<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i11e23059</article-id>
      <article-id pub-id-type="pmid">34783672</article-id>
      <article-id pub-id-type="doi">10.2196/23059</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Fitness Tracker Information and Privacy Management: Empirical Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Alaqra</surname>
            <given-names>Ala Sarah</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Friedrich</surname>
            <given-names>Christoph</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Uwizeyemungu</surname>
            <given-names>Sylvestre</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Abdelhamid</surname>
            <given-names>Mohamed</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Information Systems</institution>
            <institution>California State University, Long Beach</institution>
            <addr-line>1250 N Bellflower Blvd</addr-line>
            <addr-line>Long Beach, CA, 90840</addr-line>
            <country>United States</country>
            <phone>1 5629852361</phone>
            <email>mohamed.abdelhamid@csulb.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1580-3618</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Information Systems</institution>
        <institution>California State University, Long Beach</institution>
        <addr-line>Long Beach, CA</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Mohamed Abdelhamid <email>mohamed.abdelhamid@csulb.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>11</issue>
      <elocation-id>e23059</elocation-id>
      <history>
        <date date-type="received">
          <day>30</day>
          <month>7</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>24</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>3</day>
          <month>2</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>18</day>
          <month>9</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Mohamed Abdelhamid. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 16.11.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/11/e23059" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Fitness trackers allow users to collect, manage, track, and monitor fitness-related activities, such as distance walked, calorie intake, sleep quality, and heart rate. Fitness trackers have become increasingly popular in the past decade. One in five Americans use a device or an app to track their fitness-related activities. These devices generate massive and important data that could help physicians make better assessments of their patients’ health if shared with health providers. This ultimately could lead to better health outcomes and perhaps even lower costs for patients. However, sharing personal fitness information with health care providers has drawbacks, mainly related to the risk of privacy loss and information misuse.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study investigates the influence of granting users granular privacy control on their willingness to share fitness information.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The study used 270 valid responses collected from Mtrurkers through Amazon Mechanical Turk (MTurk). Participants were randomly assigned to one of two groups. The conceptual model was tested using structural equation modeling (SEM). The dependent variable was the intention to share fitness information. The independent variables were perceived risk, perceived benefits, and trust in the system.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>SEM explained about 60% of the variance in the dependent variable. Three of the four hypotheses were supported. Perceived risk and trust in the system had a significant relationship with the dependent variable, while trust in the system was not significant.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The findings show that people are willing to share their fitness information if they have granular privacy control. This study has practical and theoretical implications. It integrates communication privacy management (CPM) theory with the privacy calculus model.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy</kwd>
        <kwd>information sharing</kwd>
        <kwd>fitness trackers</kwd>
        <kwd>wearable devices</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Fitness trackers are wearable devices that allow people to monitor and track activities and information related to fitness, such as distance walked and calories consumed. Fitness trackers can be stand-alone devices or integrated within a smartwatch. The device is usually connected to a mobile app that allows users to manage information and use the features of the app. The first functional fitness tracker was invented in the mid-1960s [<xref ref-type="bibr" rid="ref1">1</xref>]. However, the rise of fitness trackers and wearable devices started about a decade ago. The first Fitbit was released in 2012 [<xref ref-type="bibr" rid="ref2">2</xref>], and the first Apple watch was revealed in 2014 [<xref ref-type="bibr" rid="ref3">3</xref>]. Since then, fitness trackers and wearable devices have become increasingly popular. A recent Pew Research Center study reported that 21% of Americans regularly use fitness trackers or smartwatches [<xref ref-type="bibr" rid="ref4">4</xref>]. Similarly, in 2019, Gallup reported that more than one in four Americans use an app or device to track fitness-related activities [<xref ref-type="bibr" rid="ref5">5</xref>].</p>
        <p>People use fitness trackers for various reasons, but ultimately, the main reason is to get fit or maintain health [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. The device/app helps users stay motivated and allows them to track progress and stay informed [<xref ref-type="bibr" rid="ref8">8</xref>]. In recent years, many people have started seeking a healthier lifestyle and adopted technologies that motivated them to keep track of their goals [<xref ref-type="bibr" rid="ref9">9</xref>]. This trend is largely adopted by millennials; some even called the millennials “the wellness generation” [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Information collected by fitness trackers and maintained by their respective systems, if shared with health care providers, could provide wider benefits to users. Sharing personal fitness data with health care providers allows physicians to better understand their patients’ health lifestyle, health issues, and potential health problems. This further allows physicians to provide early recommendations and make better health assessments that could help people avoid health problems. In general, sharing personal fitness information with health care institutions may benefit individuals in many ways, such as better health outcomes and reduced cost. Researchers are starting to predict a future that encourages patients to share fitness data with their providers [<xref ref-type="bibr" rid="ref11">11</xref>]. Another possible benefit of sharing fitness data is to conduct scientific research that could improve the health outcomes for the general public.</p>
        <p>However, the use of technology and the sharing of personal fitness data may result in negative consequences, mainly related to privacy and security [<xref ref-type="bibr" rid="ref12">12</xref>]. For example, loss of privacy may result from a breach of security in a health care institution. More than 93% of health care institutions have been victims of a data breach in the past 5 years [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
        <p>This study investigates the influence of implementing granular privacy control on users’ intention to share their fitness information and whether it could lead to higher user engagement in sharing fitness data. In addition, the paper investigates the motivation of individuals, captured by the privacy calculus, to share fitness information. This research provides several important contributions to the field. First, it contributes to theory by integrating communication privacy management (CPM) theory with the privacy calculus model [<xref ref-type="bibr" rid="ref14">14</xref>]. Second, the paper provides practical and theoretical insights into how to address barriers to fitness information sharing by suggesting flexible sharing mechanisms that mitigate the impact of perceived privacy risk.</p>
      </sec>
      <sec>
        <title>Theoretical Background and Hypothesis Development</title>
        <sec>
          <title>Privacy in eHealth</title>
          <p>The diffusion of health-tracking apps and devices is growing rapidly in the United States, both in terms of the number of people that are active end users and also in terms of the functionalities and features of the apps and devices that are currently available. Fitness and health-tracking apps are expected to have many benefits for the users, such as motivation and fitness aspiration [<xref ref-type="bibr" rid="ref15">15</xref>]. However, with digitization come the risks of privacy and security breaches [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. People’s behavior with regard to sharing personal health information is negatively influenced by concerns over their privacy [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. Individual-centered privacy research found that individuals are concerned about the collection, handling, and possible unauthorized access of their private information [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
