bold>Reciprocity</bold>
          </p>
          <p>REC1: When I share something with HOIA, I expect to get back a knowledgeable and meaningful response</p>
          <p>REC2: When sharing something with HOIA I believe that I will get an answer</p>
          <p>
            <bold>Benevolence</bold>
          </p>
          <p>BEN1: I believe HOIA acts in my best interest</p>
          <p>BEN2: I believe that HOIA would do its best to help me if I need help</p>
          <p>BEN3: I believe that HOIA is interested in understanding my needs and preferences</p>
          <p>
            <bold>General trust</bold>
          </p>
          <p>GT1: When I use HOIA, I feel I can depend on it completely</p>
          <p>GT2: I can always rely on HOIA for guidance and assistance</p>
          <p>GT3: I can trust the information presented to me by HOIA</p>
        </boxed-text>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>We analyzed a total of 78 answers. All scales for analyzing data in our study were positively worded, except perceived risk, which was negatively worded. The first steps in the analyses involved assessing the reliability and validity of the HCTS to measure trust in HOIA. In this phase, we calculated if the items have good measurements of the latent construct [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. We discarded risk perception item 6 and competency item 4 because the loadings were below 0.5, and kept all loadings above their respective thresholds (&#62;0.5). <xref ref-type="table" rid="table1">Table 1</xref> and <xref rid="figure2" ref-type="fig">Figure 2</xref> demonstrate all items used in the analysis and their loadings.</p>
        <p>We further verified if the average variance extracted (AVE) was higher than 0.5; as shown in <xref ref-type="table" rid="table1">Table 1</xref>, all AVE values were &#62;0.5, demonstrating that the items have good convergent reliability [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Similarly, the composite reliability of all indicators was above &#62;0.7, showing adequate internal consistency. The Dillon-Goldstein ρ statistic, according to Hair et al [<xref ref-type="bibr" rid="ref29">29</xref>], is similar to Cronbach α but allows the indicator variables to have varying outer loadings, and should be higher than 0.7 (or &#62;0.6 in exploratory research). These values were above 0.7 for all items (<xref ref-type="table" rid="table1">Table 1</xref>), further demonstrating that the model is acceptable and has satisfactory internal consistency.</p>
        <p>The discriminant validity and cross-loading values obtained using the Fornell-Lacker criterion (<xref ref-type="table" rid="table2">Table 2</xref>) indicated that the validity of each construct is higher for itself than for each corresponding construct [<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Loadings, reliability, and validity of the measurement model.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="240"/>
            <col width="0"/>
            <col width="200"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="0"/>
            <col width="180"/>
            <col width="0"/>
            <col width="180"/>
            <thead>
              <tr valign="bottom">
                <td colspan="3">Items</td>
                <td>Loadings (&#62;0.5)</td>
                <td colspan="3">AVE<sup>a</sup> (&#62;0.5)</td>
                <td colspan="2">CR<sup>b</sup> (&#62;0.7)</td>
                <td colspan="2">Dillon-Goldstein ρ (&#62;0.7)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="5">
                  <bold>Benevolence</bold>
                </td>
                <td colspan="3">0.684</td>
                <td colspan="2">0.866</td>
                <td>0.787</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BEN1</td>
                <td colspan="2">0.780</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BEN2</td>
                <td colspan="2">0.905</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BEN3</td>
                <td colspan="2">0.791</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Competence</bold>
                </td>
                <td colspan="3">0.784</td>
                <td colspan="2">0.916</td>
                <td>0.864</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>COM1</td>
                <td colspan="2">0.887</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>COM2</td>
                <td colspan="2">0.904</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>COM3</td>
                <td colspan="2">0.865</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Reciprocity</bold>
                </td>
                <td colspan="3">0.773</td>
                <td colspan="2">0.872</td>
                <td>0.719</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>REC1</td>
                <td colspan="2">0.898</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>REC2</td>
                <td colspan="2">0.860</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Risk perception</bold>
                </td>
                <td colspan="3">0.504</td>
                <td colspan="2">0.835</td>
                <td>0.810</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP1</td>
                <td colspan="2">0.649</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP2</td>
                <td colspan="2">0.727</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP3</td>
                <td colspan="2">0.711</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP4</td>
                <td colspan="2">0.741</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP5</td>
                <td colspan="2">0.717</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Trust</bold>
                </td>
