<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id><journal-id journal-id-type="publisher-id">jmir</journal-id><journal-id journal-id-type="index">1</journal-id><journal-title>Journal of Medical Internet Research</journal-title><abbrev-journal-title>J Med Internet Res</abbrev-journal-title><issn pub-type="epub">1438-8871</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v28i1e77933</article-id><article-id pub-id-type="doi">10.2196/77933</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Resistance to Blockchain Adoption in Health Care Organizations: Evidence From a Cross-Sectional Study</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Bazomanza Nzabandora</surname><given-names>Wilfried</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Mellouli</surname><given-names>Sehl</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Nishant</surname><given-names>Rohit</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Organizational Information Systems, Faculty of Business Administration, Universit&#x00E9; Laval</institution><addr-line>2325 Rue de la Terrasse</addr-line><addr-line>Qu&#x00E9;bec</addr-line><addr-line>QC</addr-line><country>Canada</country></aff><aff id="aff2"><institution>Queen&#x2019;s Business School, Queen's University Belfast</institution><addr-line>Belfast</addr-line><country>United Kingdom</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Brini</surname><given-names>Stefano</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Cerovecki</surname><given-names>Ivan</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Mohanadas</surname><given-names>Sadhasivam</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>El-Hafeez</surname><given-names>Tarek Abd</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Wilfried Bazomanza Nzabandora, PhD, Department of Organizational Information Systems, Faculty of Business Administration, Universit&#x00E9; Laval, 2325 Rue de la Terrasse, Qu&#x00E9;bec, QC, G1V 0A6, Canada, 1 4184557044; <email>wilfried.nzabandora.1@ulaval.ca</email></corresp></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>8</day><month>4</month><year>2026</year></pub-date><volume>28</volume><elocation-id>e77933</elocation-id><history><date date-type="received"><day>22</day><month>05</month><year>2025</year></date><date date-type="rev-recd"><day>19</day><month>01</month><year>2026</year></date><date date-type="accepted"><day>20</day><month>01</month><year>2026</year></date></history><copyright-statement>&#x00A9; Wilfried Bazomanza Nzabandora, Sehl Mellouli, Rohit Nishant. Originally published in the Journal of Medical Internet Research (<ext-link ext-link-type="uri" xlink:href="https://www.jmir.org">https://www.jmir.org</ext-link>), 8.4.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://www.jmir.org/">https://www.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://www.jmir.org/2026/1/e77933"/><abstract><sec><title>Background</title><p>Traditional health care systems struggle to ensure the security of medical data. To address these issues, organizations are exploring blockchain-based solutions, which offer strong security for managing medical data and transactions. Despite these benefits, adoption remains limited because many health care organizations are hesitant to implement blockchain apps due to perceived risks associated with these apps.</p></sec><sec><title>Objective</title><p>Our research aims to study the adoption of blockchain-based health care apps in health care organizations by adopting a risk-based approach. Using perceived risk theory (PRT), we developed a research model that links specific perceived risks of blockchain-based health care apps to the intention to adopt them.</p></sec><sec sec-type="methods"><title>Methods</title><p>This study used a cross-sectional design to test the research model through an online questionnaire administered to IT professionals from health care organizations in Canada and Africa. IT professionals were selected because they influence technology adoption and possess greater blockchain knowledge than other health care staff. A total of 217 responses were collected; after removing incomplete entries, 194 valid responses remained for analysis. This exceeded the minimum recommended sample size of 100 for structural equation modeling with 8 latent variables, 40 observed variables, a <italic>P</italic> value of .05, and an anticipated effect size of 0.3. Partial least squares structural equation modeling was used to test the hypothesized relationships in the research model.</p></sec><sec sec-type="results"><title>Results</title><p>Harman single-factor test showed that the first factor accounted for 25.376% of the total variance (below 50%), indicating that common method bias was not a concern. Partial least squares structural equation modeling identified key risks influencing the overall perceived risk of blockchain-based health care apps and their adoption in health care organizations. The findings revealed that the relationship between perceived risk and intention to adopt blockchain-based health care apps is significant in Canadian health care organizations but not in African ones. Additionally, the availability of cloud-based blockchain solutions was found to reduce organizations&#x2019; perceived risk related to insufficient resources for adopting and implementing blockchain-based health care apps.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>This study used PRT to identify risks that may hinder the adoption of blockchain-based health care apps. Two risks&#x2014;medical data disclosure and loss of control over medical data&#x2014;were identified as blockchain-specific and incorporated as new PRT dimensions, extending the theory for blockchain contexts. The extended PRT can guide future studies examining reluctance to adopt blockchain apps. Results also show that contextual differences between Canada and Africa influence the relationship between perceived risks and adoption intentions. Our findings are beneficial to governments, health care organizations, and blockchain development agencies, as they will be able to implement strategies to mitigate some of the risks perceived by IT professionals related to blockchain-based health care apps.</p></sec></abstract><kwd-group><kwd>blockchain-based health care apps</kwd><kwd>perceived risk theory</kwd><kwd>blockchain adoption</kwd><kwd>blockchain</kwd><kwd>risks</kwd><kwd>health care</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><sec id="s1-1"><title>Overview</title><p>Over the past decade, different studies have examined the application of blockchain technology in different business domains [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Some of these studies are conducted in the health care domain [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>]. The interest in the health care sector is explained by the profound transformations that blockchain can bring to this field concerning the management of medical data [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref7">7</xref>]. The health care sector is a unique context. It is highly regulated, as it includes sensitive data for which confidentiality must be respected [<xref ref-type="bibr" rid="ref8">8</xref>]. Blockchain-based apps in this domain may provide more protection for health data by ensuring its confidentiality, availability, interoperability, and integrity [<xref ref-type="bibr" rid="ref9">9</xref>]. Notable