          <p>Research on health information sharing summarizes that risks of privacy invasion and information violations are drawbacks of sharing [<xref ref-type="bibr" rid="ref20">20</xref>]. This means that individuals are hesitant to share personal health information because of possible privacy risks. Although sharing is beneficial in many cases, the risks may outweigh the benefits, and thus risk can drive adoption [<xref ref-type="bibr" rid="ref18">18</xref>]. Therefore, granular privacy control mechanisms for information sharing may motivate individuals to share more of their fitness information. Cavusoglu et al [<xref ref-type="bibr" rid="ref21">21</xref>] found that in the social media context, granular control motivates users to share more information because they control with whom they share information. This research covers the gap by testing for the impact of a more granular privacy control in sharing fitness tracker information.</p>
        </sec>
        <sec>
          <title>Information Sharing</title>
          <p>One body of literature focused on the sharing of health-related information via online and electronic sources. Prior research suggests that privacy concerns are the central obstacle to sharing of information [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Simon et al [<xref ref-type="bibr" rid="ref24">24</xref>] identified privacy and security issues and lack of benefits as the main barriers to sharing of personal information.</p>
          <p>Angst and Agarwal [<xref ref-type="bibr" rid="ref18">18</xref>] confirmed that privacy concerns reduce the likelihood of sharing health information. Weitzman et al [<xref ref-type="bibr" rid="ref25">25</xref>] found that patients with sensitive information are less likely to share their health information with health care providers. Likewise, Zulman et al [<xref ref-type="bibr" rid="ref26">26</xref>] confirmed that willingness to share health information is influenced by the type of information. Bansal and Gefen [<xref ref-type="bibr" rid="ref23">23</xref>] reported that the sensitivity of information influences individuals’ decisions to share that online.</p>
          <p>The key factors in sharing health information include the benefits of obtaining feedback related to potential health issues. According to Dimitropoulos et al [<xref ref-type="bibr" rid="ref27">27</xref>], most people realize the benefits of sharing health information. However, they need to adapt to and manage the way their information is shared. Although Ancker et al [<xref ref-type="bibr" rid="ref28">28</xref>] found that most respondents believe that sharing health information improves the quality of care.</p>
        </sec>
        <sec>
          <title>Privacy Calculus Model</title>
          <p>Information sharing and privacy have always been supplementary [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. Therefore, the theoretical model of this research is guided by the privacy calculus model [<xref ref-type="bibr" rid="ref14">14</xref>]. Studies in various contexts have used the privacy calculus model [<xref ref-type="bibr" rid="ref31">31</xref>]. For example, Kim et al [<xref ref-type="bibr" rid="ref32">32</xref>] used the privacy calculus model to investigate people’s willingness to provide personal information in the context of the internet of things (IoT). They found that perceived benefits are a strong motivator in sharing private information. Likewise, Fox [<xref ref-type="bibr" rid="ref33">33</xref>] investigated the influence of privacy calculus variables on individuals’ intention to adopt mobile health technologies. The paper finds a stronger influence of benefits compared to risks and concerns. Abdelhamid et al [<xref ref-type="bibr" rid="ref34">34</xref>], when examining factors associated with the sharing of health information, found that privacy is the biggest barrier to sharing.</p>
          <p>The privacy calculus model is a good fit for this study because it deals with information sharing in scenarios where risk and benefits of sharing are involved. However, the privacy calculus model does not incorporate granular control of information into the model. Thus, this research integrates CPM, which incorporates control of information, with privacy calculus, which deals with risks and benefits. Therefore, the overall model covers the three key factors of this research: granular control, risks, and benefits.</p>
          <p>This research adopts the theory by:</p>
          <list list-type="order">
            <list-item>
              <p>Applying the theory in the context of fitness trackers and wearable devices</p>
            </list-item>
            <list-item>
              <p>Integrating CPM theory with the privacy calculus model</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>CPM</title>
          <p>CPM theory describes the rationale behind an individual’s choice to disclose or withhold private information [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
          <p>The principles state that people believe they are the ultimate owners of their private information and that people have the right to control the course of their private information. Thus, people believe they have the right to choose with whom to share information. CPM also argues that people believe that stakeholders accessing an individual’s shared information will follow current and future privacy rules. In addition, CPM debates that violated privacy rules will result in negative consequences, including mistrust and uncertainty. Petronio [<xref ref-type="bibr" rid="ref35">35</xref>] underlined that CPM was developed to help users make necessary alterations to systems when faced with the issue of privacy.</p>
          <p>According to the breach data reported to the Department of Health Human Services, the number of unauthorized access/disclosure breaches tripled in 2017 versus 2012 [<xref ref-type="bibr" rid="ref36">36</xref>]. Dhopeshwarkar et al [<xref ref-type="bibr" rid="ref37">37</xref>] noted that most people want to know who is viewing their information. Angst et al [<xref ref-type="bibr" rid="ref38">38</xref>] suggested that institutional factors and IT investments affect the likelihood of breaches in health care organizations. This research investigates the impact of a more granular privacy control on the intention to share data related to fitness activities with health care providers. <xref rid="figure1" ref-type="fig">Figure 1</xref> shows the conceptual model of this study.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Conceptual model. H: Hypothesis.</p>
            </caption>
            <graphic xlink:href="jmir_v23i11e23059_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Privacy Control</title>
          <p>When faced with a choice, individuals typically choose the option with the premier value after assessing likely risks [<xref ref-type="bibr" rid="ref39">39</xref>]. In the context of fitness and health and from an individual perspective, there may be a desire to protect specific fitness information from certain providers or users. Caine and Hanania [<xref ref-type="bibr" rid="ref40">40</xref>] suggested that people prefer to share particular health-related information with specific recipients.</p>
          <p>The definition of privacy refers to the right that people have in choosing the information they want to share and with whom to share it [<xref ref-type="bibr" rid="ref41">41</xref>]. Information control and information disclosure have a positive relationship in various contexts [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. For instance, Cavusoglu et al [<xref ref-type="bibr" rid="ref21">21</xref>] examined the causal effect of granting Facebook users more control on information-sharing behavior. They found that privacy control increases the open release of information. In other words, when the sharing decision is universal, people might not share some information with anyone. That is mainly because some people want to prevent others from seeing that information. As a result, the decision led to withholding the information from everyone. However, when individuals are given more control over their information, they will share some information with some people.</p>
          <p>In addition, Slovic [<xref ref-type="bibr" rid="ref44">44</xref>] found that on average, individuals are ready to take more risks when they are in control. The paper suggested that improved control increases an individual’s willingness to participate in that behavior. Likewise, Brandimarte et al [<xref ref-type="bibr" rid="ref45">45</xref>] reported that individuals are more willing to reveal sensitive information when they have more control over what is being shared.</p>
          <p>The first hypothesis of this study is as follows:</p>
          <p><italic>Hypothesis 1:</italic> Granular privacy control will yield a higher intention to share fitness information with health care providers.</p>
        </sec>
        <sec>
          <title>Perceived Risk</title>
          <p>The concept of perceived risk has been studied in many contexts in which individuals may face a risky decision. A considerable number of studies have established the link between perceived risk and information disclosure, in general [<xref ref-type="bibr" rid="ref46">46</xref>-<xref ref-type="bibr" rid="ref48">48</xref>]. Dinev and Hart [<xref ref-type="bibr" rid="ref14">14</xref>] defined perceived risk as the perceived risk of unprincipled behavior related to the sharing of personal information. In the context of fitness tracker information, the risk includes selling the information to a third party, misuse, and unauthorized sharing. In 2015, the National Telecommunications and Information Assurance (NTIA) surveyed approximately 40,000 participants [<xref ref-type="bibr" rid="ref49">49</xref>]. The report stated that more than 50% of users had limited their online activities due to concerns about the privacy of their information.</p>
          <p>The second hypothesis of this study is as follows:</p>
