<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR Human Factors</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Hum Factors</journal-id>
      <journal-title>JMIR Human Factors</journal-title>
      <issn pub-type="epub">2292-9495</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v10i1e45503</article-id>
      <article-id pub-id-type="pmid">37585259</article-id>
      <article-id pub-id-type="doi">10.2196/45503</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Extending the Privacy Calculus to the mHealth Domain: Survey Study on the Intention to Use mHealth Apps in Germany</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Kushniruk</surname>
            <given-names>Andre</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Weinert</surname>
            <given-names>Lina</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Reifegerste</surname>
            <given-names>Doreen</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>von Kalckreuth</surname>
            <given-names>Niklas</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Division of Ergonomics</institution>
            <institution>Department of Psychology and Ergonomics (IPA)</institution>
            <institution>Technische Universität Berlin</institution>
            <addr-line>Straße des 17. Juni 135</addr-line>
            <addr-line>Berlin, 10623</addr-line>
            <country>Germany</country>
            <phone>49 30 314 70 747</phone>
            <email>niklas.vkalckreuth@tu-berlin.de</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9165-682X</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Feufel</surname>
            <given-names>Markus A</given-names>
          </name>
          <degrees>Dipl-Ing (FH), MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0563-8831</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Division of Ergonomics</institution>
        <institution>Department of Psychology and Ergonomics (IPA)</institution>
        <institution>Technische Universität Berlin</institution>
        <addr-line>Berlin</addr-line>
        <country>Germany</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Niklas von Kalckreuth <email>niklas.vkalckreuth@tu-berlin.de</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2023</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>8</month>
        <year>2023</year>
      </pub-date>
      <volume>10</volume>
      <elocation-id>e45503</elocation-id>
      <history>
        <date date-type="received">
          <day>4</day>
          <month>1</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>15</day>
          <month>4</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>13</day>
          <month>5</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>21</day>
          <month>6</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Niklas von Kalckreuth, Markus A Feufel. Originally published in JMIR Human Factors (https://humanfactors.jmir.org), 16.08.2023.</copyright-statement>
      <copyright-year>2023</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Human Factors, is properly cited. The complete bibliographic information, a link to the original publication on https://humanfactors.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://humanfactors.jmir.org/2023/1/e45503" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>With the increasing digitalization of the health sector, more and more mobile health (mHealth) apps are coming to the market to continuously collect and process sensitive health data for the benefit of patients and providers. These technologies open up new opportunities to make the health care system more efficient and save costs but also pose potential threats such as loss of data or finances.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to present an empirical review and adaptation of the extended privacy calculus model to the mHealth domain and to understand what factors influence the intended usage of mHealth technologies.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A survey study was conducted to empirically validate our model, using a case vignette as cover story. Data were collected from 250 German participants and analyzed using a covariance-based structural equation model.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The model explains R2=79.3% of the variance in intention to use. The 3 main factors (social norms, attitude to privacy, and perceived control over personal data) influenced the intention to use mHealth apps, albeit partially indirectly. The intention to use mHealth apps is driven by the perceived benefits of the technology, trust in the provider, and social norms. Privacy concerns have no bearing on the intention to use. The attitude to privacy has a large inhibiting effect on perceived benefits, as well as on trust in the provider. Perceived control over personal data clearly dispels privacy concerns and supports the relationship of trust between the user and the provider.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Based on the privacy calculus, our domain-specific model explains the intention to use mHealth apps better than previous, more general models. The findings allow health care providers to improve their products and to increase usage by targeting specific user groups.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>mHealth</kwd>
        <kwd>mobile health</kwd>
        <kwd>confidential</kwd>
        <kwd>privacy calculus</kwd>
        <kwd>privacy</kwd>
        <kwd>intention to use</kwd>
        <kwd>adoption</kwd>
        <kwd>data autonomy</kwd>
        <kwd>social norms</kwd>
        <kwd>trust in the provider</kwd>
        <kwd>trust</kwd>
        <kwd>privacy concern</kwd>
        <kwd>benefit</kwd>
        <kwd>attitude to privacy</kwd>
        <kwd>survey</kwd>
        <kwd>intention</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The use of digital health products, which promise to increase the effectiveness and efficiency of health care delivery, is on the rise. Between autumn 2019 and summer 2021, downloads of mobile health (mHealth) apps in Germany doubled to 2.4 million [<xref ref-type="bibr" rid="ref1">1</xref>]. mHealth apps run on mobile devices and may provide medical services ranging from individual care to public health measures [<xref ref-type="bibr" rid="ref2">2</xref>]. They are said to improve individual health competence and, ultimately, motivate users to deal with their own health more responsibly through interventions and access to information, simplified communication with experts, and the tracking of health data [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. In addition to these advantages, there are also risks associated with using mHealth apps. For example, the security infrastructure of many apps is currently inadequate and does not meet the requirements for protecting user data (eg, the General Data Protection Regulation [GDPR] in the European Union and the Health Insurance Portability and Accountability Act [HIPAA] in the United States) [<xref ref-type="bibr" rid="ref6">6</xref>]. It is therefore not surprising that mHealth users are becoming increasingly sensitive to data privacy and data security [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. Given the pros and cons of using mHealth technologies, it is essential to take a close look at the factors that influence users’ intention to (not) use them in order to inform and improve mHealth technology design and, ultimately, increase the uptake of safe and efficient technologies. To examine why people intend (not) to use mHealth apps, we decided to build on the privacy calculus model.</p>
        <p>In this study, we focus on the use of health insurance apps because, on the one hand, there is already a large number of users and, on the other hand, a large number of potential users due to the mandatory membership in a health insurance company in Germany [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
      </sec>
      <sec>
        <title>Related Work</title>
        <p>The privacy calculus model originally postulated that users of social network sites (SNSs) perform a calculus between the expected loss of privacy and the potential gain of disclosure when deciding whether to use it [<xref ref-type="bibr" rid="ref10">10</xref>]. That is, the model suggests that people compare potential benefits and costs to calibrate their intention to use the SNS technology [<xref ref-type="bibr" rid="ref11">11</xref>-<xref ref-type="bibr" rid="ref13">13</xref>]. If the sum of the drivers (benefits) is greater than that of the inhibitors (costs), people will use the technology. If the number of inhibitors is greater, the use of the technology is rejected [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. The privacy calculus model was successfully used to predict the intention to use SNSs [<xref ref-type="bibr" rid="ref16">16</xref>] and e-commerce websites [<xref ref-type="bibr" rid="ref17">17</xref>]. Based on the privacy calculus model, we aim to understand which factors have a concrete influence on the cost-benefit calculation underlying the intention to use mHealth apps.</p>
        <p>Thus far, 3 studies that have examined the intention to use mHealth apps based on the privacy calculus model. They were limited either by the lack of explained variance (<italic>R</italic><sup>2</sup> values did not exceed 0.5 [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref18">18</xref>] or were not reported [<xref ref-type="bibr" rid="ref19">19</xref>]) or marginal model fit values [<xref ref-type="bibr" rid="ref20">20</xref>], which indicate that the used model did not properly fit the observed data [<xref ref-type="bibr" rid="ref19">19</xref>]. Conceptually, we think these studies [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>] underrepresented the following 3 domain-specific factors influencing the intention to use mHealth technologies:</p>
        <list list-type="bullet">
          <list-item>
            <p>When examining the intention to use mHealth technology, the data autonomy granted to the users, that is, the control over granular privacy settings to limit access to their data [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref16">16</xref>], was not taken into account [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>] or only partially accounted for via the concepts of privacy concerns [<xref ref-type="bibr" rid="ref11">11</xref>]. Studies have shown, however, that data autonomy influences the intention to use data-collecting mHealth technology [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
          </list-item>
          <list-item>
            <p>Although the direct or indirect influence of trust in the provider on the intention to use mHealth technology has been examined in 2 studies [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref19">19</xref>], the individual’s interest in the object represented in the trusting relationship—here the protection of personal data—has not been considered [<xref ref-type="bibr" rid="ref22">22</xref>]. If the user is not interested in the security of personal data, a relationship of trust concerning the use of data would be irrelevant. Consequently, to be able to make statements about a trusting relationship, the general attitude to privacy should be considered [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p>
          </list-item>
          <list-item>
            <p>None of the existing studies considered the influence of social norms, such as social pressure from family and friends. However, there is evidence that social norms influence the acceptance of mHealth technology for disease prevention, especially in healthy individuals [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>].</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Aim of This Study</title>
        <p>To achieve our overall goal (ie, to explain the intention to use data-collecting mHealth technology), we address 3 subgoals in this article: (1) we investigate whether perceived data autonomy reduces privacy concerns and has a positive effect on the intention to use mHealth apps, (2) we explore the influence of an attitude to privacy on trust in the provider, and (3) we examine the influence of social norms on the intention to use mHealth apps. To implement these subgoals, we first explain our model and derive hypotheses. We then validate our model in a survey study using a covariance-based structural equation model (CB-SEM). After discussing the results, we derive theoretical and practical implications and reflect on the limitations of the study. We end our paper with a conclusion concerning our objectives.</p>
      </sec>
      <sec>
        <title>Model Description and Hypotheses</title>
        <p>To predict and examine the intention to use mHealth apps, we adapted a privacy calculus model from the SNS domain [<xref ref-type="bibr" rid="ref12">12</xref>]. In contrast to privacy calculus models in the mHealth area, in the SNS domain it is common to examine the influence of social norms and perceived data autonomy. Therefore, in addition to the constructs of perceived benefits, privacy concerns, and trust in the provider, the adapted model also included the constructs of perceived control over personal data (subgoal 1) and social norms (subgoal 3) [<xref ref-type="bibr" rid="ref12">12</xref>]. Finally, we added the attitude to privacy to the model to cover subgoal 2 from above. Unlike previous studies [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>], we refrained from adding health-specific factors (eg, health concerns) to reduce the complexity and increase general applicability of the model. <xref rid="figure1" ref-type="fig">Figure 1</xref> shows the final model with drivers (+) and inhibitors (–), which we will elaborate on in turn.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Extension of the privacy calculus model to predict intention to use mHealth apps [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          </caption>
          <graphic xlink:href="humanfactors_v10i1e45503_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Perceived Benefits</title>