examples include (1) Medifakt (AKT Health), an Estonia-based decentralized blockchain platform for health care that integrates internet of things and machine learning technologies to improve patient care, enhance security, increase data transparency, and promote interoperability across health care systems [<xref ref-type="bibr" rid="ref10">10</xref>]. The platform supports the transfer, storage, interpretation, and artificial intelligence evaluation of medical data and images [<xref ref-type="bibr" rid="ref11">11</xref>]. (2) Embleema (Robert Chu), a blockchain solution designed to transform clinical trials and regulatory processes by enabling participants to digitally consent to the collection, storage, and analysis of their health care data [<xref ref-type="bibr" rid="ref12">12</xref>]. This accelerates drug development while ensuring data integrity and transparency throughout the research lifecycle. (3) Blockpharma (Blockpharma), a blockchain-based platform that strengthens transparency, traceability, and security in pharmaceutical supply chain management [<xref ref-type="bibr" rid="ref13">13</xref>]. Recording each stage of the supply chain enables patients to verify the authenticity of their medication and supports rigorous quality control through real-time monitoring.</p><p>Studies on blockchain in the health care sector are mainly focused on identifying its use cases and opportunities [<xref ref-type="bibr" rid="ref14">14</xref>]. An analysis of these studies shows that blockchain is used in the health care sector for three main purposes: (1) patient sovereignty over their health care data [<xref ref-type="bibr" rid="ref15">15</xref>], (2) interoperability of electronic health records [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>], and (3) integrity and audit trail of medical transactions [<xref ref-type="bibr" rid="ref18">18</xref>]. Besides the studies that identify blockchain&#x2019;s use cases and opportunities, other studies focus on analyzing the antecedents of the adoption of blockchain-based apps in the health care sector [<xref ref-type="bibr" rid="ref19">19</xref>]. These studies take a social-cognitive approach, analyzing the factors that would facilitate the adoption of blockchain-based apps at individual or organizational levels [<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref24">24</xref>]. Despite these studies, the health care sector is experiencing a low rate of adoption of blockchain-based apps [<xref ref-type="bibr" rid="ref19">19</xref>]. The low adoption rate of blockchain-based apps in many sectors could be explained by organizations&#x2019; reluctance to adopt them due to uncertainty about their risks, financial benefits, and performance [<xref ref-type="bibr" rid="ref25">25</xref>]. The lack of successful use cases for blockchain-based apps prevents potential adopters from perceiving these risks and benefits [<xref ref-type="bibr" rid="ref25">25</xref>]. This is the case in the health care sector, where blockchain is still maturing, and its various use cases are only for experimental purposes, with very basic functionalities [<xref ref-type="bibr" rid="ref26">26</xref>].</p><p>Against this background, our study focuses on the low adoption of blockchain-based apps in the health care sector. We adopt a social-cognitive approach, using perceived risk theory as a theoretical lens, to identify how and to what extent certain perceived risks of blockchain-based apps can prevent their adoption in health care organizations. Identifying these risks will help explain why health care organizations&#x2019; intentions to adopt blockchain-based apps do not translate into acts of adoption.</p></sec><sec id="s1-2"><title>Theoretical Foundation and Conceptual Framework</title><p>This study analyzes how health care organizations&#x2019; perceptions of the risks associated with blockchain-based apps influence their intention to adopt them. Therefore, we use perceived risk theory as the theoretical lens of our study, as it helps to explain the influence of individuals&#x2019; or organizations&#x2019; risk perceptions on their intention to adopt an IT.</p></sec><sec id="s1-3"><title>Perceived Risk Theory</title><p>Developed by Bauer [<xref ref-type="bibr" rid="ref27">27</xref>], perceived risk theory was initially used in studies interested in analyzing the factors that would explain individuals&#x2019; purchasing decisions [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Unlike other individual behavior analysis theories, such as the technology acceptance model, which focuses on the factors likely to influence behavior [<xref ref-type="bibr" rid="ref30">30</xref>], perceived risk theory focuses on factors that could explain individuals&#x2019; resistance to adopt a particular behavior [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Thus, this theory establishes a relationship between the perceived risk of a behavior and its adoption by individuals [<xref ref-type="bibr" rid="ref32">32</xref>].</p><p>A perceived risk is defined as a customer&#x2019;s perception of distrust and potential side effects that could affect the purchase of a product or service [<xref ref-type="bibr" rid="ref33">33</xref>]. Featherman and Pavlou [<xref ref-type="bibr" rid="ref34">34</xref>] also define this concept as the feeling of uncertainty regarding possible negative consequences of using a product or service. The literature includes different conceptualizations of perceived risk [<xref ref-type="bibr" rid="ref35">35</xref>]. In some studies, it is conceptualized as a unidimensional concept [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>] and in other studies as a multidimensional concept [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. The conceptualization of perceived risk as a multidimensional concept makes it possible to consider it as a construct composed of a certain number of dimensions that represent the types of risks that can influence individuals&#x2019; behavior [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. For example, in a research study on online shopping, authors conceptualized perceived risk as an aggregate construct of 6 risk dimensions: financial, performance, social, physical, psychological, and time [<xref ref-type="bibr" rid="ref40">40</xref>]. In information systems research, authors consider other types of risks, such as privacy and security risks (SRs), which extend the list of perceived risk dimensions [<xref ref-type="bibr" rid="ref40">40</xref>].</p></sec><sec id="s1-4"><title>Conceptual Framework and Research Hypotheses</title><p>Our conceptual framework includes 6 types of risks that constitute the perceived risk dimensions of blockchain-based health care apps (BBHAs): SR, failure to gain blockchain benefits risk (FGBBR), organizational readiness risk (ORR), risk of losing control of medical data (RLCMD), risk of disclosing data and medical practices (RDDMP), and immature blockchain ecosystem risk (IBER; <xref ref-type="fig" rid="figure1">Figure 1</xref>). These risks and the assumptions of our conceptual framework are explained in the following paragraphs.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Conceptual framework.