          <p><italic>Hypothesis 2:</italic> Perceived risk will have a negative influence on the intention to share fitness information with health care providers.</p>
        </sec>
        <sec>
          <title>Perceived Benefits</title>
          <p>When people face a decision that involves sharing of private fitness information, they usually assess the risks and benefits of sharing to make an informed decision. Many benefits result from sharing fitness information with health care providers. Some of those benefits directly influence the individuals sharing the fitness information. For example, fitness information can help doctors make better health assessments with regard to the person sharing the information. This allows doctors to make better recommendations. The individual may then benefit from better health outcomes, in general.</p>
          <p>In the context of fitness, perceived benefit is defined as the perceived value that individuals attach to sharing personal fitness information with health care providers. In general, perceived benefits have been associated with information sharing in various contexts, including health care [<xref ref-type="bibr" rid="ref50">50</xref>]. For example, Wang et al [<xref ref-type="bibr" rid="ref51">51</xref>] reported that patients find that improved health care quality and convenience are among the benefits of sharing personal health information. Likewise, Zhang et al [<xref ref-type="bibr" rid="ref52">52</xref>] found that sharing health information in online communities is associated with benefits for users. They argue that in online communities, the benefits are informational and emotional support. Morris et al [<xref ref-type="bibr" rid="ref53">53</xref>] proposed a design of a mobile information-sharing system for emergency rooms. They found that sharing can be beneficial for physicians in terms of reducing information-seeking time and stress. This could result in better care for patients. As a result of sharing, patients may be able to avoid a serious problem.</p>
          <p>The third hypothesis of this study is as follows:</p>
          <p><italic>Hypothesis 3:</italic> Perceived benefits will have a positive influence on the intention to share fitness information with health care providers.</p>
        </sec>
        <sec>
          <title>Trust in a System</title>
          <p>Trust in a system is defined as the extent to which individuals are confident that systems will handle their information securely and reliably [<xref ref-type="bibr" rid="ref14">14</xref>]. The prior literature has established a positive relationship between trust in a system and engagement with the system [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. The perception of trust can be linked with the system itself or with the system’s capability to protect information from people who breach the system to misuse information. The perspective of information misuse escalates when private fitness information is exchanged from one system to another. Gefen et al [<xref ref-type="bibr" rid="ref56">56</xref>] state that the relationship between trust in a system and the intention to use that system becomes more significant when engagement includes the possibility of risk consequences.</p>
          <p>The fourth hypothesis of this study is as follows:</p>
          <p><italic>Hypothesis 4</italic>: Trust in the system will have a positive influence on the intention to share fitness information with health care providers.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Data Collection</title>
        <p>This study uses scenario-based survey data collection through Amazon Mechanical Turk (MTurk). A survey-based approach has been used in many studies in the context of health care IT to understand individuals’ perceptions related to information sharing [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. This study aims to understand individuals’ perception and intentions as they relate to sharing fitness tracker information. Thus, a survey-based study is adequate. Many studies in the health care field have used Amazon MTurk to collect data [<xref ref-type="bibr" rid="ref57">57</xref>]. Online data collection is relevant to this study for many reasons. First, fitness trackers are used by the general public and not restricted to a certain occupation or demographic. Second, most people in the United States have regular access to the internet [<xref ref-type="bibr" rid="ref58">58</xref>]. Third, online data collection, compared with convenience sampling, allows for reaching participants outside the researcher’s geographic area.</p>
        <p>Participants were asked to participate in a study related to fitness tracker information. After reading the consent form, the participants were asked to start the survey. The first question asks participants whether they have owned a fitness tracker. The survey ended for those who indicated they did not own a fitness tracker. The participants were paid USD 0.50 for completing the survey. The participants were randomly assigned to one of two groups (granular or universal). Under the granular privacy scenario, the participants were exposed to a scenario where they could select what fitness information to share and with whom. Next, they were asked how likely they are to share the information under such a scenario. In universal sharing, the participants were told that they could not exclude specific information from sharing. Next, they were asked to indicate their sharing intentions under this scenario. All participants answered the same questions related to independent and control variables. Control variables were sex and prior privacy invasion, included to follow the design of Angst et al [<xref ref-type="bibr" rid="ref18">18</xref>], within the health care context.</p>
      </sec>
      <sec>
        <title>Data Summary</title>
        <p>The final data analysis included 270 valid and complete responses. The participants had to answer questions related to the independent variables, as shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>. Next, each participant was exposed to one of two sharing settings. Finally, the participants indicated their intention to share their fitness information with health care providers, depending on the sharing setting to which they were exposed. Qualtrics settings allowed for random assignment, while keeping the number of participants in the two groups similar. In total, 137 participants were assigned to the granular privacy sharing option (select what fitness information to disclose and share and whom to share it with), and 133 were assigned to the universal sharing option (share all personal fitness information with all providers). Of the 270 participants, 77.8% (n=211) were male, and the rest (22.2%, n=59) were female. The majority of the participants were between the age of 25 and 34 years (163 participants), the second-largest group was 35-44 years old (39 participants), 33 participants were between the age of 18 and 24 years, 21 participants were between the age of 45 and 54 years, and 14 participants were 55 years old or older.</p>
      </sec>
      <sec>
        <title>Measurement Model Assessment</title>
        <p>SAS software version 9.4 was used to decode the data, and IBM AMOS version 25 was used to run the analysis. Confirmatory factor analyses were used to evaluate the measurement model (<xref ref-type="table" rid="table1">Table 1</xref>) using all 270 participants. All variables in this study were adapted from prior research (see Table A1 of <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> for measurement items). All latent variables were measured on a 5-point Likert scale. The results of the measurement model showed a good fit [<xref ref-type="bibr" rid="ref59">59</xref>]. All factor loadings for the latent variables were relatively strong and significant. The comparative fit index (CFI)=.964, root-mean-square error of approximation (RMSEA)=.059, Tucker-Lewis index (TLI)=.953, and χ<sup>2</sup>/df=1.724. These results provided evidence of the validity of the constructs.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Measurement model.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="350"/>
            <col width="80"/>
            <col width="100"/>
            <col width="150"/>
            <col width="150"/>
            <col width="170"/>
            <thead>
              <tr valign="top">
                <td>Latent variable</td>
                <td>Item</td>
                <td>Loadings</td>
                <td>Corrected item–total correlation</td>
                <td>Construct reliability</td>
                <td>Variable inflation factor</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td rowspan="3">Intention to share (dependent variable)</td>
                <td>INT_1</td>
                <td>0.82</td>
                <td>0.730</td>
                <td rowspan="3">0.863</td>
                <td rowspan="3">NA<sup>a</sup></td>
              </tr>
              <tr valign="top">
                <td>INT_2</td>
                <td>0.782</td>
                <td>0.702</td>
              </tr>
              <tr valign="top">
                <td>INT_3</td>
                <td>0.867</td>
                <td>0.778</td>
              </tr>
              <tr valign="top">
                <td rowspan="3">Perceived risk</td>
                <td>PR_1</td>
                <td>0.804</td>
                <td>0.619</td>
                <td rowspan="3">0.764</td>
                <td rowspan="3">1.047</td>
              </tr>
              <tr valign="top">
                <td>PR_2</td>
                <td>0.633</td>
                <td>0.550</td>
              </tr>
              <tr valign="top">
                <td>PR_3</td>
                <td>0.718</td>