        <p>Perceived benefits are both the hedonistic and the utilitarian reasons people may have to use a product or service. Hedonistic reasons may be that the process of using a technology is fun and enjoyable, irrespective of what may be achieved by using it [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. On the other hand, utilitarian reasons are mainly associated with an increase in productivity and efficiency (eg, time savings, economic advantages) [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. In the area of mHealth, utilitarian advantages may also relate to the simplification of treatments and coordination between different medical institutions, which can lead to more efficient treatments and, ultimately, better health outcomes [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. There is evidence that the perception of benefits has a driving influence on the intention to use data-collecting and disclosing mHealth information technology [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        <list list-type="bullet">
          <list-item>
            <p>H1: Perceived benefits positively influence users’ intention to use mHealth apps.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Privacy Concerns</title>
        <p>Privacy concerns describe users’ concerns about a possible loss of privacy using web-based apps due to privacy risks, such as data leaks and data misuse [<xref ref-type="bibr" rid="ref15">15</xref>]. These concerns are driven by situational risk perceptions, for example, data that are not secure with a particular provider [<xref ref-type="bibr" rid="ref15">15</xref>]. Thus, privacy concerns can be thought of as a situational motivator to be careful when disclosing personal data [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>], and, ultimately, to inhibit the use of health technologies that require disclosure of personal data [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        <list list-type="bullet">
          <list-item>
            <p>H2: Privacy concerns negatively influence users’ intention to use mHealth apps.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Trust in the Provider</title>
        <p>Trust is a complexity-reducing variable because it makes the trustor bear a perceived risk when cooperating with a trustee [<xref ref-type="bibr" rid="ref33">33</xref>]. In other words, trust is a psychological state where a person accepts being vulnerable to the actions of another party because the person expects that the other party will carry out a certain action in their interest, regardless of whether the action is monitored [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. When interacting with information technology, people’s focus is less on trust in the functionality of the system and more on trust in the provider to protect their data and privacy [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. Various studies have shown that trust in the provider has a significant positive influence on the acceptance of mHealth technologies and their intended use [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <list list-type="bullet">
          <list-item>
            <p>H3: Trust in the provider positively influences users' intention to use mHealth apps.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Social Norms</title>
        <p>Social norms are social and psychological factors that are inherent in group dynamics and strongly influence individual human behavior [<xref ref-type="bibr" rid="ref14">14</xref>]. People tend to behave in ways that are (socially) accepted to continue to benefit from the advantages of being part of a social group (injunctive norms). Violation tends to be punished with disapproval and possibly social ostracism [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. Besides, individuals follow the behaviors of others (descriptive norms) [<xref ref-type="bibr" rid="ref43">43</xref>]. In the case of health prevention through mHealth technology, users’ intention to use mHealth technology is influenced by both the approval of technology use in their social environment (eg, injunctive norms friends and family) and the descriptive norms based on how and when a technology is used in the social environment [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref44">44</xref>].</p>
        <list list-type="bullet">
          <list-item>
            <p>H4: Social norms positively influence users’ intention to use mHealth apps.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Perceived Control Over Personal Data</title>
        <p>Perceived control is a psychological construct that describes individuals’ perceptions of the extent to which they can influence and control the achievement of a certain goal and the resources that are necessary to do so [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. In the context of mHealth apps, this involves the perceived ability to control which health data are collected and who can access them [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. Various studies have shown that if control over personal data is perceived to be limited, privacy concerns increase [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. By contrast, if people think that they can control their data, their intention to use mHealth technology [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref11">11</xref>] and their trust in the technology provider increases [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        <list list-type="bullet">
          <list-item>
            <p>H5a: Perceived control over personal data positively influences users’ intention to use mHealth apps.</p>
          </list-item>
          <list-item>
            <p>H5b: Perceived control over personal data negatively influences users’ privacy concerns.</p>
          </list-item>
          <list-item>
            <p>H5c: Perceived control over personal data positively influences users’ trust in the provider.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Attitude to Privacy</title>
        <p>We define the attitude to privacy as a user’s general tendency to consider privacy and data security to be important or a user’s disposition to value privacy [<xref ref-type="bibr" rid="ref15">15</xref>]. The inclusion of this construct in the privacy calculus model is particularly important in the mHealth context because disclosure of health data tends to be more consequential than data stored on other technologies, such as SNSs [<xref ref-type="bibr" rid="ref47">47</xref>]. A strong attitude toward data protection has an inhibiting effect on people’s intention to disclose data (ie, their privacy concerns) and their intention to use a data-collecting technology altogether [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. Once data have been disclosed, users with a strong attitude to privacy are more interested in the whereabouts of their data and consequently more cautious when it comes to trusting the provider using their private data [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref49">49</xref>-<xref ref-type="bibr" rid="ref51">51</xref>]. Finally, whereas the perception of potential risks may be overinflated due to strong attitudes to privacy, potential benefits of technology use may be undervalued [<xref ref-type="bibr" rid="ref52">52</xref>-<xref ref-type="bibr" rid="ref56">56</xref>].</p>
        <list list-type="bullet">
          <list-item>
            <p>H6a: Attitude to privacy negatively influences users’ intention to use mHealth apps.</p>
          </list-item>
          <list-item>
            <p>H6b: Attitude to privacy positively influences users’ privacy concerns.</p>
          </list-item>
          <list-item>
            <p>H6c: Attitude to privacy negatively influences users’ trust in the provider.</p>
          </list-item>
          <list-item>
            <p>H6d: Attitude to privacy negatively influences users’ perceived benefits.</p>
          </list-item>
        </list>
        <p>Now that we have explained the theoretical basis of our model, we evaluate the underlying hypotheses in a survey study. In the next section, we describe the methodological basis of this study.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Participants</title>
        <p>The theoretical framework described in <xref rid="figure1" ref-type="fig">Figure 1</xref> was empirically tested using data gathered via an online survey that was performed as part of a bigger study in cooperation with a German health insurance company (BARMER), one of the largest and best-known health insurance companies in Germany. The survey was administered by a commercial survey agency in Germany (Norstat GmbH), which also organized the entire survey process (programming the online study and collecting the data). We targeted a sample of at least 250 participants to be able to calculate the model validly [<xref ref-type="bibr" rid="ref20">20</xref>]. Participants were individuals who registered with Norstat GmbH as survey participants. In addition to being a resident of Germany and a native German speaker, the prerequisites were that the participants were customers of a German health insurance company, as the case vignette centered on a German health insurance app. The minimum age for participation was 18 years, as this is also the minimum age for admission as a Norstat panel member. There were no prerequisites regarding gender. Data collection took place from March 11, 2021, to March 17, 2021. Our estimated minimum time to complete the survey was 5 minutes. This was ensured by the system allowing participants to continue the survey only after a certain amount of time (60 seconds for the consent form, 30 seconds for the case vignette, and 210 seconds for the questionnaire). The mean and median participation times were both 6 minutes with a standard variation of 42 seconds. Participants volunteered to participate after giving informed consent and received compensation (€0.80 [US $0.90]) for taking the survey.</p>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>Because a third party (Norstat GmbH) contacted potential participants and collected the data, we did not have direct contact with participants or access to any personally identifying participant information. We obtained only completely anonymous data. Consequently, we were able to guarantee full anonymity and privacy of the participants, which conforms to the ethical guidelines of the German Research Foundation. Thus, based on the guidelines of the Ethics Committee of our Institute (Institute of Psychology and Ergonomics) no additional ethics board review was mandatory [<xref ref-type="bibr" rid="ref57">57</xref>].</p>
      </sec>
      <sec>
        <title>Materials</title>
        <p>Following a practice that is often used in technology acceptance studies [<xref ref-type="bibr" rid="ref58">58</xref>], the study used a case vignette to evoke a typical situation where an mHealth app would be used and described the trade-off between the benefits of using it and its data privacy risks. We decided to describe a health insurance app in the case vignette because, as already described, they currently account for the largest share of mHealth app downloads in Germany [<xref ref-type="bibr" rid="ref1">1</xref>]. In particular, the case vignette (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) describes a situation in which a friend “Alex” uses the app of his health insurance on a wearable to track his health behavior (ie, physical activity). By participating in the bonus program of this insurance, Alex may receive a bonus of up to €100 (US $112) for working out regularly (a direct benefit), but the insurance may also deny covering treatment costs due to an unhealthy lifestyle (a possible risk). To assess the factors included in the privacy calculus model displayed in <xref rid="figure1" ref-type="fig">Figure 1</xref>, we used a 30-item questionnaire (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>; also see [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref53">53</xref>,<xref ref-type="bibr" rid="ref59">59</xref>-<xref ref-type="bibr" rid="ref62">62</xref>]), which we developed following the methodology of Moore and Benbasat [<xref ref-type="bibr" rid="ref63">63</xref>]. All items were measured on a 7-point Likert scale that ranged from 1 (strongly disagree) to 7 (strongly agree).</p>
      </sec>
      <sec>
        <title>Procedure</title>
        <p>The survey consisted of 3 parts. In the first part, demographic data of the respondents were recorded, such as age, gender, and educational level. In the second part, the respondents were asked about their individual experience with mHealth apps as well as their current use of wearables such as fitness trackers and smartwatches (also beyond health apps). In the third part, the participants received the case vignette and were asked to answer the questionnaire. The order of the questions in the questionnaire was randomized for each participant.</p>
      </sec>
      <sec>
        <title>Analyses</title>
        <p>To test the model outlined in <xref rid="figure1" ref-type="fig">Figure 1</xref>, a CB-SEM was used, which is a common approach to theory testing and confirmation [<xref ref-type="bibr" rid="ref64">64</xref>]. The CB-SEM was carried out with <italic>lavaan</italic> [<xref ref-type="bibr" rid="ref65">65</xref>] (version 0.6-9; R Foundation) in RStudio (version 1.3.1093; Posit, PBC), using the maximum likelihood estimator. All items of the questionnaire were included in the analysis and restricted to load on the respective constructs described above and in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Survey Characteristics</title>
        <p>A total of 336 observations were collected. After deleting observations that were unusable because of missing responses, a final sample of 250 observations (126 male and 124 female) was used for further analysis. The mean age of participants was 46.5 years (SD 15.2 years). The demographic characteristics of the sample are summarized in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Demographic data of the sample (N=250).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="480"/>
            <col width="0"/>
            <col width="490"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Demographic characteristic</td>