                <td colspan="3">0.622</td>
                <td colspan="2">0.830</td>
                <td>0.717</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>GT1</td>
                <td colspan="2">0.822</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>GT2</td>
                <td colspan="2">0.692</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>GT3</td>
                <td colspan="2">0.843</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>AVE: average variance extracted.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>CR: composite reliability.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Final theoretical model loadings. BEN: benevolence; COM: competence; GT: general trust; REC: reciprocity; rev: reverse; RP: risk perception.</p>
          </caption>
          <graphic xlink:href="humanfactors_v9i2e33951_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Discriminant validity and cross-loading values (diagonal, italics) of the measurement items based on the Fornell-Lacker criterion.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="230"/>
            <col width="170"/>
            <col width="180"/>
            <col width="160"/>
            <col width="190"/>
            <col width="70"/>
            <thead>
              <tr valign="top">
                <td>Item</td>
                <td>Benevolence</td>
                <td>Competence</td>
                <td>Reciprocity</td>
                <td>Risk perception</td>
                <td>Trust</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Benevolence</td>
                <td>
                  <italic>0.827</italic>
                </td>
                <td>0.747</td>
                <td>0.620</td>
                <td>–0.625</td>
                <td>0.730</td>
              </tr>
              <tr valign="top">
                <td>Competence</td>
                <td>0.747</td>
                <td>
                  <italic>0.885</italic>
                </td>
                <td>0.700</td>
                <td>–0.585</td>
                <td>0.843</td>
              </tr>
              <tr valign="top">
                <td>Reciprocity</td>
                <td>0.620</td>
                <td>0.700</td>
                <td>
                  <italic>0.879</italic>
                </td>
                <td>–0.526</td>
                <td>0.727</td>
              </tr>
              <tr valign="top">
                <td>Risk perception</td>
                <td>–0.625</td>
                <td>–0.585</td>
                <td>–0.526</td>
                <td>
                  <italic>0.710</italic>
                </td>
                <td>–0.714</td>
              </tr>
              <tr valign="top">
                <td>Trust</td>
                <td>0.730</td>
                <td>0.843</td>
                <td>0.727</td>
                <td>–0.714</td>
                <td>
                  <italic>0.789</italic>
                </td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Trust Toward HOIA</title>
        <p>In addition, we assessed the coefficient of determination (<italic>R<sup>2</sup></italic>) values, which represent the combined effect of exogenous latent variables on the endogenous latent variable, and is interpreted in the same way as in a conventional regression analysis procedure [<xref ref-type="bibr" rid="ref29">29</xref>]. In this study, the <italic>R<sup>2</sup></italic> value was 0.806 and the adjusted <italic>R<sup>2</sup></italic> was 0.795. According to Hair et al [<xref ref-type="bibr" rid="ref29">29</xref>], <italic>R<sup>2</sup></italic> values of 0.75, 0.50, or 0.25 are considered substantial, moderate, or weak, respectively. In line with this interpretation, both the <italic>R<sup>2</sup></italic> and adjusted <italic>R<sup>2</sup></italic> values of this study indicate a substantial effect. Thus, approximately 83% of the changes in technology trust can be explained by the statistically significant exogenous variables in the HCTS. Accordingly, we conclude that the statistically significant attributes significantly predict user trust in COVID-19 CTAs, namely HOIA. Keeping in mind all of the empirical values obtained thus far, it is safe to say that our model passes the criteria for both measurement and structural model evaluation, and the final scale exhibits good validity, reliability, and predictive power.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>To contribute toward our central research question (can the HCTS be used to assess an individual’s perception of trust in health technologies?), we empirically assessed the suitability of the HCTS to assess an individual’s perception of trust in health technologies, with the broader goal of understanding which attributes of the HCTS hold true in health technologies. As shown in <xref ref-type="table" rid="table3">Table 3</xref>, all but one of our four hypotheses were supported, based on statistically significant effects.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Significance testing of structural model path coefficients.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="280"/>
            <col width="210"/>
            <col width="110"/>
            <col width="110"/>
            <col width="130"/>
            <col width="160"/>
            <thead>
              <tr valign="top">
                <td>Hypothesis</td>
                <td>Path coefficient (SD)</td>
                <td><italic>t</italic> value</td>
                <td><italic>P</italic> value</td>
                <td>97.5% CI</td>
                <td>Significance (<italic>P</italic>&#60;.0.5)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Benevolence mediates trust</td>
                <td>0.062 (0.097)</td>