                <td>0.612</td>
              </tr>
              <tr valign="top">
                <td rowspan="3">Perceived benefits</td>
                <td>PB_1</td>
                <td>0.7</td>
                <td>0.616</td>
                <td rowspan="3">0.758</td>
                <td rowspan="3">1.003</td>
              </tr>
              <tr valign="top">
                <td>PB_2</td>
                <td>0.69</td>
                <td>0.577</td>
              </tr>
              <tr valign="top">
                <td>PB_3</td>
                <td>0.753</td>
                <td>0.576</td>
              </tr>
              <tr valign="top">
                <td rowspan="3">Trust in the system</td>
                <td>TR_1</td>
                <td>0.733</td>
                <td>0.545</td>
                <td rowspan="3">0.721</td>
                <td rowspan="3">1.029</td>
              </tr>
              <tr valign="top">
                <td>TR_2</td>
                <td>0.591</td>
                <td>0.511</td>
              </tr>
              <tr valign="top">
                <td>TR_3</td>
                <td>0.712</td>
                <td>0.569</td>
              </tr>
              <tr valign="top">
                <td rowspan="3">Prior experience with privacy invasion (control)</td>
                <td>PI_1</td>
                <td>0.847</td>
                <td>0.747</td>
                <td rowspan="3">0.850</td>
                <td rowspan="3">1.015</td>
              </tr>
              <tr valign="top">
                <td>PI_2</td>
                <td>0.785</td>
                <td>0.699</td>
              </tr>
              <tr valign="top">
                <td>PI_3</td>
                <td>0.794</td>
                <td>0.710</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>NA: not available.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>The reliability of constructs was assessed by calculating the composite reliability (CR). The reliability scores for all constructs in the conceptual model exceeded the threshold of 0.7, which indicates strong reliability. The CR scores ranged from 0.721 to 0.863 (see <xref ref-type="table" rid="table1">Table 1</xref>). In addition, the corrected item–total correlation for each item was calculated based on the construct to which it belonged. All values exceeded the minimum cutoff of 0.5 [<xref ref-type="bibr" rid="ref60">60</xref>]. Furthermore, the variance inflation factor (VIF) was calculated for each of the independent variables in the measurement model to check for multicollinearity. All VIF values were way below the threshold score of 10. Therefore, there was no evidence for the existence of multicollinearity between variables in this study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>SEM Results</title>
        <p><xref rid="figure2" ref-type="fig">Figure 2</xref> shows the results of structural equation modeling (SEM). The model explained 60.4% of the variance (R<sup>2</sup>) in the intention to share.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>SEM results. CFI: comparative fit index; RMSEA: root-mean-square error of approximation; SEM: structural equation modeling;  TLI: Tucker-Lewis index.</p>
          </caption>
          <graphic xlink:href="jmir_v23i11e23059_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Granular Privacy Control</title>
        <p>Hypothesis 1 states that increased control results in a higher intention to share. Findings supported this result. The path coefficient for granular privacy control was positive and significant (β<sub>GPC</sub>=.36, <italic>P</italic>&#60;.001), indicating that granular privacy control yields a higher willingness to share personal fitness-related information with health care providers.</p>
      </sec>
      <sec>
        <title>Perceived Risk</title>
        <p>Hypothesis 2 proposes a positive relationship between negative perceived risk and the intention to share fitness information. The results provided evidence to support this hypothesis (β<sub>PR</sub>=–.17, <italic>P</italic>=.027), which confirms the impact of the possible risk that involves sharing information via systems and with others.</p>
      </sec>
      <sec>
        <title>Perceived Benefits</title>
        <p>Hypothesis 3 argues that perceived benefits will yield a higher intention to share fitness information with health care providers. The estimate for this relationship was positive and significant (β<sub>PB</sub>=.53, <italic>P</italic>&#60;.001), which provides support for the hypothesis. The magnitude of the influence was the highest among all variables, which confirms the importance of benefits for individuals to be willing to share their fitness information.</p>
      </sec>
      <sec>
        <title>Trust in a System</title>
        <p>Finally, hypothesis 4 states that trust in the system will have a positive influence on the intention to share personal fitness information with health care providers. However, the results did not provide support for this hypothesis. The estimate was positive but not significant. Thus, trust does not seem to be an issue or a barrier to information sharing in this context. Prior invasion of privacy and sex were used as control variables. It is expected that individuals’ perceptions are influenced by the prior invasion of privacy. Both variables were positively significant.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Privacy calculus theory highlights that people weigh benefits and risks when making decisions related to sharing or disclosing personal information. This research finds that both risk and benefits have a significant influence on the intention to share fitness data (see <xref rid="figure2" ref-type="fig">Figure 2</xref>). These findings are similar to the findings of other research in the health care and cybersecurity context [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]. However, the benefits of sharing are more influential compared to the risks, at least in this sample. This result is positive for health care providers, researchers, and those who need the information to improve population health. User benefits include improved health care quality, more accurate information, more convenience, and better communication. In addition, people who share their fitness information with health care providers may be able to avoid serious problems by allowing the providers to detect problems early. This could result in avoiding increases in health insurance premiums for individuals who share their information.</p>
        <p>Cavusoglu et al [<xref ref-type="bibr" rid="ref21">21</xref>] showed that granular privacy control motivates Facebook users to share more content because they are able to control the content they can share and with whom they can share it. This is in line with the results of this research that show that granular privacy control could motivate people to share their fitness tracker information. Prior research [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>] has shown that sharing health-related information is perceived by individuals to be risky. The results of this study confirm that sharing fitness information is also perceived to be risky. However, the benefits seem to outweigh the risks.</p>
        <p>In addition, this paper integrated CPM with the privacy calculus model. CPM defines the motivation behind individuals’ choice to share or withhold private information. In this paper, participants were randomly assigned to scenarios (granular and universal sharing). Findings showed that granting people greater privacy control acts as a persuasive mechanism to motivate more people to participate in sharing their fitness information. Thus, individuals can engage in behaviors that may improve their well-being, while taking actions to protect their private data. This is an implication for policymakers to enforce granular privacy sharing settings that will allow individuals to participate in such systems and, in turn, observe better health outcomes. In addition, a higher participation rate will allow those applications to be sustainable as they enable more people to benefit from the system.</p>
        <p>Trust in the system does not have a significant relationship with fitness information sharing. This finding requires further investigation because it goes against the hypothesis and previous research as it relates to information sharing. However, several explanations are plausible. For example, in this era, most people use apps and systems all the time. Thus, the concept of general trust in the system starts to vanish as systems become part of our daily work and personal routines.</p>
      </sec>
      <sec>
        <title>Limitations and Future Work</title>
        <p>This study had several limitations. First, the dependent variable was the intention to share fitness information with health care providers and not actual behavior. However, previous studies have indicated that intention is a strong predictor of actual behavior [<xref ref-type="bibr" rid="ref61">61</xref>]. Another limitation was that the data were collected online through Amazon MTurk. This could also be associated with selection bias. However, many studies in the health care field have used online data collection methods. In addition, after the COVID-19 situation, online data collection is expected to become more prominent. Furthermore, the integration of fitness apps and systems of health care providers has not been adopted yet, at least not on a large scale. Future work will focus on other aspects of application design and privacy and security settings.</p>
      </sec>
      <sec>
        <title>Conclusion and Contribution</title>