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e77933_fig01.png"/></fig></sec><sec id="s1-5"><title>IBER in Health Care</title><p>The health care blockchain ecosystem is crucial for the adoption of blockchain-based apps and includes adopters, developers, consultants, auditors, regulators, and standardization bodies [<xref ref-type="bibr" rid="ref41">41</xref>]. Each stakeholder supports adoption by ensuring app availability, guiding implementation decisions, and establishing regulatory frameworks that protect patient data. A mature ecosystem benefits from an increasing number of adopters, enabling partnerships among health care organizations that enhance the quality of health care services [<xref ref-type="bibr" rid="ref8">8</xref>]. These collaborations encourage knowledge sharing and improve system security through broader participation in network consensus. Consequently, an immature blockchain ecosystem poses a significant risk, increasing health care organizations&#x2019; perceived risk when adopting blockchain-based apps. Beyond shaping risk perceptions, the immaturity of the blockchain ecosystem also reduces health care organizations&#x2019; readiness to adopt blockchain-based apps [<xref ref-type="bibr" rid="ref42">42</xref>]. Indeed, the limited availability of blockchain-skilled professionals restricts organizations&#x2019; ability to recruit personnel capable of implementing and maintaining blockchain health care systems [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. Second, the small number of adopters limits access to feedback from prior blockchain investment projects [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. Without such feedback, health care organizations lack clear information about resources required for adoption and use. These consequences of blockchain ecosystem immaturity weaken organizational preparedness and help explain the hesitation of many health care organizations to adopt BBHAs. The risk of the blockchain ecosystem&#x2019;s immaturity can also negatively affect the expected benefits of blockchain-based apps. For example, low blockchain adoption by health care organizations can lead to weak performance of the blockchain network [<xref ref-type="bibr" rid="ref7">7</xref>]. This weak performance can result from a lack of business partnerships among health care organizations to share medical data through blockchain-based apps [<xref ref-type="bibr" rid="ref7">7</xref>]. This can negatively impact the expected improvement in health care quality for health organizations.</p></sec><sec id="s1-6"><title>SR of Blockchain-Based Apps</title><p>The ability of IT to guarantee the security of user data is decisive in the choice of its use at both the individual and organizational levels [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. Health care organizations are driven by the adoption of blockchain-based apps to ensure greater security of patient medical data [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. However, the security flaws identified in current blockchain-based apps indicate that these apps remain vulnerable to security attacks [<xref ref-type="bibr" rid="ref49">49</xref>]. In BBHAs, several factors can contribute to security flaws, including a lack of patient education [<xref ref-type="bibr" rid="ref50">50</xref>], poor governance of medical data [<xref ref-type="bibr" rid="ref48">48</xref>], and noncompliance with regulations [<xref ref-type="bibr" rid="ref51">51</xref>]. The negative consequences of risks associated with these factors for the security of medical data could influence health care organizations&#x2019; perceptions of risk when adopting blockchain-based apps.</p></sec><sec id="s1-7"><title>FGBBR</title><p>The risk of failure to gain the benefit of a product refers to the possibility that a product does not work as intended and/or does not provide the desired benefits [<xref ref-type="bibr" rid="ref35">35</xref>]. For BBHAs, the failure to obtain the benefits of their use could be caused by several factors, including the nonintegration between these apps with existing health systems, the resistance of patients to share their medical data, and finally, the lack of alignment between the functionalities of these apps and business needs [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. The risks associated with these factors may prevent health care organizations from fully realizing the benefits of blockchain-based apps, as they could negatively influence health care organizations&#x2019; risk perceptions regarding adoption.</p></sec><sec id="s1-8"><title>ORR</title><p>Organizational readiness is defined as &#x201C;the availability of specific organizational resources to adopt new IT innovations&#x201D; [<xref ref-type="bibr" rid="ref20">20</xref>]. In this study, we examine the influence of ORR on health care organizations&#x2019; perceptions of risk related to blockchain-based apps. This risk concerns an organization&#x2019;s lack of IT expertise, IT infrastructure, and financial resources needed to adopt blockchain-based apps. Therefore, we argue that, in the context of blockchain-based apps, inadequate resources for adoption would increase health care organizations&#x2019; perceived risks. In several studies, the lack of organizational readiness is considered a factor that negatively influences the quality of use of a technology, and subsequently, the expected performance or profitability after its adoption [<xref ref-type="bibr" rid="ref53">53</xref>,<xref ref-type="bibr" rid="ref54">54</xref>]. For blockchain-based apps, the lack of competent human resources to use and maintain them, as well as the lack of technical infrastructure to support them, might not enable proper use and continuity of use within organizations. This can negatively influence the quality of services offered by blockchain-based apps and could prevent organizations from gaining the benefits of these apps.</p><p>Next, we investigate the moderating effect of cloud-based blockchain solutions on the relationship between ORR and the perceived risk of BBHAs. In fact, the adoption of blockchain-based apps by organizations requires adequate human, financial, and material resources to better exploit these apps and benefit from them [<xref ref-type="bibr" rid="ref20">20</xref>]. Thus, the lack of these resources increases the risk perception of health care organizations regarding adopting blockchain-based apps [<xref ref-type="bibr" rid="ref20">20</xref>]. To overcome this requirement, organizations use cloud computing for its technological, economic, and operational benefits [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. In the blockchain context, cloud-based solutions would allow health care organizations to use apps based on this technology as Software-as-a-Service (SaaS) [<xref ref-type="bibr" rid="ref56">56</xref>]. This significantly reduces the perceived risk of health care organizations regarding blockchain-based apps.</p></sec><sec id="s1-9"><title>Adoption Intention of BBHAs</title><p>IT attributes play a major role in organizational IT adoption intention [<xref ref-type="bibr" rid="ref57">57</xref>]. Before adopting an innovation, any organization evaluates it on 5 attributes: the complexity of the innovation, its compatibility with the organization, the benefit or advantage that it offers compared to other existing technological choices, and its observability and trialability [<xref ref-type="bibr" rid="ref57">57</xref>]. In addition to these attributes, the intention to adopt an innovation is also influenced by the risks perceived by potential adopters [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]. Therefore, in the context of blockchain-based app adoption, we also argue that risk perception of these apps could negatively influence health care organizations&#x2019; adoption intention.