                <td>0.674</td>
                <td>.50</td>
                <td>0.251</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Competency mediates trust</td>
                <td>0.495 (0.099)</td>
                <td>5.022</td>
                <td>&#60;.001</td>
                <td>0.690</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>Reciprocity mediates trust</td>
                <td>0.195 (0.084)</td>
                <td>2.285</td>
                <td>.02</td>
                <td>0.355</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>Risk perception mediates trust</td>
                <td>–0.287 (0.056)</td>
                <td>5.106</td>
                <td>&#60;.001</td>
                <td>–0.197</td>
                <td>Yes</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>For instance, H1 (risk perception mediates trust), H2 (competency mediates trust), and H4 (reciprocity mediates trust) were statistically significant, which is in line with the work of Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>]. However, we also found that H3 (benevolence mediates trust) was nonsignificant (<italic>P</italic>=.52). To understand these results, it is important to consider how these constructs were operationalized. H1 and H2 were operationalized based on Gulati et al’s [<xref ref-type="bibr" rid="ref20">20</xref>] and Schoorman et al’s [<xref ref-type="bibr" rid="ref21">21</xref>] conceptualizations of trust, whereas H3 and H4 were operationalized based on Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Our study is not without its limitations, which can guide future research. First, culture influences trust. Second, the proposed scale (HCTS) demonstrated that trust is a dynamic construct that evolves in context and is culturally dependent. Third, the additional suggested items based on Schoorman et al’s [<xref ref-type="bibr" rid="ref21">21</xref>] conceptualizations need further reassessment, as the results are more in line with those of Gulati et al [<xref ref-type="bibr" rid="ref20">20</xref>], but also indicate no significant correlation between the Estonian citizens’ perception of HOIA as a benevolent trait.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>In conclusion, the results of this study indicate that the degree of trust toward the Estonian CTA (HOIA) is significantly correlated with the extent to which users perceive the system as competent, reciprocal, and risky. This study used PLS-SEM to identify statistically significant factors for assessing individuals’ perception of trust in human-technology interactions for health. This work contributes toward establishing a final version of the scale derived from the HCTS consisting of 13 items that can be used to measure user trust levels, including competence, reciprocity, and perceived risk. Moreover, these results should not only be limited to HOIA but can also be implemented to measure trust in other CTAs.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CTA</term>
          <def>
            <p>contact-tracing app</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">HCTS</term>
          <def>
            <p>Human Computer Trust Scale</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">HOIA</term>
          <def>
            <p>Estonian contact-tracing app for COVID-19</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PLS-SEM</term>
          <def>
            <p>partial least-squares structural equation modeling</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study was partly funded by the Trust and Influence Programme (FA8655-22-1-7051), European Office of Aerospace Research and Development, and US Air Force Office of Scientific Research.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>Conceptualization: SS, TK; Data collection: TK; Data analysis: SS, TK; Interpretation of results: SS; Writing-original draft: SS.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Du</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Raposo</surname>
              <given-names>VL</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>COVID-19 contact tracing apps: a technologic tower of Babel and the gap for international pandemic control</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>11</month>
          <day>27</day>
          <volume>8</volume>
          <issue>11</issue>
          <fpage>e23194</fpage>
          <pub-id pub-id-type="doi">10.2196/23194</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Armitage</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Tampe</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Dienes</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Public attitudes towards COVID-19 contact tracing apps: a UK-based focus group study</article-title>
          <source>Health Expect</source>
          <year>2021</year>
          <month>04</month>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>377</fpage>
          <lpage>385</lpage>
          <pub-id pub-id-type="doi">10.1111/hex.13179</pub-id>
          <pub-id pub-id-type="medline">33434404</pub-id>
          <pub-id pub-id-type="pmcid">PMC8013488</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Miettinen</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sadeghi</surname>
              <given-names>AR</given-names>
            </name>
          </person-group>
          <article-title>Long live randomization: on privacy-preserving contact tracing in pandemic</article-title>
          <year>2020</year>
          <conf-name>MTD'20: 7th ACM Workshop on Moving Target Defense at 2020 ACM SIGSAC Conference on Computer and Communications Security</conf-name>
          <conf-date>November 9, 2020</conf-date>