        <p>The findings of this study have many implications for practice and the literature. Individuals, generally, choose to share specific information with specific health care providers. Viewed from a privacy perspective, enforcement of granular privacy settings lessens the perceived risk by giving individuals a greater sense of assurance regarding their personal fitness information. This research finds that on average, people are likely to share their fitness information when applications empower them with more control. That is because people naturally prefer to avoid risk. Granular privacy control offers people the ability to mitigate risk. This step will increase their willingness to participate in sharing personal fitness information.</p>
        <p>This paper illustrates how providing individuals with granular privacy control can lead to improvement in sharing of fitness information. This could result in improved health outcomes for individuals and the general public. Granular privacy control allows individuals to mitigate the perceived risk involved in the universal sharing of all fitness information.</p>
        <p>In general, the perceived risk remains a major barrier to information sharing, even with regard to fitness information. The introduction of granular privacy control could mitigate the negative impact of perceived risk. On the positive side, perceived benefits show the strongest influence on the intention to share fitness information. This indicates that individuals attach sharing fitness information to many benefits. The magnitude of the perceived benefit coefficient is three times stronger than the coefficient of perceived risk. This also has implications for the need for such integration between fitness apps and health care systems. Policymakers may want to consider establishing policies and rules that govern the sharing process.</p>
        <p>This research contributes to theory by integrating the privacy model and CPM theory in the context of fitness information sharing. In addition, the study adds to theory by highlighting the impact of granular privacy control on the intention to share fitness information.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Measurement items.</p>
        <media xlink:href="jmir_v23i11e23059_app1.docx" xlink:title="DOCX File , 17 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CFI</term>
          <def>
            <p>comparative fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CPM</term>
          <def>
            <p>communication privacy management</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CR</term>
          <def>
            <p>composite reliability</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">IoT</term>
          <def>
            <p>internet of things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">MTurk</term>
          <def>
            <p>Mechanical Turk</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">RMSEA</term>
          <def>
            <p>root-mean-square error of approximation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">SEM</term>
          <def>
            <p>structural equation modeling</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">TLI</term>
          <def>
            <p>Tucker-Lewis index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">VIF</term>
          <def>
            <p>variance inflation factor</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Douglas-Walton</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>A Study of Fitness Trackers and Wearables</source>
          <access-date>2021-07-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hfe.co.uk/blog/a-study-of-fitness-trackers-and-wearables/#:~:text=The%20Origins%20of%20Fitness%20Trackers&#38;text=Fitness%20trackers%2C%20as%20we%20know,invented%20by%20Dr%20Yoshiro%20Hatano">https://tinyurl.com/3efv4mte</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Comstock</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Eight Years of Fitbit News Leading up to Its Planned IPO</source>
          <year>2015</year>
          <access-date>2020-07-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mobihealthnews.com/43423/eight-years-of-fitbit-news-leading-up-to-its-planned-ipo#:~:text=September%202009%3A%20Fitbit%20launches%20its,both%20the%20day%20and%20night">https://tinyurl.com/fhkdrxxa</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dormehl</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>Today in Apple History: It’s Time for Apple Watch</source>
          <access-date>2021-04-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cultofmac.com/477727/apple-history-apple-watch-release/#:~:text=Apple%20Watch%20launch%20is%20the,iPhone%206%20and%206%20Plus">https://tinyurl.com/nsdc4fem</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vogels</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <source>About One-in-Five Americans Use a Smart Watch or Fitness Tracker</source>
          <access-date>2020-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/fact-tank/2020/01/09/about-one-in-five-americans-use-a-smart-watch-or-fitness-tracker/">https://www.pewresearch.org/fact-tank/2020/01/09/about-one-in-five-americans-use-a-smart-watch-or-fitness-tracker/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mccarthy</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>One in Five U.S. Adults Use Health Apps, Wearable Trackers</source>
          <year>2019</year>
          <access-date>2020-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://news.gallup.com/poll/269096/one-five-adults-health-apps-wearable-trackers.aspx">https://news.gallup.com/poll/269096/one-five-adults-health-apps-wearable-trackers.aspx</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Asimakopoulos</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Asimakopoulos</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Spillers</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Motivation and user engagement in fitness tracking: heuristics for mobile healthcare wearables</article-title>
          <source>Informatics</source>
          <year>2017</year>
          <month>01</month>
          <day>22</day>
          <volume>4</volume>
          <issue>1</issue>
          <fpage>5</fpage>
          <pub-id pub-id-type="doi">10.3390/informatics4010005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Sum</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nathan-Roberts</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>How fitness trackers facilitate health behavior change</article-title>
          <year>2016</year>
          <month>09</month>
          <day>15</day>
          <conf-name>The Human Factors and Ergonomics Society Annual Meeting</conf-name>
          <conf-date>September 19-23, 2016</conf-date>
          <conf-loc>WA</conf-loc>
          <fpage>1068</fpage>
          <lpage>1072</lpage>
          <pub-id pub-id-type="doi">10.1177/1541931213601247</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naglis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bhatiasevi</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Why do people use fitness tracking devices in Thailand? An integrated model approach</article-title>
          <source>Technol Soc</source>
          <year>2019</year>
          <month>08</month>
          <volume>58</volume>
          <fpage>101146</fpage>
          <pub-id pub-id-type="doi">10.1016/j.techsoc.2019.101146</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <source>Wellness Is The New Luxury: Is Healthy And Happy The Future Of Retail?</source>
          <year>2017</year>
          <access-date>2020-06-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.forbes.com/sites/deborahweinswig/2017/06/30/wellness-is-the-new-luxury-is-healthy-and-happy-the-future-of-retail/#14f6f0338323">https://www.forbes.com/sites/deborahweinswig/2017/06/30/wellness-is-the-new-luxury-is-healthy-and-happy-the-future-of-retail/#14f6f0338323</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nermoe</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>Millennials: The "Wellness Generation"</source>
          <year>2018</year>
          <access-date>2020-06-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://news.sanfordhealth.org/sanford-health-plan/millennials-wellness-generation/">https://news.sanfordhealth.org/sanford-health-plan/millennials-wellness-generation/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinh-Le</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chuang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chokshi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mann</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Wearable health technology and electronic health record integration: scoping review and future directions</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>09</month>
          <day>11</day>
          <volume>7</volume>
          <issue>9</issue>
          <fpage>e12861</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/9/e12861/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12861</pub-id>
          <pub-id pub-id-type="medline">31512582</pub-id>
          <pub-id pub-id-type="pii">v7i9e12861</pub-id>
          <pub-id pub-id-type="pmcid">PMC6746089</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gabriele</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Understanding fitness tracker users' security and privacy knowledge, attitudes and behaviours</article-title>
          <year>2020</year>
          <month>04</month>
          <day>30</day>
          <conf-name>CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 25-30, 2020</conf-date>
          <conf-loc>Honolulu HI USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3313831.3376651</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Osborne</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <source>The Latest Healthcare Data Breaches in 2019/2020</source>