                <td>Frequency, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Gender</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td colspan="2">126 (50.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td colspan="2">124 (49.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Education</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No degree</td>
                <td colspan="2">2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>School leaving certificate</td>
                <td colspan="2">39 (15.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Secondary school certificate</td>
                <td colspan="2">88 (35.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>General qualification for university entrance</td>
                <td colspan="2">57 (22.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>University degree (bachelor’s or master’s)</td>
                <td colspan="2">62 (24.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PhD</td>
                <td colspan="2">1 (0.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Other</td>
                <td colspan="2">1 (0.4)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Experience with mHealth<sup>a</sup> apps</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Regular use of mHealth apps</td>
                <td colspan="2">124 (49.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Occasional use of mHealth apps</td>
                <td colspan="2">34 (13.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No use of mHealth apps</td>
                <td colspan="2">92 (36.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Usage of wearables</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Regular use of wearables</td>
                <td colspan="2">73 (29.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No use of wearables</td>
                <td colspan="2">177 (70.8)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>mHealth: mobile health.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Assessment of the Structural Model</title>
        <p>The internal consistency of the scales as well as convergent validity and discriminant validity of the measured constructs are shown in <xref ref-type="table" rid="table2">Tables 2</xref> and <xref ref-type="table" rid="table3">3</xref>. Internal consistency was evaluated with Cronbach α with the criterion of α≥.7 [<xref ref-type="bibr" rid="ref66">66</xref>]. All constructs surpass the recommended value, and therefore internal consistency can be assumed. The convergent validity was assessed following Hair et al [<xref ref-type="bibr" rid="ref20">20</xref>] using the following 3 criteria: (1) the significance of the factor loadings, which exceed the criterion value of 0.5; (2) the average variance extracted (AVE) should be greater than 0.5; (3) the composite reliability (CR) should surpass the minimum threshold of 0.6. All subscales met these 3 criteria.</p>
        <p>Discriminant validity was evaluated by the Fornell-Larcker Criterion [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref67">67</xref>]. For each latent variable, the square root of AVE (diagonal elements) must be larger than the correlation between this latent variable and any other latent variable (off-diagonal elements). As shown in <xref ref-type="table" rid="table3">Table 3</xref>, this criterion was fulfilled for all latent variables.</p>
        <p>To further assess the quality of the structural model, we computed overall measures of goodness of fit, following the recommendations of Hair et al [<xref ref-type="bibr" rid="ref20">20</xref>], and calculated the model chi-square statistics, the comparative fit index (CFI), and the root-mean-square error of approximation (RMSEA). Specific thresholds for high model complexity (≥30 observed variables) and small sample size (≤250 observations) apply. The fit indices, their values, and the specific threshold values are presented in <xref ref-type="table" rid="table4">Table 4</xref>.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Quality criteria of the constructs.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="220"/>
            <col width="0"/>
            <col width="110"/>
            <col width="0"/>
            <col width="210"/>
            <col width="0"/>
            <col width="80"/>
            <col width="0"/>
            <col width="80"/>
            <col width="0"/>
            <col width="270"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Latent variable and item</td>
                <td colspan="2">Mean (SD)</td>
                <td colspan="2">Standardized factor loading</td>
                <td colspan="2">AVE<sup>a</sup></td>
                <td colspan="2">CR<sup>b</sup></td>
                <td>Cronbach α</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>AP<sup>c</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.918</td>
                <td colspan="2">0.957</td>
                <td>.961</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>AP01</td>
                <td colspan="2">3.34 (1.76)</td>
                <td colspan="2">0.943</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>AP02</td>
                <td colspan="2">3.36 (1.77)</td>
                <td colspan="2">0.972</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>CON<sup>d</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.795</td>
                <td colspan="2">0.951</td>
                <td>.951</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CON01</td>
                <td colspan="2">4.40 (1.67)</td>
                <td colspan="2">0.885</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CON02</td>
                <td colspan="2">5.09 (1.60)</td>
                <td colspan="2">0.873</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CON03</td>
                <td colspan="2">4.94 (1.64)</td>
                <td colspan="2">0.889</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CON04</td>
                <td colspan="2">4.64 (1.67)</td>
                <td colspan="2">0.923</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CON06</td>
                <td colspan="2">4.51 (1.68)</td>
                <td colspan="2">0.886</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>IU<sup>e</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.806</td>
                <td colspan="2">0.926</td>
                <td>.935</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IU01</td>
                <td colspan="2">4.74 (1.86)</td>
                <td colspan="2">0.904</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IU02</td>
                <td colspan="2">4.68 (1.94)</td>
                <td colspan="2">0.889</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IU04</td>
                <td colspan="2">4.64 (1.90)</td>
                <td colspan="2">0.902</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PB<sup>f</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.757</td>
                <td colspan="2">0.949</td>
                <td>.949</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PB01</td>
                <td colspan="2">4.25 (1.65)</td>
                <td colspan="2">0.838</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PB03</td>
                <td colspan="2">4.11 (1.62)</td>
                <td colspan="2">0.901</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PB04</td>
                <td colspan="2">4.31(1.70)</td>
                <td colspan="2">0.883</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PB05</td>
                <td colspan="2">4.08 (1.73)</td>
                <td colspan="2">0.864</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PB06</td>
                <td colspan="2">4.01 (1.67)</td>
                <td colspan="2">0.903</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PB07</td>
                <td colspan="2">3.70 (1.64)</td>
                <td colspan="2">0.827</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PC<sup>g</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.752</td>
                <td colspan="2">0.938</td>
                <td>.938</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PC02</td>
                <td colspan="2">2.85 (1.59)</td>
                <td colspan="2">0.877</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PC07</td>
                <td colspan="2">2.71 (1.46)</td>
                <td colspan="2">0.860</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PC08</td>
                <td colspan="2">2.76 (1.48)</td>
                <td colspan="2">0.873</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PC09</td>
                <td colspan="2">3.35 (1.56)</td>
                <td colspan="2">0.832</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PC10</td>
                <td colspan="2">3.07 (1.59)</td>
                <td colspan="2">0.891</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>SN<sup>h</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.782</td>
                <td colspan="2">0.946</td>
                <td>.946</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SN01</td>
                <td colspan="2">4.54 (1.72)</td>
                <td colspan="2">0.868</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SN02</td>
                <td colspan="2">4.52 (1.64)</td>
                <td colspan="2">0.853</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SN03</td>
                <td colspan="2">4.96 (1.81)</td>
                <td colspan="2">0.875</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SN04</td>
                <td colspan="2">4.50 (1.78)</td>
                <td colspan="2">0.890</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SN05</td>
                <td colspan="2">4.63 (1.85)</td>
                <td colspan="2">0.925</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>TP<sup>i</sup></bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">0.819</td>
                <td colspan="2">0.948</td>
                <td>.947</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>TP01</td>
                <td colspan="2">4.13 (1.60)</td>
                <td colspan="2">0.907</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>TP02</td>
                <td colspan="2">4.29 (1.64)</td>
                <td colspan="2">0.889</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>TP03</td>
                <td colspan="2">4.20 (1.74)</td>
                <td colspan="2">0.902</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>TP07</td>
                <td colspan="2">4.30 (1.75)</td>
                <td colspan="2">0.921</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>AVE: average variance extracted.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>CR: composite reliability.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>AP: attitude to privacy.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>CON: perceived control over personal data.</p>
            </fn>
            <fn id="table2fn5">
              <p><sup>e</sup>IU: intention to use.</p>
            </fn>
            <fn id="table2fn6">
              <p><sup>f</sup>PB: perceived benefits.</p>
            </fn>
            <fn id="table2fn7">
              <p><sup>g</sup>PC: privacy concerns.</p>
            </fn>
            <fn id="table2fn8">
              <p><sup>h</sup>SN: social norm.</p>
            </fn>
            <fn id="table2fn9">
              <p><sup>i</sup>TP: trust in the provider.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Fornell-Larcker Criterion: square root of AVE<sup>a</sup> and correlation between latent variables (off-diagonal elements).<sup>b</sup></p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="260"/>
            <col width="80"/>
            <col width="80"/>
            <col width="80"/>
            <col width="80"/>
            <col width="80"/>
            <col width="80"/>
            <col width="260"/>
            <thead>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>AP<sup>c</sup></td>
                <td>CON<sup>d</sup></td>
                <td>IU<sup>e</sup></td>
                <td>PB<sup>f</sup></td>
                <td>PC<sup>g</sup></td>
                <td>SN<sup>h</sup></td>
                <td>TP<sup>i</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>AP</td>
                <td>
                  <italic>0.958</italic>
                </td>
                <td>—<sup>j</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>CON</td>
                <td>–0.767</td>
                <td>
                  <italic>0.891</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>IU</td>
                <td>–0.781</td>
                <td>0.770</td>
                <td>
                  <italic>0.898</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>PB</td>
                <td>–0.729</td>
                <td>0.560</td>
                <td>0.747</td>
                <td>
                  <italic>0.870</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>PC</td>
                <td>0.640</td>
                <td>–0.803</td>
                <td>–0.660</td>
                <td>–0.467</td>
                <td>
                  <italic>0.867</italic>
                </td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>SN</td>
                <td>–0.668</td>
                <td>0.753</td>
                <td>0.819</td>
                <td>0.487</td>
                <td>–0.610</td>
                <td>
                  <italic>0.883</italic>
                </td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>TP</td>
                <td>–0.877</td>
                <td>0.851</td>
                <td>0.811</td>
                <td>0.639</td>
                <td>–0.696</td>
                <td>0.690</td>
                <td>
                  <italic>0.905</italic>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>AVE: average variance extracted.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>Diagonal elements are in italics.</p>
            </fn>
            <fn id="table3fn3">
              <p><sup>c</sup>AP: attitude to privacy.</p>
            </fn>
            <fn id="table3fn4">
              <p><sup>d</sup>CON: perceived control over personal data.</p>
            </fn>
            <fn id="table3fn5">
              <p><sup>e</sup>IU: intention to use.</p>
            </fn>
            <fn id="table3fn6">
              <p><sup>f</sup>PB: perceived benefits.</p>