          <conf-loc>virtual</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3411496.3421229</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bano</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zowghi</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Arora</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Requirements, politics, or individualism: what drives the success of COVID-19 contact-tracing apps?</article-title>
          <source>IEEE Softw</source>
          <year>2021</year>
          <month>1</month>
          <volume>38</volume>
          <issue>1</issue>
          <fpage>7</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1109/ms.2020.3029311</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kainda</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Fléchais</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Roscoe</surname>
              <given-names>AW</given-names>
            </name>
          </person-group>
          <article-title>Security and usability: analysis and evaluation</article-title>
          <year>2010</year>
          <conf-name>2010 International Conference on Availability, Reliability and Security</conf-name>
          <conf-date>February 15-18, 2010</conf-date>
          <conf-loc>Krakow, Poland</conf-loc>
          <fpage>275</fpage>
          <lpage>282</lpage>
          <pub-id pub-id-type="doi">10.1109/ares.2010.77</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Michelin</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Ruj</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Malaney</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kanhere</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Seneviratne</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Janicke</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Jha</surname>
              <given-names>SK</given-names>
            </name>
          </person-group>
          <article-title>A survey of COVID-19 contact tracing apps</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>134577</fpage>
          <lpage>134601</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.3010226</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eloff</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Eloff</surname>
              <given-names>JHP</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Ghonaimy</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>El-Hadidi</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Aslan</surname>
              <given-names>HK</given-names>
            </name>
          </person-group>
          <article-title>Human computer interaction: an information security perspective</article-title>
          <source>Security in the Information Society</source>
          <year>2002</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>535</fpage>
          <lpage>545</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>King</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lampinen</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Smolen</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy: is there an app for that?</article-title>
          <year>2011</year>
          <conf-name>Seventh Symposium On Usable Privacy and Security (SOUPS)</conf-name>
          <conf-date>July 20-22, 2011</conf-date>
          <conf-loc>Pittsburgh, PA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2078827.2078843</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <article-title>ISO/IEC 27000:2009 Information technology — Security techniques — Information security management systems — Overview and vocabulary</article-title>
          <source>International Organization for Standardization</source>
          <year>2009</year>
          <access-date>2022-05-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iso.org/standard/41933.html">https://www.iso.org/standard/41933.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <article-title>Ethics guidelines for trustworthy AI</article-title>
          <source>European Commission</source>
          <year>2019</year>
          <month>04</month>
          <day>08</day>
          <access-date>2022-06-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital-strategy.ec.europa.eu/en/library/ethics-guidelines-trustworthy-ai">https://digital-strategy.ec.europa.eu/en/library/ethics-guidelines-trustworthy-ai</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelton</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Fleischmann</surname>
              <given-names>KR</given-names>
            </name>
            <name name-style="western">
              <surname>Wallace</surname>
              <given-names>WA</given-names>
            </name>
          </person-group>
          <article-title>Trust in digital information</article-title>
          <source>J Am Soc Inf Sci</source>
          <year>2008</year>
          <month>02</month>
          <day>01</day>
          <volume>59</volume>
          <issue>3</issue>
          <fpage>363</fpage>
          <lpage>374</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.20722</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trivedi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Vasisht</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Digital contact tracing</article-title>
          <source>SIGCOMM Comput Commun Rev</source>
          <year>2020</year>
          <month>10</month>
          <day>26</day>
          <volume>50</volume>
          <issue>4</issue>
          <fpage>75</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.1145/3431832.3431841</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <article-title>COVID-19 teemaline küsitlus 26</article-title>
          <source>Turu-uuringute AS</source>