</p></sec><sec id="s1-10"><title>RDDMP</title><p>The transparency of the blockchain&#x2019;s ledger ensures that the data recorded on it is visible to authorized network members [<xref ref-type="bibr" rid="ref60">60</xref>]. For health care structures, ledger transparency can increase the risk of data and medical practice disclosure, with negative consequences for structures that disclose their data and medical practices. For example, when a health structure registers its care protocols on the blockchain ledger, other structures authorized to consult it can learn about those protocols. This can cause a loss of competitive advantage for the structure that discloses its protocols. Thus, the negative consequences associated with the disclosure of data and medical practices raise concerns among health care organizations, increasing their perceived risks of adopting blockchain-based apps.</p></sec><sec id="s1-11"><title>RLCMD</title><p>Integrating blockchain in the health care sector brings a profound transformation in the management of patient medical data [<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. This technology puts the ownership of medical data in the hands of patients and places them at the center of its management [<xref ref-type="bibr" rid="ref62">62</xref>]. Thus, no health structure can consult or use patients&#x2019; medical data without consent [<xref ref-type="bibr" rid="ref62">62</xref>]. The obligation to obtain patients&#x2019; consent before consulting their medical data and the control patients can exercise over how their data are used significantly limit the power of health care structures over patients&#x2019; medical data. This limitation on health care organizations&#x2019; power over medical data increases their perception of risks regarding adopting blockchain in medical data management.</p><p>Each risk described above gives rise to a research hypothesis. Therefore, our research is based on the following hypotheses:</p><list list-type="bullet"><list-item><p>H1: The risk of immaturity of the blockchain ecosystem in health care is positively associated with the perceived risk of blockchain-based apps by health care organizations (H1a), the risk of organizational readiness (H1b), and the risk of failing to benefit from blockchain-based apps (H1c).</p></list-item><list-item><p>H2: SR is positively associated with the perceived risk of blockchain-based apps by health care organizations.</p></list-item><list-item><p>H3: The risk of failure to gain benefits from blockchain-based apps is positively associated with health care organizations&#x2019; perceived risk regarding these apps.</p></list-item><list-item><p>H4: ORR is positively associated with the perceived risk of blockchain-based apps by health care organizations (H4a), as well as the risk of failure to gain benefits of blockchain-based apps (H4b).</p></list-item><list-item><p>H5: The existence of cloud-based blockchain solutions (ECBS) moderates the relationship between ORR and the perceived risk of BBHAs, such that the positive relationship between ORR and the perceived risk of BBHAs is weak when cloud-based blockchain solutions are present.</p></list-item><list-item><p>H6: Perceived risk of blockchain-based apps is negatively associated with the health care organizations&#x2019; intention to adopt these apps.</p></list-item><list-item><p>H7: RDDMP is positively associated with the perceived risk of blockchain-based apps by health care organizations.</p></list-item><list-item><p>H8: RLCMD is positively associated with the perceived risk of blockchain-based apps by health care organizations.</p></list-item></list></sec></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Overview</title><p>In this section, we present the research design for our study, which includes 3 sections: research strategy and questionnaire design, data collection, and common method bias.</p></sec><sec id="s2-2"><title>Research Strategy and Questionnaire Design</title><p>Our study adopts a cross-sectional research design, as it analyzes data from a population at a specific point in time [<xref ref-type="bibr" rid="ref63">63</xref>]. Therefore, it was reported in accordance with the STROBE (Strengthening the Reporting of Observational Studies in Epidemiology) guidelines adapted for cross-sectional studies [<xref ref-type="bibr" rid="ref64">64</xref>]. The dimensions of the perceived risk and their reflexive measures are treated as latent (constructs) and manifest variables (items), respectively. To ensure construct validity, the items for each construct are taken from the literature, which we have subsequently adapted to our research context. We converted all the items to a semantic differential scale (1-10) to minimize common method bias by drawing inspiration from the measurement model proposed by Mitchell [<xref ref-type="bibr" rid="ref65">65</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> shows the definition of constructs and the sources of their items. Table S1 in the <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> provides the questionnaire.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Operationalization of variables.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Construct and subconstructs (items)</td><td align="left" valign="bottom">Construct and subconstruct definitions</td><td align="left" valign="bottom">Sources of items</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="3">Intention to adopt</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>None</td><td align="left" valign="top">A measure of the strength of one&#x2019;s intention to perform a behavior (behavioral intention) [<xref ref-type="bibr" rid="ref66">66</xref>]</td><td align="left" valign="top">Venkatesh et al [<xref ref-type="bibr" rid="ref67">67</xref>]; Glover and Benbasat [<xref ref-type="bibr" rid="ref35">35</xref>]; and Teo et al [<xref ref-type="bibr" rid="ref68">68</xref>]</td></tr><tr><td align="left" valign="top" colspan="3">Perceived risk: the feeling of uncertainty regarding possible negative consequences of using a product or a service [<xref ref-type="bibr" rid="ref34">34</xref>]</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Failure to gain blockchain benefits risks</td><td align="left" valign="top">Failure to gain blockchain benefits regarding quality health care services, reduced cost, efficiency and security, and regulatory compliance [<xref ref-type="bibr" rid="ref69">69</xref>]</td><td align="left" valign="top">Garg et al [<xref ref-type="bibr" rid="ref69">69</xref>]</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Security risk</td><td align="left" valign="top">Concerns that data and information may be open to security concerns, such as hacking, inaccurate information dispersal, and access to sensitive information [<xref ref-type="bibr" rid="ref70">70</xref>]</td><td align="left" valign="top">Shah et al [<xref ref-type="bibr" rid="ref71">71</xref>]; B&#x00E9;langer and Carter [<xref ref-type="bibr" rid="ref72">72</xref>]; and Hartono et al [<xref ref-type="bibr" rid="ref73">73</xref>]</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Organizational readiness risk</td><td align="left" valign="top">Risk beliefs of the health care organization&#x2019;s