          <access-date>2021-07-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://portswigger.net/daily-swig/the-latest-healthcare-data-breaches">https://portswigger.net/daily-swig/the-latest-healthcare-data-breaches</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>An extended privacy calculus model for e-commerce transactions</article-title>
          <source>Inf Syst Res</source>
          <year>2006</year>
          <month>03</month>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>61</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1060.0080</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Birelin</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>The Benefits of Logging Workouts into a Fitness App</source>
          <year>2017</year>
          <access-date>2020-06-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nifs.org/blog/the-benefits-of-logging-workouts-into-a-fitness-app">https://www.nifs.org/blog/the-benefits-of-logging-workouts-into-a-fitness-app</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perez</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Use a Fitness App to Track Your Workouts? Your Data May Not Be as Protected as You Think</source>
          <year>2019</year>
          <access-date>2020-04-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.usatoday.com/story/sports/2019/08/16/what-info-do-fitness-apps-keep-share/1940916001/">https://www.usatoday.com/story/sports/2019/08/16/what-info-do-fitness-apps-keep-share/1940916001/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hutton</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Price</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>McCormick</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bandara</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Hatzakis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Meadows</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nuseibeh</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Assessing the privacy of mHealth apps for self-tracking: heuristic evaluation approach</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>10</month>
          <day>22</day>
          <volume>6</volume>
          <issue>10</issue>
          <fpage>e185</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/10/e185/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9217</pub-id>
          <pub-id pub-id-type="medline">30348623</pub-id>
          <pub-id pub-id-type="pii">v6i10e185</pub-id>
          <pub-id pub-id-type="pmcid">PMC6231850</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Angst</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion</article-title>
          <source>MIS Quarterly</source>
          <year>2009</year>
          <volume>33</volume>
          <issue>2</issue>
          <fpage>339</fpage>
          <pub-id pub-id-type="doi">10.2307/20650295</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdelhamid</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kisekka</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Samonas</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Mitigating e-services avoidance: the role of government cybersecurity preparedness</article-title>
          <source>ICS</source>
          <year>2019</year>
          <month>03</month>
          <day>11</day>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>26</fpage>
          <lpage>46</lpage>
          <pub-id pub-id-type="doi">10.1108/ics-02-2018-0024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information</article-title>
          <source>Inf Syst Res</source>
          <year>2011</year>
          <month>09</month>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>469</fpage>
          <lpage>90</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1100.0335</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cavusoglu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Phan</surname>
              <given-names>TQ</given-names>
            </name>
            <name name-style="western">
              <surname>Cavusoglu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Airoldi</surname>
              <given-names>EM</given-names>
            </name>
          </person-group>
          <article-title>Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook</article-title>
          <source>Inf Syst Res</source>
          <year>2016</year>
          <month>12</month>
          <volume>27</volume>
          <issue>4</issue>
          <fpage>848</fpage>
          <lpage>79</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.2016.0672</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sarathy</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract</article-title>
          <source>Decis Support Syst</source>
          <year>2014</year>
          <month>01</month>
          <volume>57</volume>
          <fpage>376</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2012.10.043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bansal</surname>
              <given-names>G</given-names>
            </name>
            <collab>Zahedi</collab>
            <name name-style="western">
              <surname>Gefen</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online</article-title>
          <source>Decis Support Syst</source>
          <year>2010</year>
          <month>5</month>
          <volume>49</volume>
          <issue>2</issue>
          <fpage>138</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2010.01.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Simon</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Benjamin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Delano</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>Patients' attitudes toward electronic health information exchange: qualitative study</article-title>
          <source>J Med Internet Res</source>
          <year>2009</year>
          <month>08</month>
          <day>06</day>
          <volume>11</volume>
          <issue>3</issue>
          <fpage>e30</fpage>
          <lpage>41</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2009/3/e30/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.1164</pub-id>
          <pub-id pub-id-type="medline">19674960</pub-id>
          <pub-id pub-id-type="pii">v11i3e30</pub-id>
          <pub-id pub-id-type="pmcid">PMC2762851</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Orehek</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Charpin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gayrard</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Grimaud</surname>
              <given-names>Ch</given-names>
            </name>
          </person-group>
          <article-title>Bronchodilator properties of a vasodilator: cetiedil</article-title>
          <source>Nouv Presse Med</source>
          <year>1976</year>
          <month>06</month>
          <day>19</day>
          <volume>5</volume>
          <issue>25</issue>
          <fpage>1577</fpage>
          <lpage>78</lpage>
          <pub-id pub-id-type="medline">6947</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zulman</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Nazi</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Turvey</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Wagner</surname>
              <given-names>TH</given-names>
            </name>
            <name name-style="western">
              <surname>Woods</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>An</surname>
              <given-names>LC</given-names>
            </name>
          </person-group>
          <article-title>Patient interest in sharing personal health record information: a web-based survey</article-title>
          <source>Ann Intern Med</source>
          <year>2011</year>
          <month>12</month>
          <day>20</day>
          <volume>155</volume>
          <issue>12</issue>
          <fpage>805</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.acpjournals.org/doi/abs/10.7326/0003-4819-155-12-201112200-00002?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.7326/0003-4819-155-12-201112200-00002</pub-id>
          <pub-id pub-id-type="medline">22184687</pub-id>
          <pub-id pub-id-type="pii">155/12/805</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dimitropoulos</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Scheffler</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Posnack</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Public attitudes toward health information exchange: perceived benefits and concerns</article-title>
          <source>Am J Manag Care</source>
          <year>2011</year>
          <month>12</month>
          <volume>17</volume>
          <issue>12 Spec No</issue>
          <fpage>SP111</fpage>
          <lpage>16</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ajmc.com/pubMed.php?pii=53517"/>
          </comment>
          <pub-id pub-id-type="medline">22216769</pub-id>
          <pub-id pub-id-type="pii">53517</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ancker</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Edwards</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Kaushal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Consumer perceptions of electronic health information exchange</article-title>
          <source>Am J Prev Med</source>
          <year>2012</year>
          <month>07</month>
          <volume>43</volume>
          <issue>1</issue>
          <fpage>76</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1016/j.amepre.2012.02.027</pub-id>
          <pub-id pub-id-type="medline">22704751</pub-id>