          <access-date>2021-02-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://riigikantselei.ee/media/933/download">https://riigikantselei.ee/media/933/download</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Munzert</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Selb</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gohdes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stoetzer</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Lowe</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Tracking and promoting the usage of a COVID-19 contact tracing app</article-title>
          <source>Nat Hum Behav</source>
          <year>2021</year>
          <month>02</month>
          <day>21</day>
          <volume>5</volume>
          <issue>2</issue>
          <fpage>247</fpage>
          <lpage>255</lpage>
          <pub-id pub-id-type="doi">10.1038/s41562-020-01044-x</pub-id>
          <pub-id pub-id-type="medline">33479505</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41562-020-01044-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cavoukian</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy by design: The 7 foundational principles</article-title>
          <source>Information and privacy commissioner of Ontario, Canada</source>
          <year>2009</year>
          <access-date>2022-05-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ipc.on.ca/wp-content/uploads/resources/7foundationalprinciples.pdf">https://www.ipc.on.ca/wp-content/uploads/resources/7foundationalprinciples.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>EY</given-names>
            </name>
            <name name-style="western">
              <surname>Saqib</surname>
              <given-names>NU</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high</article-title>
          <source>Comput Human Behav</source>
          <year>2021</year>
          <month>06</month>
          <volume>119</volume>
          <fpage>106718</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33526957"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.106718</pub-id>
          <pub-id pub-id-type="medline">33526957</pub-id>
          <pub-id pub-id-type="pii">S0747-5632(21)00040-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC7840411</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kwasny</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Caine</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>WA</given-names>
            </name>
            <name name-style="western">
              <surname>Fisk</surname>
              <given-names>AD</given-names>
            </name>
          </person-group>
          <article-title>Privacy and technology: folk definitions and perspectives</article-title>
          <source>Proc SIGCHI Conf Hum Factor Comput Syst</source>
          <year>2008</year>
          <volume>2008</volume>
          <fpage>3291</fpage>
          <lpage>3296</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29057397"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1358628.1358846</pub-id>
          <pub-id pub-id-type="medline">29057397</pub-id>
          <pub-id pub-id-type="pmcid">PMC5647877</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Simko</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Calo</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Roesner</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kohno</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>COVID-19 contact tracing and privacy: studying opinion and preferences</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <month>12</month>
          <day>17</day>
          <access-date>2022-05-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2005.06056">https://arxiv.org/abs/2005.06056</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Ministry of Social Affairs</collab>
          </person-group>
          <article-title>COVID-19 blogi</article-title>
          <source>Terviseamet</source>
          <year>2021</year>
          <access-date>2021-04-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.terviseamet.ee/et/uudised/covid-19-blogi-26-aprill-oopaevaga-lisandus-163-positiivset-testi">https://www.terviseamet.ee/et/uudised/covid-19-blogi-26-aprill-oopaevaga-lisandus-163-positiivset-testi</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gulati</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sousa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lamas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Design, development and evaluation of a human-computer trust scale</article-title>
          <source>Behav Inf Technol</source>
          <year>2019</year>
          <month>08</month>
          <day>31</day>
          <volume>38</volume>
          <issue>10</issue>
          <fpage>1004</fpage>
          <lpage>1015</lpage>
          <pub-id pub-id-type="doi">10.1080/0144929x.2019.1656779</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schoorman</surname>
              <given-names>FD</given-names>
            </name>
            <name name-style="western">
              <surname>Mayer</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>JH</given-names>
            </name>
          </person-group>
          <article-title>An integrative model of organizational trust: past, present, and future</article-title>
          <source>Acad Manag Rev</source>
          <year>2007</year>
          <month>04</month>
          <volume>32</volume>
          <issue>2</issue>
          <fpage>344</fpage>
          <lpage>354</lpage>
          <pub-id pub-id-type="doi">10.5465/amr.2007.24348410</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sousa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dias</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lamas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A model for human-computer trust: A key contribution for leveraging trustful interactions</article-title>