            </fn>
            <fn id="table3fn7">
              <p><sup>g</sup>PC: privacy concerns.</p>
            </fn>
            <fn id="table3fn8">
              <p><sup>h</sup>SN: social norm.</p>
            </fn>
            <fn id="table3fn9">
              <p><sup>i</sup>TP: trust in the provider.</p>
            </fn>
            <fn id="table3fn10">
              <p><sup>j</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Goodness-of-fit measures of the CB-SEM<sup>a</sup>, following the recommendations for complex models and small samples [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="390"/>
            <col width="100"/>
            <col width="510"/>
            <thead>
              <tr valign="top">
                <td>Fit indices</td>
                <td>Sample</td>
                <td>Recommended cutoff criterion</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Chi-square (<italic>χ</italic><sup>2</sup>)</td>
                <td>933.148</td>
                <td>—<sup>b</sup></td>
              </tr>
              <tr valign="top">
                <td>Degrees of freedom (<italic>df</italic>)</td>
                <td>391</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Normed chi-square (<italic>χ</italic><sup>2</sup>/<italic>df</italic>)</td>
                <td>2.387</td>
                <td>&#60;3</td>
              </tr>
              <tr valign="top">
                <td>CFI<sup>c</sup></td>
                <td>0.940</td>
                <td>&#62;0.93</td>
              </tr>
              <tr valign="top">
                <td>RMSEA<sup>d</sup></td>
                <td>0.074</td>
                <td>Values &#60; 0.08 with CFI &#62;0.93</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>CB-SEM: covariance-based structural equation modeling.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>Not applicable; they do not have cutoff criteria. Nonetheless, they are part of the fit indices report as standard information, which is needed for the normed chi-square (which has a cutoff).</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>CFI: comparative fit index.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>RMSEA: root-mean-square error of approximation.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>All fit indices indicate a good fit. The test of overall model fit resulted in a chi-square value (<italic>χ</italic><sup>2</sup>) of 933.148 with 391 degrees of freedom (<italic>df</italic>) and a <italic>P</italic> value of &#60;.001. Because of the dependence of the chi-square statistic on sample size and model complexity, the significant <italic>P</italic> value is negligible, and the use of the normed chi-square (<italic>χ</italic><sup>2</sup>/<italic>df</italic>) is advisable [<xref ref-type="bibr" rid="ref20">20</xref>]. For our model, this ratio indicates a good fit with <italic>χ</italic><sup>2</sup>/<italic>df</italic>=2.387, which is below the threshold of 3. Furthermore, an absolute RMSEA and an incremental fit index (CFI) were calculated. Both the RMSEA (0.074) and the CFI (0.94) meet the necessary criteria for a good model fit.</p>
      </sec>
      <sec>
        <title>Results of the Structural Model</title>
        <p>After the fit of CB-SEM has been evaluated, we now describe the structural model in more detail. <xref rid="figure2" ref-type="fig">Figure 2</xref> represents the path coefficients and the corresponding <italic>P</italic> values. We include age, gender, education, mHealth experience, and the usage of wearables as control variables to control for the variance explained by these variables.</p>
        <p><xref ref-type="table" rid="table5">Table 5</xref> summarizes the detailed analysis of the path coefficients. The <italic>R</italic><sup>2</sup> value for the intention to use and the other <italic>R</italic><sup>2</sup> values (for perceived benefits, privacy concerns, and trust in the provider) exceed the cutoff value of 0.4 [<xref ref-type="bibr" rid="ref68">68</xref>] and suggest a good model fit. Consistent with our expectations, perceived benefits has a significant effect on the intention to use (<italic>P</italic>&#60;.001), as well as trust in the provider (<italic>P</italic>&#60;.001) and social norms (<italic>P</italic>&#60;.001), supporting H1, H3, and H4. Privacy concerns do not have a significant effect on the intention to use (<italic>P</italic>=.14). Consequently, H2 is rejected. Perceived control over personal data has significant effects on privacy concerns (<italic>P</italic>&#60;.001) and trust in the provider (<italic>P</italic>&#60;.001), while there is no significant effect on intention to use (<italic>P</italic>=.40). Thus, H5a is rejected, while H5b and H5c are supported. The attitude to privacy has significant effects on perceived benefits (<italic>P</italic>&#60;.001) and trust in the provider (<italic>P</italic>&#60;.001), thus supporting H6b and H6d. The attitude to privacy, however, has no significant effect on the intention to use (<italic>P</italic>=.20) as well as on privacy concerns (<italic>P</italic>=.41), rejecting H6a and H6c. Our model explains <italic>R</italic><sup>2</sup>=79.3% of the variance in our main dependent variable, that is, intention to use mHealth technologies, controlling for demographic variables and the reported usage of wearables and mHealth apps. The control variables gender (<italic>P</italic>=.75), education (<italic>P</italic>=.92), and the reported usage of wearables (<italic>P</italic>=.24) were not related to the intention to use, whereas age was related negatively (<italic>P</italic>=.002) and the experience with mHealth apps was related positively to intention to use (<italic>P</italic>=.03).</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Factor relationships in the structural model. Solid lines represent statistically significant links and dashed lines represent statistically nonsignificant links. *<italic>P</italic>&#60;.05. **<italic>P</italic>&#60;.01. ***<italic>P</italic>&#60;.001. ns: not significant.</p>
          </caption>
          <graphic xlink:href="humanfactors_v10i1e45503_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Path coefficients and hypothesis testing.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="250"/>
            <col width="240"/>
            <col width="130"/>
            <col width="100"/>
            <col width="280"/>
            <thead>
              <tr valign="top">
                <td>Hypothesis</td>
                <td>Construct A → B</td>
                <td>Path coefficient</td>
                <td><italic>P</italic> value</td>
                <td>Supported</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>H1</td>
                <td>PB<sup>a</sup> → IU<sup>b</sup></td>
                <td>0.380</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H2</td>
                <td>PC<sup>c</sup> → IU</td>
                <td>–0.086</td>
                <td>.14</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H3</td>
                <td>TP<sup>d</sup> → IU</td>
                <td>0.342</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H4</td>
                <td>SN<sup>e</sup> → IU</td>
                <td>0.478</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H5a</td>
                <td>CON<sup>f</sup> → IU</td>
                <td>–0.078</td>
                <td>.40</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H5b</td>
                <td>CON → PC</td>
                <td>–0.758</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H5c</td>
                <td>CON → TP</td>
                <td>0.432</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H6a</td>
                <td>AP<sup>g</sup> → IU</td>
                <td>0.110</td>
                <td>.20</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H6b</td>
                <td>AP → PB</td>
                <td>–0.729</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H6c</td>
                <td>AP → PC</td>
                <td>0.059</td>
                <td>.41</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H6d</td>
                <td>AP → TP</td>
                <td>–0.545</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>Controls</td>
                <td>Age → IU</td>
                <td>–0.173</td>
                <td>.002</td>
                <td>N/A<sup>h</sup></td>
              </tr>
              <tr valign="top">
                <td>Controls</td>
                <td>Gender → IU</td>
                <td>–0.02</td>
                <td>.75</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Controls</td>
                <td>Education → IU</td>
                <td>0.006</td>
                <td>.92</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Controls</td>
                <td>Experience with mHealth<sup>i</sup> → IU</td>
                <td>0.174</td>
                <td>.03</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Controls</td>
                <td>Wearable usage → IU</td>
                <td>0.082</td>
                <td>.24</td>
                <td>N/A</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table5fn1">
              <p><sup>a</sup>PB: perceived benefits.</p>
            </fn>
            <fn id="table5fn2">
              <p><sup>b</sup>IU: intention to use.</p>
            </fn>
            <fn id="table5fn3">
              <p><sup>c</sup>PC: privacy concerns.</p>
            </fn>
            <fn id="table5fn4">
              <p><sup>d</sup>TP: trust in the provider.</p>
            </fn>
            <fn id="table5fn5">
              <p><sup>e</sup>SN: social norm.</p>
            </fn>
            <fn id="table5fn6">
              <p><sup>f</sup>CON: perceived control over personal data.</p>
            </fn>
            <fn id="table5fn7">
              <p><sup>g</sup>AP: attitude to privacy.</p>
            </fn>
            <fn id="table5fn8">
              <p><sup>h</sup>N/A: not applicable. Controls are not part of the hypothesis section; consequently, there is nothing that could be supported or rejected. Nonetheless, they are part of the results.</p>
            </fn>
            <fn id="table5fn9">
              <p><sup>i</sup>mHealth: mobile health.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This study examined whether the intention to use mHealth apps could be described by an extended privacy calculus model that considers social norms, perceived data autonomy, and the attitude to privacy of the user. Furthermore, we examined the influence of control variables on intention to use, of which mHealth experience and age had a significant effect. Users who already had experience with mHealth apps and were familiar with similar apps had a greater intention to use them. This has already been demonstrated in other studies [<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. Age had a significant inhibiting effect on intention to use, which is in line with other studies on mHealth technology [<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        <p>With overall complexity similar to existing models, the suggested model explains the variance (<italic>R</italic><sup>2</sup>) in users’ intention to use mHealth apps more effectively than other reported models (where values do not exceed 0.5 [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref18">18</xref>] or are not reported [<xref ref-type="bibr" rid="ref19">19</xref>]).</p>
        <p>An important, albeit expected, finding is that the more benefits users perceive, the higher their intention to use mHealth apps. That is, if the product is perceived to be useful or if there are benefits (eg, economic or utilitarian) users value, they are more likely to use it. Unexpectedly, in the context of health insurance apps, perceptions of benefits outweigh perceived risks, which had no part in our privacy calculus. Our model suggests that this can be attributed in part to the level of perceived control over personal data or a lack thereof, which acts as a mitigating factor that reduces or increases users’ perception of risk in the context of data protection (negative path coefficient=–0.758). That is, the more users think they are in control of their data, the less concerned they are about disclosing personal data and vice versa.</p>
        <p>The results of this study also underline the salient role of users’ attitudes to privacy. According to the model, the more trust is placed in the provider, the more likely the mHealth app will be used. This relationship is in part explained by the trait-factor attitude toward privacy. When privacy issues are particularly important to users, trust in the provider tends to be lower (negative path coefficient=–0.545). In addition, users’ attitude to privacy has an indirect influence on the intention to use of mHealth apps and wearables. Users’ perceptions of benefits are negatively correlated with the attention they pay to data privacy (negative path coefficient=–0.729). Thus, the more users are concerned about data privacy, the more they devalue the benefits of data-collecting technologies. This means that in the mHealth domain, benefits (eg, financial gains as in the vignette) tend to be a less compelling argument to use this technology for those who are concerned about data privacy. However, if this relationship holds for less tangible health benefits, such as more efficient treatment, better communication with medical institutions, or early detection of diseases, remains to be seen in future studies.</p>
        <p>Finally, social norms, that is, the opinions, experiences, and recommendations of close relatives, are also influencing the intention to use mHealth apps. In fact, social norms were the strongest drivers for the intention to use mHealth technology (path coefficient=0.478) in our study. This conforms with findings from social psychological research suggesting that people tend to adopt the opinion of their peers or relatives [<xref ref-type="bibr" rid="ref71">71</xref>]. Thus, if the social environment supports mHealth technology use, these technologies are more likely to be used.</p>
      </sec>
      <sec>
        <title>Implications</title>