          <pub-id pub-id-type="pii">S0749-3797(12)00216-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gerlach</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Widjaja</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Buxmann</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Handle with care: How online social network providers’ privacy policies impact users’ information sharing behavior</article-title>
          <source>J Strateg Inf Syst</source>
          <year>2015</year>
          <month>03</month>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>33</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jsis.2014.09.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information privacy research: an interdisciplinary review</article-title>
          <source>MIS Quarterly</source>
          <year>2011</year>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>989</fpage>
          <pub-id pub-id-type="doi">10.2307/41409970</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>JX</given-names>
            </name>
          </person-group>
          <article-title>Location information disclosure in location-based social network services: privacy calculus, benefit structure, and gender differences</article-title>
          <source>Comput Hum Behav</source>
          <year>2015</year>
          <month>11</month>
          <volume>52</volume>
          <fpage>278</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.06.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ahn</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Willingness to provide personal information: perspective of privacy calculus in IoT services</article-title>
          <source>Comput Hum Behav</source>
          <year>2019</year>
          <month>03</month>
          <volume>92</volume>
          <issue>4</issue>
          <fpage>273</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.11.022</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>“To protect my health or to protect my health privacy?” A mixed‐methods investigation of the privacy paradox</article-title>
          <source>J Assoc Inf Sci Technol</source>
          <year>2020</year>
          <month>05</month>
          <day>20</day>
          <volume>71</volume>
          <issue>9</issue>
          <fpage>1015</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.24369</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdelhamid</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gaia</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>GL</given-names>
            </name>
          </person-group>
          <article-title>Putting the focus back on the patient: how privacy concerns affect personal health information sharing intentions</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>09</month>
          <day>13</day>
          <volume>19</volume>
          <issue>9</issue>
          <fpage>e169</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/9/e169/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.6877</pub-id>
          <pub-id pub-id-type="medline">28903895</pub-id>
          <pub-id pub-id-type="pii">v19i9e169</pub-id>
          <pub-id pub-id-type="pmcid">PMC5617905</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petronio</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Translational research endeavors and the practices of communication privacy management</article-title>
          <source>J Appl Commun Res</source>
          <year>2007</year>
          <month>08</month>
          <volume>35</volume>
          <issue>3</issue>
          <fpage>218</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.1080/00909880701422443</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McLeod</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dolezel</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cyber-analytics: modeling factors associated with healthcare data breaches</article-title>
          <source>Decis Support Syst</source>
          <year>2018</year>
          <month>04</month>
          <volume>108</volume>
          <fpage>57</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2018.02.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dhopeshwarkar</surname>
              <given-names>RV</given-names>
            </name>
            <name name-style="western">
              <surname>Kern</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>O'Donnell</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Edwards</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Kaushal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Health care consumers' preferences around health information exchange</article-title>
          <source>Ann Fam Med</source>
          <year>2012</year>
          <month>09</month>
          <day>10</day>
          <volume>10</volume>
          <issue>5</issue>
          <fpage>428</fpage>
          <lpage>34</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.annfammed.org/cgi/pmidlookup?view=long&#38;pmid=22966106"/>
          </comment>
          <pub-id pub-id-type="doi">10.1370/afm.1396</pub-id>
          <pub-id pub-id-type="medline">22966106</pub-id>
          <pub-id pub-id-type="pii">10/5/428</pub-id>
          <pub-id pub-id-type="pmcid">PMC3438210</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Angst</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Block</surname>
              <given-names>ES</given-names>
            </name>
            <name name-style="western">
              <surname>D’Arcy</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kelley</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches</article-title>
          <source>MISQ</source>
          <year>2017</year>
          <month>3</month>
          <day>3</day>
          <volume>41</volume>
          <issue>3</issue>
          <fpage>893</fpage>
          <lpage>916</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2017/41.3.10</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tversky</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>CR</given-names>
            </name>
          </person-group>
          <article-title>Weighing risk and uncertainty</article-title>
          <source>Psychol Rev</source>
          <year>1995</year>
          <volume>102</volume>
          <issue>2</issue>
          <fpage>269</fpage>
          <lpage>83</lpage>
          <pub-id pub-id-type="doi">10.1037/0033-295x.102.2.269</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Caine</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hanania</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Patients want granular privacy control over health information in electronic medical records</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2013</year>
          <month>01</month>
          <day>01</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>7</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23184192"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2012-001023</pub-id>
          <pub-id pub-id-type="medline">23184192</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2012-001023</pub-id>
          <pub-id pub-id-type="pmcid">PMC3555326</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Westin</surname>
              <given-names>Alan</given-names>
            </name>
          </person-group>
          <article-title>Privacy and freedom</article-title>
          <source>Washington and Lee Law Review</source>
          <year>1967</year>
          <publisher-loc>NY</publisher-loc>
          <publisher-name>Atheneum</publisher-name>
          <fpage>166</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laugesen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hassanein</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Adoption of personal health records by chronic disease patients: a research model and an empirical study</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>01</month>
          <volume>66</volume>
          <fpage>256</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.09.054</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdelhamid</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Greater patient health information control to improve the sustainability of health information exchanges</article-title>
          <source>J Biomed Inform</source>
          <year>2018</year>
          <month>07</month>
          <volume>83</volume>
          <fpage>150</fpage>
          <lpage>58</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(18)30108-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2018.06.002</pub-id>
          <pub-id pub-id-type="medline">29894811</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(18)30108-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Slovic</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <source>The Perception of Risk: Risk, Society and Policy</source>
          <year>2000</year>
          <publisher-loc>London</publisher-loc>
          <publisher-name>Earthscan</publisher-name>
          <fpage>473</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brandimarte</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Loewenstein</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Misplaced confidences</article-title>
          <source>Soc Psychol Personal Sci</source>
          <year>2012</year>
          <month>08</month>
          <day>09</day>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>340</fpage>
          <lpage>47</lpage>
          <pub-id pub-id-type="doi">10.1177/1948550612455931</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Yoo</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The effect of the perceived risk on the adoption of the sharing economy in the tourism industry: the case of Airbnb</article-title>
          <source>Inf Process Manag</source>
          <year>2020</year>