lack of financial and technological resources to adopt blockchain-based apps [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]</td><td align="left" valign="top">Kouhizadeh et al [<xref ref-type="bibr" rid="ref70">70</xref>]</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Immaturity blockchain ecosystem risk</td><td align="left" valign="top">Lack of community of players, such as blockchain experts and developers, blockchain adopters, and regulators interacting in the health care industry [<xref ref-type="bibr" rid="ref75">75</xref>]</td><td align="left" valign="top">Alzahrani et al [<xref ref-type="bibr" rid="ref76">76</xref>]; Kyriakidou et al [<xref ref-type="bibr" rid="ref77">77</xref>]</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Risk of losing control of medical data</td><td align="left" valign="top">Risk beliefs of health professionals regarding the loss of autonomy in managing patients&#x2019; medical data [<xref ref-type="bibr" rid="ref78">78</xref>]</td><td align="left" valign="top">Nogueira et al [<xref ref-type="bibr" rid="ref79">79</xref>]; Ligiane Cristina Braga de Oliveira et al [<xref ref-type="bibr" rid="ref80">80</xref>]</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Risk of disclosing data and medical practices</td><td align="left" valign="top">Risk beliefs about submitting data and medical practices on the blockchain ledger shared by multiple health care organizations [<xref ref-type="bibr" rid="ref81">81</xref>]</td><td align="left" valign="top">Bansal et al [<xref ref-type="bibr" rid="ref82">82</xref>]; Bansal et al [<xref ref-type="bibr" rid="ref83">83</xref>]</td></tr></tbody></table></table-wrap></sec><sec id="s2-3"><title>Data Collection</title><p>We conducted a survey to collect data over a 2-month period. This survey used an online questionnaire. Our study used purposive sampling. This type of sampling allowed us to select a sample from which the most can be learned [<xref ref-type="bibr" rid="ref84">84</xref>]. Thus, IT professionals from health care facilities were selected as respondents to our study because of their greater knowledge of blockchain, a technology central to our research. The choice of a sample composed of IT professionals from health care facilities in Canada and emerging countries (the Democratic Republic of Congo, Burundi, and Rwanda) enabled us to minimize the risk of a low response rate, which could be caused by the nonparticipation of some respondents in our survey due to their ignorance of blockchain. We contacted 65 health care structures by email to request their participation (55 in Africa and 10 in Canada). At the end of the survey, we received 217 responses. After deleting responses with missing values (23), 194 valid responses were used for data analysis. We excluded responses with missing data for 2 primary reasons. First, these cases contained only demographic information and lacked any data on the study variables, making them unsuitable for analysis. Second, the number of excluded responses was minimal (23/243), representing less than 10% of the sample. Therefore, their removal is unlikely to affect the validity or representativeness of the dataset. The valid responses obtained for the study (n=194) exceeded the minimum recommended sample size (n=100) for structural equation modeling with 8 latent variables, 40 observed variables, <italic>P</italic> value of .05, and anticipated effect size of 0.3 [<xref ref-type="bibr" rid="ref85">85</xref>]. Thus, the sample size was considered adequate for analyzing the influence of IT professionals&#x2019; perception of risk regarding blockchain-based apps on their intention to adopt in health care structures. The respondents&#x2019; demographic information is shown in <xref ref-type="table" rid="table2">Table 2</xref>.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Demographic information.</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables and categories</td><td align="left" valign="bottom">Participants, n (%)</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="2">Age (years)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>18&#x2010;30</td><td align="left" valign="top">56 (28.9)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>31&#x2010;45</td><td align="left" valign="top">91 (46.9)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>46&#x2010;60</td><td align="left" valign="top">42 (21.6)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003E;60</td><td align="left" valign="top">5 (2.6)</td></tr><tr><td align="left" valign="top" colspan="2">Sex</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Female</td><td align="left" valign="top">67 (34.5)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Male</td><td align="left" valign="top">127 (65.5)</td></tr><tr><td align="left" valign="top" colspan="2">Continent</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Africa</td><td align="left" valign="top">189 (97.4)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>America</td><td align="left" valign="top">5 (2.6)</td></tr><tr><td align="left" valign="top" colspan="2">Experience with blockchain-based apps</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">171 (88.1)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">23 (11.9)</td></tr><tr><td align="left" valign="top" colspan="2">Use of blockchain-based app within health care facility</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">1 (0.5)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">193 (99.5)</td></tr></tbody></table></table-wrap></sec><sec id="s2-4"><title>Control Variable</title><p>The model estimation includes a control variable, namely country (<xref ref-type="fig" rid="figure1">Figure 1</xref>), which we transformed into a binary variable (0=Africa and 1=Canada) before its use in SmartPLS (SmartPLS GmbH). A country&#x2019;s economic, legal, and political contexts play an important role in the assimilation of innovations within organizations [<xref ref-type="bibr" rid="ref86">86</xref>]. Therefore, there is a significant difference in the assimilation of innovations between organizations in developed and developing countries [<xref ref-type="bibr" rid="ref86">86</xref>,<xref ref-type="bibr" rid="ref87">87</xref>]. Unlike developing countries, developed countries are characterized by an economic, political, and regulatory environment favorable to the assimilation of innovations [<xref ref-type="bibr" rid="ref86">86</xref>]. Given that our study is conducted in Canada and Africa, we also want to analyze how the difference in context (economic, legal, and political) between Canada and African countries could affect the associations between the variables in the model, depending on whether the health care structures are in Canada or Africa. This justifies the introduction of the country as a control variable in the estimation of our theoretical model.