        <p>Based on the results, there are several possibilities for health care providers to increase the intention to use mHealth apps. First, users’ perceived data autonomy could be increased by offering an easy-to-use digital infrastructure for managing personal health data, which may ultimately increase users’ intention to use the mHealth technology. Second, because users, who are concerned about data privacy, may not want to use mHealth apps (even if they benefit them), providers may want to consider new and user-friendly ways to inform about data storage and processing policies to increase trust in critical users. This could be implemented, for example, through a user-centered app design, an easy-to-comprehend text design, and a focus on transparency [<xref ref-type="bibr" rid="ref40">40</xref>]. Finally, to increase uptake, social norms may be activated, for instance, via testimonials of satisfied users and a reward program for recommending the app to friends and family. Additionally, customer journeys may be tracked to understand and support the social dynamics underlying the use of mHealth apps during the postpurchase phase (eg, by tracking customers’ reviews, recommendations, and posts on social media) to improve the product and ultimately increase the intention to use it [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref73">73</xref>].</p>
      </sec>
      <sec>
        <title>Limitations and Future Directions</title>
        <p>This study has several limitations that must be addressed in future research. The model was tested on a German population. However, it is evident that the use of data-collecting technology and its acceptance are strongly influenced by culture [<xref ref-type="bibr" rid="ref74">74</xref>]. Compared with other European countries, Germans are particularly careful when it comes to using personal information online [<xref ref-type="bibr" rid="ref75">75</xref>]. Furthermore, the sample is homogeneous in that every person residing in Germany is required to have health insurance. Thus, the probability of using a health insurance app is significantly higher than for other mHealth apps. This may also be a reason for the high explained variance (<italic>R</italic><sup>2</sup>) of the model. Future studies should check the validity and generalizability across different cultural backgrounds.</p>
        <p>There is also the limitation that the sample was relatively tech-savvy, as evidenced by the proportion of participants who reported using wearables (73/250, 29.2%), which is higher than in previous studies. For instance, in 2021, only 21% of a representative German sample reported to use wearables regularly in a survey study [<xref ref-type="bibr" rid="ref76">76</xref>], which could raise doubts about the representativeness of the presented data. By contrast, the number of wearable users may have also increased during the COVID-19 pandemic, which generally boosted digitalization in health care [<xref ref-type="bibr" rid="ref77">77</xref>]. Nonetheless, future studies should validate our results in representative samples.</p>
        <p>Another limitation is that the study’s scenario involves an app from a widely known German health insurance company, which generally has a very high reputation in the German health care system and whose motivation for publishing an app may be less driven by economic concerns than that of companies in the private sector. It is thus likely that participants perceived health insurance more positively than a commercial provider of mHealth apps. Follow-up studies must show whether the model we presented also explains the usage intention of commercial mHealth apps. Further, denial of coverage is a rather unlikely scenario in the German health care system. A more realistic scenario should be used in a future study.</p>
        <p>Hence, future research should investigate which features trigger perceived data autonomy in users to shed more light on why apps are perceived as more or less trustworthy. A mixed methods approach (eg, an interview study to generate hypotheses and a subsequent survey study to validate them) would be a first step in examining the factors influencing the effects of perceived data autonomy on the intention to (not) use mHealth apps [<xref ref-type="bibr" rid="ref78">78</xref>].</p>
        <p>Finally, in this study, injunctive social norms were operationalized with respect to recommendations and approval of mHealth apps by friends and families. To what extent health professionals activate injunctive social norms to increase or decrease intention to use [<xref ref-type="bibr" rid="ref24">24</xref>] remains to be seen in future studies.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>We showed that our model can explain the intention to use mHealth apps more effectively than previous privacy calculus models in the mHealth domain. Specifically, we were able to show that in addition to the factors related to costs and benefits included in the original privacy calculus model, the intention to use mHealth apps is influenced by 3 additional factors: (1) The perceived data autonomy has an indirect influence on the intention to use mHealth apps by reducing privacy concerns and increasing trust in the provider. (2) The trait-factor attitude to privacy explains users’ trust in the provider and shows that users who are concerned about data privacy can hardly be convinced to use mHealth apps based on their potential benefits. (3) Social norms, that is, the opinions, experiences, and recommendations shared by one’s relatives and friends, influence users’ intention to (not) use mHealth apps. Together, these findings allow health care providers to improve their products and to increase usage by targeting specific user groups.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Case vignette.</p>
        <media xlink:href="humanfactors_v10i1e45503_app1.docx" xlink:title="DOCX File , 13 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Questionnaire.</p>
        <media xlink:href="humanfactors_v10i1e45503_app2.docx" xlink:title="DOCX File , 16 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AP</term>
          <def>
            <p>attitude to privacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CB-SEM</term>
          <def>
            <p>covariance-based structural equation modeling</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">CFI</term>
          <def>
            <p>comparative fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">CON</term>
          <def>
            <p>perceived control over personal data</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">CR</term>
          <def>
            <p>composite reliability</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">IU</term>
          <def>
            <p>intention to use</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">PB</term>
          <def>
            <p>perceived benefits</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">PC</term>
          <def>
            <p>privacy concerns</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">RMSEA</term>
          <def>
            <p>root-mean-square error of approximation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">SN</term>
          <def>
            <p>social norm</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">SNS</term>
          <def>
            <p>social network site</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb16">TP</term>
          <def>
            <p>trust in the provider</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>We acknowledge support from the German Research Foundation and the Open Access Publication Fund of TU Berlin. We also thank the eV Studienwerk Villigst and the German Federal Ministry of Education and Research, who provided the doctoral scholarship (NvK) without which this research would not have been possible. We thank the health insurance company BARMER for their cooperation in conducting the survey, especially Tanja Rehr-Meyborg and Magdalene Grahl, as well as all those who participated in the study.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>The survey was funded by BARMER. We, the authors, state that we are not in an employment relationship with BARMER nor have we accepted any other payments. BARMER had no influence on the design of the study, the questionnaire, the analysis, and the interpretation of results. The study design for execution was given by us directly to the survey agency, just as we got the data set directly from them without any interference from the health insurance company.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>eHealth Monitor 2021 - Deutschlands Weg in die digitale Gesundheitsversorgung</article-title>
          <source>McKinsey &#38; Company</source>
          <year>2021</year>
          <access-date>2023-04-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mckinsey.de/~/media/mckinsey/locations/europe%20and%20middle%20east/deutschland/news/presse/2021/2021-11-18%20ehealth%20monitor%202021/mckinsey_ehealth%20monitor%202021_ebook-pdf.pdf">https://www.mckinsey.de/~/media/mckinsey/locations/europe%20and%20middle%20east/deutschland/news/presse/2021/2021-11-18%20ehealth%20monitor%202021/mckinsey_ehealth%20monitor%202021_ebook-pdf.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>WHO Global Observatory for eHealth</collab>
          </person-group>
          <article-title>mHealth: new horizons for health through mobile technologies: second global survey on eHealth</article-title>
          <source>World Health Organization</source>
          <year>2011</year>
          <access-date>2023-07-26</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://apps.who.int/iris/bitstream/handle/10665/44607/9789241564250_eng.pdf?sequence=1&#38;isAllowed=y">https://apps.who.int/iris/bitstream/handle/10665/44607/9789241564250_eng.pdf?sequence=1&#38;isAllowed=y</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vo</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Auroy</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sarradon-Eck</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Patients' Perceptions of mHealth Apps: Meta-Ethnographic Review of Qualitative Studies</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>07</month>
          <day>10</day>
          <volume>7</volume>
          <issue>7</issue>
          <fpage>e13817</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/7/e13817/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13817</pub-id>
          <pub-id pub-id-type="medline">31293246</pub-id>
          <pub-id pub-id-type="pii">v7i7e13817</pub-id>
          <pub-id pub-id-type="pmcid">PMC6652126</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marrie</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Leung</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tyry</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Cutter</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Salter</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Use of eHealth and mHealth technology by persons with multiple sclerosis</article-title>
          <source>Mult Scler Relat Disord</source>
          <year>2019</year>
          <month>01</month>
          <volume>27</volume>
          <fpage>13</fpage>
          <lpage>19</lpage>
          <pub-id pub-id-type="doi">10.1016/j.msard.2018.09.036</pub-id>
          <pub-id pub-id-type="medline">30296732</pub-id>
          <pub-id pub-id-type="pii">S2211-0348(18)30352-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fleming</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Petrie</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Bergenstal</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Holl</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Heinemann</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Diabetes Digital App Technology: Benefits, Challenges, and Recommendations. A Consensus Report by the European Association for the Study of Diabetes (EASD) and the American Diabetes Association (ADA) Diabetes Technology Working Group</article-title>
          <source>Diabetes Care</source>
          <year>2020</year>
          <month>01</month>
          <volume>43</volume>
          <issue>1</issue>
          <fpage>250</fpage>
          <lpage>260</lpage>
          <pub-id pub-id-type="doi">10.2337/dci19-0062</pub-id>
          <pub-id pub-id-type="medline">31806649</pub-id>
          <pub-id pub-id-type="pii">dci19-0062</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Braghin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Cimato</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Della</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Are mHealth Apps Secure? A Case Study</article-title>
          <source>Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)</source>
          <year>2018</year>
          <conf-name>2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)</conf-name>
          <conf-date>July 23-27, 2018</conf-date>
          <conf-loc>Tokyo, Japan</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>335</fpage>
          <lpage>340</lpage>
          <pub-id pub-id-type="doi">10.1109/COMPSAC.2018.10253</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nurgalieva</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>O'Callaghan</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Security and Privacy of mHealth Applications: A Scoping Review</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>104247</fpage>
          <lpage>104268</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.2999934</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Kolfschooten</surname>
              <given-names>Hannah</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Shachar</surname>
              <given-names>Carmel</given-names>
            </name>
            <name name-style="western">
              <surname>Robertson</surname>
              <given-names>Christopher</given-names>
            </name>
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>I. Glenn</given-names>
            </name>
            <name name-style="western">
              <surname>Minssen</surname>
              <given-names>Timo</given-names>
            </name>
            <name name-style="western">
              <surname>Price II</surname>
              <given-names>W. Nicholson</given-names>
            </name>
          </person-group>
          <article-title>The mHealth Power Paradox: Improving Data Protection in Health Apps through Self-Regulation in the European Union</article-title>