          <month>01</month>
          <volume>57</volume>
          <issue>1</issue>
          <fpage>102108</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ipm.2019.102108</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hansen</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Saridakis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Benson</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions</article-title>
          <source>Comput Hum Behav</source>
          <year>2018</year>
          <month>03</month>
          <volume>80</volume>
          <fpage>197</fpage>
          <lpage>206</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.11.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hilverda</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kuttschreuter</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Online information sharing about risks: the case of organic food</article-title>
          <source>Risk Anal</source>
          <year>2018</year>
          <month>09</month>
          <day>23</day>
          <volume>38</volume>
          <issue>9</issue>
          <fpage>1904</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="doi">10.1111/risa.12980</pub-id>
          <pub-id pub-id-type="medline">29570833</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>John</given-names>
            </name>
          </person-group>
          <source>First Look: Internet Use in 2015</source>
          <year>2016</year>
          <access-date>2020-04-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ntia.doc.gov/blog/2016/first-look-internet-use-2015">https://www.ntia.doc.gov/blog/2016/first-look-internet-use-2015</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Queenie Li</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The value of internal communication in enhancing employees’ health information disclosure intentions in the workplace</article-title>
          <source>Public Relat Rev</source>
          <year>2020</year>
          <month>03</month>
          <volume>46</volume>
          <issue>1</issue>
          <fpage>101872</fpage>
          <pub-id pub-id-type="doi">10.1016/j.pubrev.2019.101872</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>CSK</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>WN</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>NT</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>MC</given-names>
            </name>
          </person-group>
          <article-title>Adoption of an electronic patient record sharing pilot project: cross-sectional survey</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>04</month>
          <day>06</day>
          <volume>22</volume>
          <issue>4</issue>
          <fpage>e13761</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/4/e13761/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13761</pub-id>
          <pub-id pub-id-type="medline">32250279</pub-id>
          <pub-id pub-id-type="pii">v22i4e13761</pub-id>
          <pub-id pub-id-type="pmcid">PMC7171565</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Health information privacy concerns, antecedents, and information disclosure intention in online health communities</article-title>
          <source>Inf Manag</source>
          <year>2018</year>
          <month>06</month>
          <volume>55</volume>
          <issue>4</issue>
          <fpage>482</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2017.11.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Yamamoto</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sugiyama</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Luciano</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tsutsumi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Ohtsuki</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kato</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hiragi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Okamoto</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nambu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kuroda</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Designing a mobile patient information sharing system using patients community members: perceptions of emergency physicians</article-title>
          <source>Eur J Biomed Inf</source>
          <year>2020</year>
          <volume>16</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/profile/Luciano-Santos/publication/348295935_Designing_a_Mobile_Patient_Information_Sharing_System_using_Patient's_Community_Members_Perceptions_of_Emergency_Physicians_Mobile_Patient_Information_Sharing_System_using_Patient's_Community_Members_/links/5ff6a5f5299bf14088789c2d/Designing-a-Mobile-Patient-Information-Sharing-System-using-Patients-Community-Members-Perceptions-of-Emergency-Physicians-Mobile-Patient-Information-Sharing-System-using-Patients-Community-Members-Pe.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pavlou</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>Fygenson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior</article-title>
          <source>MIS Quarterly</source>
          <year>2006</year>
          <volume>30</volume>
          <issue>1</issue>
          <fpage>115</fpage>
          <pub-id pub-id-type="doi">10.2307/25148720</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Omori</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Health information seeking in the Web 2.0 age: trust in social media, uncertainty reduction, and self-disclosure</article-title>
          <source>Comput Hum Behav</source>
          <year>2016</year>
          <month>03</month>
          <volume>56</volume>
          <fpage>289</fpage>
          <lpage>94</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.11.055</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gefen</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Karahanna</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Straub</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>Trust and TAM in online shopping: an integrated model</article-title>
          <source>MIS Quarterly</source>
          <year>2003</year>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>51</fpage>
          <pub-id pub-id-type="doi">10.2307/30036519</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bartek</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Truitt</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Widmer-Rodriguez</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tuia</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bauer</surname>
              <given-names>ZA</given-names>
            </name>
            <name name-style="western">
              <surname>Comstock</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Edwards</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Lawrence</surname>
              <given-names>SO</given-names>
            </name>
            <name name-style="western">
              <surname>Monsell</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Patrick</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Jarvik</surname>
              <given-names>JG</given-names>
            </name>
            <name name-style="western">
              <surname>Lavallee</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>The promise and pitfalls of using crowdsourcing in research prioritization for back pain: cross-sectional surveys</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>10</month>
          <day>06</day>
          <volume>19</volume>
          <issue>10</issue>
          <fpage>e341</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/10/e341/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.8821</pub-id>
          <pub-id pub-id-type="medline">28986339</pub-id>
          <pub-id pub-id-type="pii">v19i10e341</pub-id>
          <pub-id pub-id-type="pmcid">PMC5650676</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Pew Research Center</collab>
          </person-group>
          <source>Internet/Broadband Fact Sheet</source>
          <year>2018</year>
          <access-date>2021-04-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.pewinternet.org/fact-sheet/internet-broadband/">http://www.pewinternet.org/fact-sheet/internet-broadband/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bentler</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <article-title>Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives</article-title>
          <source>Struct Equ Modeling</source>
          <year>1999</year>
          <month>01</month>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1080/10705519909540118</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Multivariate Data Analysis (Vol. 6)</source>
          <year>2006</year>
          <publisher-loc>Upper Saddle River, NJ</publisher-loc>
          <publisher-name>Pearson Prentice Hall</publisher-name>
          <fpage>1</fpage>
          <lpage>703</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rise</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kovac</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Kraft</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Moan</surname>
              <given-names>I S</given-names>
            </name>
          </person-group>
          <article-title>Predicting the intention to quit smoking and quitting behaviour: extending the theory of planned behaviour</article-title>
          <source>Br J Health Psychol</source>
          <year>2008</year>
          <month>05</month>
          <volume>13</volume>
          <issue>Pt 2</issue>
          <fpage>291</fpage>
          <lpage>310</lpage>
          <pub-id pub-id-type="doi">10.1348/135910707X187245</pub-id>
          <pub-id pub-id-type="medline">17535498</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