</p></sec><sec id="s2-5"><title>Common Method Bias</title><p>Common method bias results &#x201C;from the fact that the predictor and criterion variables are obtained from the same source or rater, whereas others are produced by the measurement items themselves, the context of the items within the measurement instrument, and/or the context in which the measures are obtained<italic>&#x201D;</italic> [<xref ref-type="bibr" rid="ref88">88</xref>]. Since this research involved self-reported responses collected from a single setting, we will follow the 3-step approach proposed by Guan et al [<xref ref-type="bibr" rid="ref89">89</xref>] to address the common method bias. First, the measurement items were adopted from well-established existing research. Second, in the survey, we made it clear to all the respondents that there was no right or wrong answer, and they should choose the answers that they considered the most appropriate. We also highlighted the fact that respondents&#x2019; answers would be kept anonymous. Third, we conducted Harman single-factor test by entering all the measurement variables in an exploratory factor analysis using IBM SPSS 22.0. The sample would have a common method bias problem if a single construct explained more than 50% of the extracted variance. The results of the exploratory factor analysis show that the first factor explained 25.376% of the total variance (less than 50%), indicating that common method bias was not a problem in this dataset.</p></sec><sec id="s2-6"><title>Ethical Considerations</title><p>This research has received ethical approval from the Research Ethics Committee of Universit&#x00E9; Laval (approval number: 2022&#x2010;427 A-1 R-1/11-12-2023). During the data collection phase, each participant was informed of the research objectives and associated risks. This process enabled participants to provide informed consent by signing the designated consent form. To ensure confidentiality and privacy, data were initially collected using the LimeSurvey platform (LimeSurvey GmbH), which stores survey responses on a server located in Canada. Subsequently, the exported data were securely stored on Universit&#x00E9; Laval&#x2019;s licensed Microsoft 365 OneDrive server. Participant privacy was further protected by presenting research findings using anonymized data, which prevents the identification of individual respondents. No identification of individual participants is possible in the images of the manuscript or supplementary material. Participation in the study was entirely voluntary and was not contingent upon any monetary or other form of compensation.</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Overview</title><p>We used the partial least squares structural equation modeling (PLS-SEM) method to assess the hypothesized relationships between our constructs (using SmartPLS 4.1.0.8; SmartPLS GmbH) [<xref ref-type="bibr" rid="ref90">90</xref>]. We follow a 2-phase approach to analyze the PLS-SEM model proposed by Guan et al [<xref ref-type="bibr" rid="ref89">89</xref>]: (1) evaluation of the reliability and validity of the measurement model and (2) evaluation of the structural model.</p></sec><sec id="s3-2"><title>Measurement Model</title><p><xref ref-type="table" rid="table3">Table 3</xref> shows the results of the measurement model. The measurement model was tested by examining both convergent and discriminant validity [<xref ref-type="bibr" rid="ref89">89</xref>]. For testing convergent validity, we assess both item reliability and construct reliability of the measurement model [<xref ref-type="bibr" rid="ref29">29</xref>]. Throughout the assessment of item reliability, we removed items associated with constructs with factor loading (&#x03BB;) values below .7. As a result, we deleted 1 RLCMD item (RLCMD1), 2 SR items (SR1 and SR2), 3 IBER items (IBER1, IBER2, and IBER3), 2 ORR items (ORR2 and ORR4), and 4 FGBBR items (FGBBR1, FGBBR3, FGBBR8, and FGBBR10). Removing these items from their respective constructs enabled us to retain a measurement model composed of constructs with items whose factor loadings are greater than or equal to .7, confirming the item reliability of the measurement model. Construct reliability was verified by analyzing composite reliability (CR) and Cronbach &#x03B1; values. Each construct has CR and Cronbach &#x03B1; values that exceed the recommended threshold of .7, demonstrating the construct reliability of the measurement model. Furthermore, the average variance extracted (AVE) for each construct exceeds the minimum required value of .50, which confirms the convergent validity of the constructs in the measurement model [<xref ref-type="bibr" rid="ref91">91</xref>]. Once convergent validity was established, we assessed discriminant validity. The discriminant validity was assessed using the Fornell and Larcker [<xref ref-type="bibr" rid="ref92">92</xref>] method. As shown in <xref ref-type="table" rid="table4">Table 4</xref>, the square root of the AVE of each construct was greater than the correlations it shared with other constructs. For example, the square root AVE for FGBBR is .811, and this is greater than the correlation it shares with other constructs. As this was the case with all constructs, discriminant validity was obtained. Overall, the evidence indicates the adequacy of the measurement model. This leads to the next stage of testing the structural model.</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Measurement model results.</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Constructs and items</td><td align="left" valign="bottom">&#x03BB;<sup><xref ref-type="table-fn" rid="table3fn1">a</xref></sup></td><td align="left" valign="bottom">VIF<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="bottom">Cronbach &#x03B1;</td><td align="left" valign="bottom">CR<sup><xref ref-type="table-fn" rid="table3fn3">c</xref></sup></td><td align="left" valign="bottom">AVE<sup><xref ref-type="table-fn" rid="table3fn4">d</xref></sup></td></tr></thead><tbody><tr><td align="left" valign="top" colspan="3">FGBBR<sup><xref ref-type="table-fn" rid="table3fn5">e</xref></sup></td><td align="char" char="." valign="top">0.896</td><td align="char" char="." valign="top">0.920</td><td align="char" char="." valign="top">0.657</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>FGBBR2</td><td align="char" char="." valign="top">0.810</td><td align="char" char="." valign="top">2.275</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>FGBBR4</td><td align="char" char="." valign="top">0.822</td><td align="char" char="." valign="top">2.533</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>FGBBR5</td><td align="char" char="." valign="top">0.836</td><td align="char" char="." valign="top">2.831</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>FGBBR6</td><td align="char" char="." valign="top">0.822</td><td align="char" char="." valign="top">2.324</td><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content></td><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content></td><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>FGBBR7</td><td align="char" char="." valign="top">0.807</td><td align="char" char="." valign="top">2.369</td><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content></td><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content></td><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>FGBBR9</td><td align="char" char="." valign="top">0.765</td><td align="char" char="." valign="top">1.883</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="3">IABHA<sup><xref ref-type="table-fn" rid="table3fn6">f</xref></sup></td><td align="char" char="." valign="top">0.844</td><td align="char" char="." valign="top">0.896</td><td align="char" char="." valign="top">0.685</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IABHA1</td><td align="char" char="." valign="top">0.894</td><td align="char" char="." valign="top">3.213</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IABHA2</td><td