          <source>The Future of Medical Device Regulation: Innovation and Protection</source>
          <year>2022</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Cambridge University Press</publisher-name>
          <fpage>63</fpage>
          <lpage>76</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paul</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Scheibe</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nilakanta</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy Concerns regarding Wearable IoT Devices: How it is Influenced by GDPR?</article-title>
          <source>Proceedings of the 53rd Hawaii International Conference on System Sciences</source>
          <year>2020</year>
          <conf-name>Hawaii International Conference on System Sciences</conf-name>
          <conf-date>January 7-10, 2020</conf-date>
          <conf-loc>Wailea, HI</conf-loc>
          <fpage>4388</fpage>
          <lpage>4397</lpage>
          <pub-id pub-id-type="doi">10.24251/hicss.2020.536</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kokolakis</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon</article-title>
          <source>Comput Secur</source>
          <year>2017</year>
          <month>01</month>
          <volume>64</volume>
          <fpage>122</fpage>
          <lpage>134</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2015.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Albano</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>D?Atri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>Ashish</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>VL</given-names>
            </name>
            <name name-style="western">
              <surname>Greenes</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Individuals' Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective</article-title>
          <source>Advances in Healthcare Informatics and Analytics</source>
          <year>2016</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer International Publishing</publisher-name>
          <fpage>19</fpage>
          <lpage>50</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox</article-title>
          <source>Sustainability</source>
          <year>2020</year>
          <month>06</month>
          <day>24</day>
          <volume>12</volume>
          <issue>12</issue>
          <fpage>5163</fpage>
          <pub-id pub-id-type="doi">10.3390/su12125163</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>An Extended Privacy Calculus Model for E-Commerce Transactions</article-title>
          <source>Inf Syst Res</source>
          <year>2006</year>
          <month>03</month>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>61</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1060.0080</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Michael</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Factors affecting privacy disclosure on social network sites: an integrated model</article-title>
          <source>Electron Commer Res</source>
          <year>2013</year>
          <month>3</month>
          <day>26</day>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>151</fpage>
          <lpage>168</lpage>
          <pub-id pub-id-type="doi">10.1007/s10660-013-9111-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View</article-title>
          <source>ICIS 2008 Proceedings</source>
          <year>2008</year>
          <conf-name>Twenty Ninth International Conference on Information Systems (ICIS 2008)</conf-name>
          <conf-date>December 14-17, 2008</conf-date>
          <conf-loc>Paris, France</conf-loc>
          <fpage>1</fpage>
          <lpage>17</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krasnova</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Spiekermann</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Koroleva</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hildebrand</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Online Social Networks: Why We Disclose</article-title>
          <source>J Inf Technol</source>
          <year>2010</year>
          <month>06</month>
          <day>01</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>109</fpage>
          <lpage>125</lpage>
          <pub-id pub-id-type="doi">10.1057/jit.2010.6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sarathy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Understanding Situational Online Information Disclosure as a Privacy Calculus</article-title>
          <source>J Comput Inf Syst</source>
          <year>2010</year>
          <volume>51</volume>
          <issue>1</issue>
          <fpage>62</fpage>
          <lpage>71</lpage>
          <pub-id pub-id-type="doi">10.1080/08874417.2010.11645450</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue</article-title>
          <source>Telemat Inform</source>
          <year>2021</year>
          <month>08</month>
          <volume>61</volume>
          <fpage>101601</fpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2021.101601</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cherif</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bezaz</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Mzoughi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Do personal health concerns and trust in healthcare providers mitigate privacy concerns? Effects on patients' intention to share personal health data on electronic health records</article-title>
          <source>Soc Sci Med</source>
          <year>2021</year>
          <month>08</month>
          <volume>283</volume>
          <fpage>114146</fpage>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2021.114146</pub-id>
          <pub-id pub-id-type="medline">34242891</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(21)00478-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Black</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Babin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Multivariate data analysis</source>
          <year>2019</year>
          <publisher-loc>Andover, Hampshire, UK</publisher-loc>
          <publisher-name>Cengage Learning, EMEA</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Papoutsi</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Reed</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Marston</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Majeed</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2015</year>
          <month>10</month>
          <day>14</day>
          <volume>15</volume>
          <fpage>86</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-015-0202-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-015-0202-2</pub-id>
          <pub-id pub-id-type="medline">26466787</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-015-0202-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC4607170</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hartmann</surname>
              <given-names>Martin</given-names>
            </name>
          </person-group>
          <source>Die Praxis des Vertrauens</source>
          <year>2011</year>
          <publisher-loc>Berlin, Germany</publisher-loc>
          <publisher-name>Suhrkamp</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>von Kalckreuth</surname>
              <given-names>Niklas</given-names>
            </name>
            <name name-style="western">
              <surname>Feufel</surname>
              <given-names>M.A.</given-names>
            </name>
          </person-group>
          <article-title>Disclosure of Health Data – Conceptualizing the Intention to Use Wearables as an Extended Privacy Calculus</article-title>
          <source>AMCIS 2021 Proceedings</source>
          <year>2021</year>
          <conf-name>AMCIS 2021</conf-name>
          <conf-date>August 9-13, 2021</conf-date>
          <conf-loc>Montreal, QC, Canada</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bettiga</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lamberti</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lettieri</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Individuals' adoption of smart technologies for preventive health care: a structural equation modeling approach</article-title>
          <source>Health Care Manag Sci</source>
          <year>2020</year>
          <month>06</month>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>203</fpage>
          <lpage>214</lpage>
          <pub-id pub-id-type="doi">10.1007/s10729-019-09468-2</pub-id>
          <pub-id pub-id-type="medline">30684067</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10729-019-09468-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Woldeyohannes</surname>
              <given-names>Hanna O.</given-names>
            </name>
            <name name-style="western">
              <surname>Ngwenyama</surname>
              <given-names>Ojelanki K.</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Nah</surname>
              <given-names>Fiona Fui-Hoon</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>Chuan-Hoo</given-names>
            </name>
          </person-group>
          <article-title>Factors Influencing Acceptance and Continued Use of mHealth Apps</article-title>
          <source>HCI in Business, Government and Organizations. Interacting with Information Systems</source>
          <year>2017</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>239</fpage>
          <lpage>256</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alam</surname>
              <given-names>MMD</given-names>
            </name>
            <name name-style="western">
              <surname>Alam</surname>
              <given-names>MZ</given-names>
            </name>
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Taghizadeh</surname>
              <given-names>SK</given-names>
            </name>
          </person-group>
          <article-title>Factors influencing mHealth adoption and its impact on mental well-being during COVID-19 pandemic: A SEM-ANN approach</article-title>
          <source>J Biomed Inform</source>
          <year>2021</year>
          <month>04</month>
          <volume>116</volume>
          <fpage>103722</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(21)00051-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2021.103722</pub-id>
          <pub-id pub-id-type="medline">33705856</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(21)00051-4</pub-id>
          <pub-id pub-id-type="pmcid">PMC8970651</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>JX</given-names>
            </name>
          </person-group>
          <article-title>Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences</article-title>
          <source>Comput Hum Behav</source>
          <year>2015</year>
          <month>11</month>
          <volume>52</volume>
          <fpage>278</fpage>
          <lpage>292</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.06.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Plangger</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Montecchi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Thinking beyond Privacy Calculus: Investigating Reactions to Customer Surveillance</article-title>
          <source>J Interact Mark</source>
          <year>2022</year>
          <month>02</month>
          <day>15</day>
          <volume>50</volume>
          <issue>1</issue>
          <fpage>32</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1016/j.intmar.2019.10.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Milne</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Culnan</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices</article-title>
          <source>J Interact Mark</source>
          <year>2004</year>
          <month>05</month>
          <day>01</day>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>15</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1002/dir.20009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paine</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Reips</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Stieger</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Joinson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Buchanan</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’</article-title>
          <source>Int J Hum-Comput Stud</source>
          <year>2007</year>
          <month>6</month>
          <volume>65</volume>
          <issue>6</issue>
          <fpage>526</fpage>
          <lpage>536</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijhcs.2006.12.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Keshta</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Odeh</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy of electronic health records: Concerns and challenges</article-title>
          <source>Egypt Inform J</source>
          <year>2021</year>
          <month>07</month>
          <volume>22</volume>
          <issue>2</issue>
          <fpage>177</fpage>
          <lpage>183</lpage>
          <pub-id pub-id-type="doi">10.1016/j.eij.2020.07.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pan</surname>
              <given-names>Adam</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Fan</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kurosu</surname>
              <given-names>Masaaki</given-names>
            </name>
          </person-group>
          <article-title>User Acceptance Factors for mHealth</article-title>
          <source>Human-Computer Interaction: Interaction in Context</source>
          <year>2018</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>173</fpage>
          <lpage>184</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Luhmann</surname>
              <given-names>Niklas</given-names>
            </name>
          </person-group>
          <source>Vertrauen : Ein Mechanismus der Reduktion Sozialer Komplexität</source>
          <year>2014</year>
          <publisher-loc>Stuttgart, Germany</publisher-loc>
          <publisher-name>Lucius &#38; Lucius</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dwyer</surname>
              <given-names>Catherine</given-names>
            </name>
            <name name-style="western">