          <year>2014</year>
          <conf-name>9th Iberian Conference on Information Systems and Technologies (CISTI)</conf-name>
          <conf-date>June 18-21, 2014</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1109/cisti.2014.6876935</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wiedmann</surname>
              <given-names>KP</given-names>
            </name>
            <name name-style="western">
              <surname>Reeh</surname>
              <given-names>MO</given-names>
            </name>
            <name name-style="western">
              <surname>Varelmann</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hennigs</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The crucial role of user's perceived trust in the orchestration and adoption of IT-ecosystems</article-title>
          <year>2009</year>
          <conf-name>MEDES '09: International Conference on Management of Emergent Digital EcoSystems</conf-name>
          <conf-date>October 27-30, 2009</conf-date>
          <conf-loc>France</conf-loc>
          <fpage>383</fpage>
          <lpage>390</lpage>
          <pub-id pub-id-type="doi">10.1145/1643823.1643894</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Egger</surname>
              <given-names>FN</given-names>
            </name>
          </person-group>
          <article-title>"Trust me, I'm an online vendor": towards a model of trust for e-commerce system design</article-title>
          <year>2000</year>
          <month>04</month>
          <day>01</day>
          <conf-name>CHI EA '00: CHI '00 Extended Abstracts on Human Factors in Computing Systems</conf-name>
          <conf-date>April 1-6, 2000</conf-date>
          <conf-loc>The Hague, the Netherlands</conf-loc>
          <fpage>101</fpage>
          <lpage>102</lpage>
          <pub-id pub-id-type="doi">10.1145/633292.633352</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kramer</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>Rethinking trust</article-title>
          <source>Harvard Business Review</source>
          <year>2009</year>
          <month>06</month>
          <access-date>2021-03-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hbr.org/2009/06/rethinking-trust">https://hbr.org/2009/06/rethinking-trust</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pinto</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sousa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Silva</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Coelho</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Adaptation and validation of the HCTM Scale into Human-robot interaction Portuguese context: A study of measuring trust in human-robot interactions</article-title>
          <year>2020</year>
          <conf-name>11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society</conf-name>
          <conf-date>October 25-29, 2020</conf-date>
          <conf-loc>Tallinn, Estonia</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3419249.3420087</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Magalhães Hill</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hill</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Investigação por questionário, 2nd edition</source>
          <year>2005</year>
          <publisher-loc>Lisbon</publisher-loc>
          <publisher-name>Sílabo</publisher-name>
          <fpage>16</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Etikan</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Comparison of convenience sampling and purposive sampling</article-title>
          <source>Am J Theor Appl Stat</source>
          <year>2016</year>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.11648/j.ajtas.20160501.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hult</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ringle</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>A primer on partial least squares structural equation modeling (PLS-SEM)</source>
          <year>2014</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>SAGE Publications, Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mcknight</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Clay</surname>
              <given-names>PF</given-names>
            </name>
          </person-group>
          <article-title>Trust in a specific technology</article-title>
          <source>ACM Trans Manage Inf Syst</source>
          <year>2011</year>
          <month>06</month>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1145/1985347.1985353</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harwood</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Garry</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Internet of Things: understanding trust in techno-service systems</article-title>
          <source>J Serv Manag</source>
          <year>2017</year>
          <month>06</month>
          <day>19</day>
          <volume>28</volume>
          <issue>3</issue>
          <fpage>442</fpage>
          <lpage>475</lpage>
          <pub-id pub-id-type="doi">10.1108/JOSM-11-2016-0299</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hulland</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Use of partial least squares (PLS) in strategic management research: a review of four recent studies</article-title>
          <source>Strat Mgmt J</source>
          <year>1999</year>
          <month>02</month>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>195</fpage>
          <lpage>204</lpage>
          <pub-id pub-id-type="doi">10.1002/(sici)1097-0266(199902)20:2&#60;195::aid-smj13&#62;3.0.co;2-7</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