align="char" char="." valign="top">0.725</td><td align="char" char="." valign="top">1.546</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IABHA3</td><td align="char" char="." valign="top">0.902</td><td align="char" char="." valign="top">3.327</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IABHA4</td><td align="char" char="." valign="top">0.776</td><td align="char" char="." valign="top">1.704</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="3">IBER<sup><xref ref-type="table-fn" rid="table3fn7">g</xref></sup></td><td align="char" char="." valign="top">0.877</td><td align="char" char="." valign="top">0.923</td><td align="char" char="." valign="top">0.800</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IBER1</td><td align="char" char="." valign="top">0.888</td><td align="char" char="." valign="top">2.811</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IBER3</td><td align="char" char="." valign="top">0.894</td><td align="char" char="." valign="top">2.772</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>IBER5</td><td align="char" char="." valign="top">0.901</td><td align="char" char="." valign="top">2.022</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="3">ORR<sup><xref ref-type="table-fn" rid="table3fn8">h</xref></sup></td><td align="char" char="." valign="top">0.867</td><td align="char" char="." valign="top">0.919</td><td align="char" char="." valign="top">0.790</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>ORR1</td><td align="char" char="." valign="top">0.910</td><td align="char" char="." valign="top">2.653</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>ORR3</td><td align="char" char="." valign="top">0.876</td><td align="char" char="." valign="top">2.144</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>ORR5</td><td align="char" char="." valign="top">0.881</td><td align="char" char="." valign="top">2.189</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="3">RDDMP<sup><xref ref-type="table-fn" rid="table3fn9">i</xref></sup></td><td align="char" char="." valign="top">0.748</td><td align="char" char="." valign="top">0.851</td><td align="char" char="." valign="top">0.656</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>RDDMP1</td><td align="char" char="." valign="top">0.734</td><td align="char" char="." valign="top">1.728</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>RDDMP2</td><td align="char" char="." valign="top">0.804</td><td align="char" char="." valign="top">1.611</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>RDDMP3</td><td align="char" char="." valign="top">0.887</td><td align="char" char="." valign="top">2.144</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="3">RLCMD<sup><xref ref-type="table-fn" rid="table3fn10">j</xref></sup></td><td align="char" char="." valign="top">0.854</td><td align="char" char="." valign="top">0.906</td><td align="char" char="." valign="top">0.764</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>RLCMD2</td><td align="char" char="." valign="top">0.870</td><td align="char" char="." valign="top">2.550</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>RLCMD3</td><td align="char" char="." valign="top">0.819</td><td align="char" char="." valign="top">1.952</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>RLCMD4</td><td align="char" char="." valign="top">0.928</td><td align="char" char="." valign="top">2.116</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="3">SR<sup><xref ref-type="table-fn" rid="table3fn11">k</xref></sup></td><td align="char" char="." valign="top">0.784</td><td align="char" char="." valign="top">0.857</td><td align="char" char="." valign="top">0.600</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>SR3</td><td align="char" char="." valign="top">0.732</td><td align="char" char="." valign="top">1.612</td><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/><td align="char" char="." valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>SR4</td><td align="char" char="." valign="top">0.722</td><td align="char" char="." valign="top">2.252</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>SR5</td><td align="char" char="." valign="top">0.727</td><td align="char" char="." valign="top">2.248</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>SR6</td><td align="char" char="." valign="top">0.812</td><td align="char" char="." valign="top">1.867</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>SR7</td><td align="char" char="." valign="top">0.838</td><td align="char" char="." valign="top">1.907</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr></tbody></table><table-wrap-foot><fn id="table3fn1"><p><sup>a</sup>&#x03BB;: standardized factor loading.</p></fn><fn id="table3fn2"><p><sup>b</sup>VIF: variance inflation factor.</p></fn><fn id="table3fn3"><p><sup>c</sup>CR: composite reliability.</p></fn><fn id="table3fn4"><p><sup>d</sup>AVE: average variance extracted.</p></fn><fn id="table3fn5"><p><sup>e</sup>FGBBR: failure to gain blockchain benefits risk.</p></fn><fn id="table3fn6"><p><sup>f</sup>IABHA: adoption intention of blockchain-based health care apps.</p></fn><fn id="table3fn7"><p><sup>g</sup>IBER: immature blockchain ecosystem risk.</p></fn><fn id="table3fn8"><p><sup>h</sup>ORR: organizational readiness risk.</p></fn><fn id="table3fn9"><p><sup>i</sup>RDDMP: risk of disclosing data and medical practices.</p></fn><fn id="table3fn10"><p><sup>j</sup>RLCMD: risk of losing control of medical data.</p></fn><fn id="table3fn11"><p><sup>k</sup>SR: security risk.</p></fn></table-wrap-foot></table-wrap><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>Results for discriminant validity.</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Constructs</td><td align="left" valign="bottom">FGBBR<sup><xref ref-type="table-fn" rid="table4fn1">a</xref></sup></td><td align="left" valign="bottom">IABHA<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup></td><td align="left" valign="bottom">IBER<sup><xref ref-type="table-fn" rid="table4fn3">c</xref></sup></td><td align="left" valign="bottom">ORR<sup><xref ref-type="table-fn" rid="table4fn4">d</xref></sup></td><td align="left" valign="bottom">PRBHA<sup><xref ref-type="table-fn" rid="table4fn5">e</xref></sup></td><td align="left" valign="bottom">RDDMP<sup><xref ref-type="table-fn" rid="table4fn6">f</xref></sup></td><td align="left" valign="bottom">RLCMD<sup><xref ref-type="table-fn" rid="table4fn7">g</xref></sup></td><td align="left" valign="bottom">SR<sup><xref ref-type="table-fn" rid="table4fn8">h</xref></sup></td></tr></thead><tbody><tr><td align="left" valign="top">FGBBR</td><td align="left" valign="top">0.811</td><td align="left" valign="top">&#x2013;0.231</td><td align="left" valign="top">0.439</td><td align="left" valign="top">0.429</td><td align="left" valign="top">0.864</td><td align="left" valign="top">0.217</td><td align="left" valign="top">0.289</td><td align="left" valign="top">0.428</td></tr><tr><td align="left" valign="top">IABHA</td><td align="left" valign="top">&#x2013;0.231</td><td align="left" valign="top">0.828</td><td align="left" valign="top">&#x2013;0.056</td><td align="left" valign="top">&#x2013;0.061</td><td align="left" valign="top">&#x2013;0.409</td><td align="left" valign="top">&#x2013;0.232</td><td align="left" valign="top">&#x2013;0.047</td><td align="left" valign="top">&#x2013;0.151</td></tr><tr><td align="left" valign="top">IBER</td><td align="left" valign="top">0.439</td><td