              <surname>Hiltz</surname>
              <given-names>Starr Roxanne</given-names>
            </name>
            <name name-style="western">
              <surname>Passerini</surname>
              <given-names>Katia</given-names>
            </name>
          </person-group>
          <article-title>Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace</article-title>
          <source>AMCIS 2007 Proceedings</source>
          <year>2007</year>
          <conf-name>AMCIS 2007</conf-name>
          <conf-date>August 10-12, 2007</conf-date>
          <conf-loc>Keystone, CO</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rousseau</surname>
              <given-names>Denise M.</given-names>
            </name>
            <name name-style="western">
              <surname>Sitkin</surname>
              <given-names>Sim B.</given-names>
            </name>
            <name name-style="western">
              <surname>Burt</surname>
              <given-names>Ronald S.</given-names>
            </name>
            <name name-style="western">
              <surname>Camerer</surname>
              <given-names>Colin</given-names>
            </name>
          </person-group>
          <article-title>Not So Different After All: A Cross-Discipline View Of Trust</article-title>
          <source>Acad Manage Rev</source>
          <year>1998</year>
          <month>07</month>
          <day>01</day>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>393</fpage>
          <lpage>404</lpage>
          <pub-id pub-id-type="doi">10.5465/Amr.1998.926617</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kulyk</surname>
              <given-names>Oksana</given-names>
            </name>
            <name name-style="western">
              <surname>Milanovic</surname>
              <given-names>Kristina</given-names>
            </name>
            <name name-style="western">
              <surname>Pitt</surname>
              <given-names>Jeremy</given-names>
            </name>
          </person-group>
          <article-title>Does My Smart Device Provider Care About My Privacy? Investigating Trust Factors and User Attitudes in IoT Systems</article-title>
          <source>Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society</source>
          <year>2020</year>
          <conf-name>NordiCHI '20: Shaping Experiences, Shaping Society</conf-name>
          <conf-date>October 25-29, 2020</conf-date>
          <conf-loc>Tallinn, Estonia</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>ACM</publisher-name>
          <pub-id pub-id-type="doi">10.1145/3419249.3420108</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mcknight</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Clay</surname>
              <given-names>PF</given-names>
            </name>
          </person-group>
          <article-title>Trust in a specific technology</article-title>
          <source>ACM Trans Manag Inf Syst</source>
          <year>2011</year>
          <month>07</month>
          <day>01</day>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1145/1985347.1985353</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Akter</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>D'Ambra</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ray</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Trustworthiness in mHealth information services: An assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS)</article-title>
          <source>J Am Soc Inf Sci Technol</source>
          <year>2010</year>
          <month>10</month>
          <day>25</day>
          <volume>62</volume>
          <issue>1</issue>
          <fpage>100</fpage>
          <lpage>116</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.21442</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atienza</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Zarcadoolas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vaughon</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hughes</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>WS</given-names>
            </name>
            <name name-style="western">
              <surname>Pritts</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study</article-title>
          <source>J Health Commun</source>
          <year>2015</year>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>673</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1080/10810730.2015.1018560</pub-id>
          <pub-id pub-id-type="medline">25868685</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Haasteren</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gille</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Fadda</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Development of the mHealth App Trustworthiness checklist</article-title>
          <source>Digit Health</source>
          <year>2019</year>
          <volume>5</volume>
          <fpage>2055207619886463</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/abs/10.1177/2055207619886463?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2055207619886463</pub-id>
          <pub-id pub-id-type="medline">31803490</pub-id>
          <pub-id pub-id-type="pii">10.1177_2055207619886463</pub-id>
          <pub-id pub-id-type="pmcid">PMC6876327</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jusob</surname>
              <given-names>FR</given-names>
            </name>
            <name name-style="western">
              <surname>George</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mapp</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world</article-title>
          <source>Z Gesundh Wiss</source>
          <year>2022</year>
          <month>06</month>
          <day>18</day>
          <volume>30</volume>
          <issue>1</issue>
          <fpage>37</fpage>
          <lpage>47</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34178579"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10389-021-01608-9</pub-id>
          <pub-id pub-id-type="medline">34178579</pub-id>
          <pub-id pub-id-type="pii">1608</pub-id>
          <pub-id pub-id-type="pmcid">PMC8213038</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>Byoungsoo</given-names>
            </name>
            <name name-style="western">
              <surname>Min</surname>
              <given-names>Jinyoung</given-names>
            </name>
          </person-group>
          <article-title>The distinct roles of dedication-based and constraint-based mechanisms in social networking sites</article-title>
          <source>Internet Res</source>
          <year>2013</year>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1108/intr-11-2013-0253</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Geber</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hefner</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Social norms as communicative phenomena: A communication perspective on the theory of normative social behavior</article-title>
          <source>SCM</source>
          <year>2019</year>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>6</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.5771/2192-4007-2019-1-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Tao</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Qu</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Understanding consumer acceptance of healthcare wearable devices: An integrated model of UTAUT and TTF</article-title>
          <source>Int J Med Inform</source>
          <year>2020</year>
          <month>07</month>
          <volume>139</volume>
          <fpage>104156</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2020.104156</pub-id>
          <pub-id pub-id-type="medline">32387819</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(19)31143-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Skinner</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Chapman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Baltes</surname>
              <given-names>PB</given-names>
            </name>
          </person-group>
          <article-title>Control, means-ends, and agency beliefs: A new conceptualization and its measurement during childhood</article-title>
          <source>J Pers Soc Psychol</source>
          <year>1988</year>
          <month>01</month>
          <volume>54</volume>
          <issue>1</issue>
          <fpage>117</fpage>
          <lpage>133</lpage>
          <pub-id pub-id-type="doi">10.1037/0022-3514.54.1.117</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Slee</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>The effects of information privacy concerns on digitizing personal health records</article-title>
          <source>J Assn Inf Sci Tec</source>
          <year>2014</year>
          <month>04</month>
          <day>21</day>
          <volume>65</volume>
          <issue>8</issue>
          <fpage>1541</fpage>
          <lpage>1554</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.23068</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Radley-Gardner</surname>
              <given-names>Oliver</given-names>
            </name>
            <name name-style="western">
              <surname>Beale</surname>
              <given-names>Hugh</given-names>
            </name>
            <name name-style="western">
              <surname>Zimmermann</surname>
              <given-names>Reinhard</given-names>
            </name>
          </person-group>
          <source>Fundamental Texts On European Private Law</source>
          <year>2016</year>
          <publisher-loc>Oxfordshire, UK</publisher-loc>
          <publisher-name>Hart Publishing</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bosnjak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The Theory of Planned Behavior: Selected Recent Advances and Applications</article-title>
          <source>Eur J Psychol</source>
          <year>2020</year>
          <month>08</month>
          <volume>16</volume>
          <issue>3</issue>
          <fpage>352</fpage>
          <lpage>356</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33680187"/>
          </comment>
          <pub-id pub-id-type="doi">10.5964/ejop.v16i3.3107</pub-id>
          <pub-id pub-id-type="medline">33680187</pub-id>
          <pub-id pub-id-type="pii">ejop.v16i3.3107</pub-id>
          <pub-id pub-id-type="pmcid">PMC7909498</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Waldman</surname>
              <given-names>Ari Ezra</given-names>
            </name>
          </person-group>
          <source>Privacy as Trust: Information Privacy for an Information Age</source>
          <year>2018</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Cambridge University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Siegrist</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Trust and Risk Perception: A Critical Review of the Literature</article-title>
          <source>Risk Anal</source>
          <year>2021</year>
          <month>03</month>
          <volume>41</volume>
          <issue>3</issue>
          <fpage>480</fpage>
          <lpage>490</lpage>
          <pub-id pub-id-type="doi">10.1111/risa.13325</pub-id>
          <pub-id pub-id-type="medline">31046144</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Terpstra</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Emotions, trust, and perceived risk: affective and cognitive routes to flood preparedness behavior</article-title>
          <source>Risk Anal</source>
          <year>2011</year>
          <month>10</month>
          <volume>31</volume>
          <issue>10</issue>
          <fpage>1658</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1539-6924.2011.01616.x</pub-id>
          <pub-id pub-id-type="medline">21477090</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mills</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Reyna</surname>
              <given-names>VF</given-names>
            </name>
            <name name-style="western">
              <surname>Estrada</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Explaining contradictory relations between risk perception and risk taking</article-title>
          <source>Psychol Sci</source>
          <year>2008</year>
          <month>05</month>
          <volume>19</volume>
          <issue>5</issue>
          <fpage>429</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1467-9280.2008.02104.x</pub-id>
          <pub-id pub-id-type="medline">18466401</pub-id>
          <pub-id pub-id-type="pii">PSCI2104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kehr</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kowatsch</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wentzel</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fleisch</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus</article-title>
          <source>Info Systems J</source>
          <year>2015</year>
          <month>03</month>
          <day>18</day>
          <volume>25</volume>
          <issue>6</issue>
          <fpage>607</fpage>
          <lpage>635</lpage>
          <pub-id pub-id-type="doi">10.1111/isj.12062</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>Alessandro</given-names>
            </name>
          </person-group>
          <article-title>Privacy in electronic commerce and the economics of immediate gratification</article-title>
          <source>Proceedings of the 5th ACM conference on Electronic commerce  - EC '04</source>
          <year>2004</year>
          <conf-name>The 5th ACM Conference on Electronic commerce  - EC '04</conf-name>
          <conf-date>May 12-20, 2004</conf-date>
          <conf-loc>New York, NY</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>ACM Press</publisher-name>
          <fpage>21</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1145/988772.988777</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Finucane</surname>
              <given-names>Melissa L.</given-names>
            </name>
            <name name-style="western">
              <surname>Alhakami</surname>
              <given-names>Ali</given-names>
            </name>
            <name name-style="western">
              <surname>Slovic</surname>
              <given-names>Paul</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>Stephen M.</given-names>
            </name>
          </person-group>
          <article-title>The affect heuristic in judgments of risks and benefits</article-title>
          <source>J Behav Decis Mak</source>
          <year>2000</year>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1002/(sici)1099-0771(200001/03)13:1&#60;1::aid-bdm333&#62;3.0.co;2-s</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tversky</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kahneman</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Judgment under Uncertainty: Heuristics and Biases</article-title>
          <source>Science</source>
          <year>1974</year>
          <month>09</month>
          <day>27</day>
          <volume>185</volume>
          <issue>4157</issue>
          <fpage>1124</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1126/science.185.4157.1124</pub-id>
          <pub-id pub-id-type="medline">17835457</pub-id>
          <pub-id pub-id-type="pii">185/4157/1124</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
          <article-title>Technische Universität Berlin Ethics Committee</article-title>
          <source>Technische Universität Berlin</source>
          <access-date>2023-07-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.tu.berlin/en/ipa/about-us/representatives-and-committees/ethics-committee">https://www.tu.berlin/en/ipa/about-us/representatives-and-committees/ethics-committee</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yeh</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Exploring radio frequency identification technology's application in international distribution centers and adoption rate forecasting</article-title>
          <source>Technol Forecast Soc Change</source>
          <year>2011</year>
          <month>5</month>
          <volume>78</volume>
          <issue>4</issue>
          <fpage>661</fpage>
          <lpage>673</lpage>
          <pub-id pub-id-type="doi">10.1016/j.techfore.2010.10.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lancelot Miltgen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Popovič</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Oliveira</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context</article-title>
          <source>Decis Support Syst</source>
          <year>2013</year>
          <month>12</month>
          <volume>56</volume>
          <fpage>103</fpage>
          <lpage>114</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2013.05.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dienlin</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Metzger</surname>
              <given-names>Mj</given-names>
            </name>
          </person-group>
          <article-title>An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample</article-title>
          <source>J Comput-Mediat Comm</source>
          <year>2016</year>
          <month>08</month>
          <day>04</day>
          <volume>21</volume>
          <issue>5</issue>
          <fpage>368</fpage>
          <lpage>383</lpage>
          <pub-id pub-id-type="doi">10.1111/jcc4.12163</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Min</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost</article-title>
          <source>J Assn Inf Sci Tec</source>
          <year>2014</year>
          <month>05</month>
          <day>21</day>
          <volume>66</volume>
          <issue>4</issue>
          <fpage>839</fpage>
          <lpage>857</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.23206</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malhotra</surname>
              <given-names>Nk</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>Ss</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model</article-title>
          <source>Inf Syst Res</source>
          <year>2004</year>
          <month>12</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>336</fpage>
          <lpage>355</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moore</surname>
              <given-names>GC</given-names>
            </name>
            <name name-style="western">
              <surname>Benbasat</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation</article-title>
          <source>Inf Syst Res</source>
          <year>1991</year>
          <month>09</month>
          <volume>2</volume>
          <issue>3</issue>
          <fpage>192</fpage>
          <lpage>222</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.2.3.192</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>Joseph F</given-names>
            </name>
            <name name-style="western">
              <surname>Hult</surname>
              <given-names>G. Tomas M</given-names>
            </name>
            <name name-style="western">
              <surname>Ringle</surname>
              <given-names>Christian M</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>Marko</given-names>
            </name>
          </person-group>
          <source>A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)</source>
          <year>2017</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>SAGE</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rosseel</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>lavaan: An R Package for Structural Equation Modeling</article-title>
          <source>J Stat Softw</source>
          <year>2012</year>
          <volume>48</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>36</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jstatsoft.org/v48/i02/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blanz</surname>
              <given-names>Mathias</given-names>
            </name>
          </person-group>
          <source>Forschungsmethoden und Statistik für die Soziale Arbeit. Grundlagen und Anwendungen. 1. Aufl</source>
          <year>2015</year>
          <publisher-loc>Stuttgart, Germany</publisher-loc>
          <publisher-name>Kohlhammer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fornell</surname>
              <given-names>Claes</given-names>
            </name>
            <name name-style="western">
              <surname>Larcker</surname>
              <given-names>David F.</given-names>
            </name>
          </person-group>
          <article-title>Evaluating Structural Equation Models with Unobservable Variables and Measurement Error</article-title>
          <source>J Mark Research</source>
          <year>2018</year>
          <month>11</month>
          <day>28</day>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <lpage>50</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.2307/3151312"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/002224378101800104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Homburg</surname>
              <given-names>Christian</given-names>
            </name>
            <name name-style="western">
              <surname>Baumgartner</surname>
              <given-names>Hans</given-names>
            </name>
          </person-group>
          <article-title>Beurteilung von Kausalmodellen. Bestandsaufnahme und Anwendungsempfehlungen</article-title>
          <source>Marketing ZFP</source>
          <year>1995</year>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>162</fpage>
          <lpage>176</lpage>
          <pub-id pub-id-type="doi">10.15358/0344-1369-1995-3-162</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schomakers</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lidynia</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vervier</surname>
              <given-names>LS</given-names>
            </name>
            <name name-style="western">
              <surname>Calero Valdez</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Applying an Extended UTAUT2 Model to Explain User Acceptance of Lifestyle and Therapy Mobile Health Apps: Survey Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2022</year>
          <month>01</month>
          <day>18</day>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>e27095</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2022/1/e27095/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/27095</pub-id>
          <pub-id pub-id-type="medline">35040801</pub-id>
          <pub-id pub-id-type="pii">v10i1e27095</pub-id>
          <pub-id pub-id-type="pmcid">PMC8808343</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Uncovska</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Freitag</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Meister</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fehring</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Patient Acceptance of Prescribed and Fully Reimbursed mHealth Apps in Germany: An UTAUT2-based Online Survey Study</article-title>
          <source>J Med Syst</source>
          <year>2023</year>
          <month>01</month>
          <day>27</day>
          <volume>47</volume>
          <issue>1</issue>
          <fpage>14</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/36705853"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10916-023-01910-x</pub-id>
          <pub-id pub-id-type="medline">36705853</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-023-01910-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC9880914</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heirman</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Walrave</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ponnet</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Predicting adolescents' disclosure of personal information in exchange for commercial incentives: an application of an extended theory of planned behavior</article-title>
          <source>Cyberpsychol Behav Soc Netw</source>
          <year>2013</year>
          <month>02</month>
          <volume>16</volume>
          <issue>2</issue>
          <fpage>81</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1089/cyber.2012.0041</pub-id>
          <pub-id pub-id-type="medline">23113689</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hamilton</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ferraro</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Haws</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Mukhopadhyay</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Traveling with Companions: The Social Customer Journey</article-title>
          <source>J Mark</source>
          <year>2020</year>
          <month>03</month>
          <day>31</day>
          <volume>85</volume>
          <issue>1</issue>
          <fpage>68</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1177/0022242920908227</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <collab>Deutscher Dialogmarketing Verband eV</collab>
          </person-group>
          <source>Dialogmarketing Perspektiven 2014/2015</source>
          <year>2015</year>
          <publisher-loc>Wiesbaden, Germany</publisher-loc>
          <publisher-name>Springer Fachmedien Wiesbaden</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krasnova</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Veltri</surname>
              <given-names>NF</given-names>
            </name>
            <name name-style="western">
              <surname>Günther</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture</article-title>
          <source>Bus Inf Syst Eng</source>
          <year>2012</year>
          <month>4</month>
          <day>26</day>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>127</fpage>
          <lpage>135</lpage>
          <pub-id pub-id-type="doi">10.1007/s12599-012-0216-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Custers</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Dechesne</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Sears</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Tani</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>van der Hof</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A comparison of data protection legislation and policies across the EU</article-title>
          <source>Comput Law Secur Rev</source>
          <year>2018</year>
          <month>04</month>
          <volume>34</volume>
          <issue>2</issue>
          <fpage>234</fpage>
          <lpage>243</lpage>
          <pub-id pub-id-type="doi">10.1016/j.clsr.2017.09.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Statistisches Bundesamt</collab>
          </person-group>
          <article-title>3,4 Millionen Menschen in Deutschland nutzten im 1. Quartal 2020 smarte Gesundheitsgeräte</article-title>
          <source>Statistisches Bundesamt</source>
          <year>2021</year>
          <access-date>2023-04-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.destatis.de/DE/Presse/Pressemitteilungen/2021/02/PD21_078_639.html">https://www.destatis.de/DE/Presse/Pressemitteilungen/2021/02/PD21_078_639.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Negreiro</surname>
              <given-names>Mar</given-names>
            </name>
          </person-group>
          <article-title>The rise of digital health technologies during the pandemic</article-title>
          <source>European Parliamentary Research Service</source>
          <year>2021</year>
          <access-date>2023-05-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/690548/EPRS_BRI(2021)690548_EN.pdf">https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/690548/EPRS_BRI(2021)690548_EN.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fetters</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Curry</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Creswell</surname>
              <given-names>JW</given-names>
            </name>
          </person-group>
          <article-title>Achieving integration in mixed methods designs-principles and practices</article-title>
          <source>Health Serv Res</source>
          <year>2013</year>
          <month>12</month>
          <volume>48</volume>
          <issue>6 Pt 2</issue>
          <fpage>2134</fpage>
          <lpage>56</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://hdl.handle.net/2027.42/101791"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/1475-6773.12117</pub-id>
          <pub-id pub-id-type="medline">24279835</pub-id>
          <pub-id pub-id-type="pmcid">PMC4097839</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