align="left" valign="top">&#x2013;0.056</td><td align="left" valign="top">0.894</td><td align="left" valign="top">0.824</td><td align="left" valign="top">0.711</td><td align="left" valign="top">&#x2013;0.237</td><td align="left" valign="top">0.790</td><td align="left" valign="top">&#x2013;0.066</td></tr><tr><td align="left" valign="top">ORR</td><td align="left" valign="top">0.429</td><td align="left" valign="top">&#x2013;0.061</td><td align="left" valign="top">0.824</td><td align="left" valign="top">0.889</td><td align="left" valign="top">0.732</td><td align="left" valign="top">&#x2013;0.062</td><td align="left" valign="top">0.552</td><td align="left" valign="top">0.163</td></tr><tr><td align="left" valign="top">PRBHA</td><td align="left" valign="top">0.864</td><td align="left" valign="top">&#x2013;0.409</td><td align="left" valign="top">0.711</td><td align="left" valign="top">0.732</td><td align="left" valign="top">0.511</td><td align="left" valign="top">0.183</td><td align="left" valign="top">0.509</td><td align="left" valign="top">0.455</td></tr><tr><td align="left" valign="top">RDDMP</td><td align="left" valign="top">0.217</td><td align="left" valign="top">&#x2013;0.232</td><td align="left" valign="top">&#x2013;0.237</td><td align="left" valign="top">&#x2013;0.062</td><td align="left" valign="top">0.183</td><td align="left" valign="top">0.81</td><td align="left" valign="top">&#x2013;0.480</td><td align="left" valign="top">0.459</td></tr><tr><td align="left" valign="top">RLCMD</td><td align="left" valign="top">0.289</td><td align="left" valign="top">-0,047</td><td align="left" valign="top">0.790</td><td align="left" valign="top">0.552</td><td align="left" valign="top">0.509</td><td align="left" valign="top">&#x2013;0.480</td><td align="left" valign="top">0.874</td><td align="left" valign="top">&#x2013;0.232</td></tr><tr><td align="left" valign="top">SR</td><td align="left" valign="top">0.428</td><td align="left" valign="top">&#x2013;0.151</td><td align="left" valign="top">&#x2013;0.066</td><td align="left" valign="top">0.163</td><td align="left" valign="top">0.455</td><td align="left" valign="top">0.459</td><td align="left" valign="top">&#x2013;0.232</td><td align="left" valign="top">0.774</td></tr></tbody></table><table-wrap-foot><fn id="table4fn1"><p><sup>a</sup>FGBBR: failure to gain blockchain benefits risk.</p></fn><fn id="table4fn2"><p><sup>b</sup>IABHA: adoption intention of blockchain-based health care apps.</p></fn><fn id="table4fn3"><p><sup>c</sup>IBER: immature blockchain ecosystem risk.</p></fn><fn id="table4fn4"><p><sup>d</sup>ORR: organizational readiness risk.</p></fn><fn id="table4fn5"><p><sup>e</sup>PRBHA: perceived risk of blockchain-based health care apps.</p></fn><fn id="table4fn6"><p><sup>f</sup>RDDMP: risk of disclosing data and medical practices.</p></fn><fn id="table4fn7"><p><sup>g</sup>RLCMD: risk of losing control of medical data.</p></fn><fn id="table4fn8"><p><sup>h</sup>SR: security risk.</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-3"><title>Structural Model</title><p>As the reliability and validity of the variables are established, we examine the structural model to investigate the correlations between the theoretical constructs and test the effect of the moderating variable [<xref ref-type="bibr" rid="ref93">93</xref>]. The results of the structural model are shown in <xref ref-type="table" rid="table5">Table 5</xref> (a summary of the results of hypothesis testing) and <xref ref-type="fig" rid="figure2">Figure 2</xref> (PLS results of the structural model). Before assessing the structural model, we first assess the collinearity issue [<xref ref-type="bibr" rid="ref94">94</xref>] and the structural model&#x2019;s predictive accuracy [<xref ref-type="bibr" rid="ref95">95</xref>]. <xref ref-type="table" rid="table3">Table 3</xref> shows that all variance inflation factor values of the items are less than 5, indicating that collinearity is not an issue among the constructs [<xref ref-type="bibr" rid="ref91">91</xref>]. The measure most often used to assess a structural model&#x2019;s predictive accuracy in the PLS-SEM method is the <italic>R</italic><sup>2</sup> coefficient of determination. Moreover, a model is judged as interesting if it has a sufficiently large <italic>R</italic><sup>2</sup> (&#x003E;0.25) [<xref ref-type="bibr" rid="ref95">95</xref>]. The results in <xref ref-type="table" rid="table6">Table 6</xref> show that 3 constructs (FGBBR: 0.199, ORR: 0.677, and PRBHA [perceived risk of blockchain-based health care apps]: 0.958) are explained at a substantial level and one (IABHA [adoption intention of blockchain-based health care apps]: 0.163) is explained at a weak level [<xref ref-type="bibr" rid="ref96">96</xref>,<xref ref-type="bibr" rid="ref97">97</xref>]. Based on the <italic>R</italic><sup>2</sup> values, we can state that the model&#x2019;s predictive accuracy is moderate.</p><table-wrap id="t5" position="float"><label>Table 5.</label><caption><p>Structural model results and hypothesis testing.</p></caption><table id="table5" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Hypothesis</td><td align="left" valign="bottom">Path coefficient</td><td align="left" valign="bottom"><italic>t</italic> statistics</td><td align="left" valign="bottom"><italic>P</italic> values</td><td align="left" valign="bottom">Inference</td></tr></thead><tbody><tr><td align="left" valign="top">H<sub>1a</sub>: IBER<sup><xref ref-type="table-fn" rid="table5fn1">a</xref></sup> &#x2192; PRBHA<sup><xref ref-type="table-fn" rid="table5fn2">b</xref></sup></td><td align="left" valign="top">0.205</td><td align="left" valign="top">1.692</td><td align="left" valign="top">.05</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>1b</sub>: IBER &#x2192; ORR<sup><xref ref-type="table-fn" rid="table5fn3">c</xref></sup></td><td align="left" valign="top">0.824</td><td align="left" valign="top">34.743</td><td align="left" valign="top">.00</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>1c</sub>: IBER &#x2192; FGBBR<sup><xref ref-type="table-fn" rid="table5fn4">d</xref></sup></td><td align="left" valign="top">0.265</td><td align="left" valign="top">2.339</td><td align="left" valign="top">.01</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>2</sub>: SR<sup><xref ref-type="table-fn" rid="table5fn5">e</xref></sup> &#x2192; PRBHA</td><td align="left" valign="top">0.201</td><td align="left" valign="top">1.930</td><td align="left" valign="top">.03</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>3</sub>: FGBBR &#x2192; PRBHA</td><td align="left" valign="top">0.503</td><td align="left" valign="top">6.129</td><td align="left" valign="top">.00</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>4a</sub>: ORR &#x2192; PRBHA</td><td align="left" valign="top">0.171</td><td align="left" valign="top">2.011</td><td align="left" valign="top">.02</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>4b</sub>: ORR &#x2192; FGBBR</td><td align="left" valign="top">0.211</td><td align="left" valign="top">1.687</td><td align="left" valign="top">.05</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>5</sub>: ECBS<sup><xref ref-type="table-fn" rid="table5fn6">f</xref></sup> x ORR &#x2192; PRBHA</td><td align="left" valign="top">&#x2212;0.085</td><td align="left" valign="top">2.133</td><td align="left" valign="top">.02</td><td align="left" valign="top">Supported</td></tr><tr><td align="left" valign="top">H<sub>6</sub>: PRBHA &#x2192; IABHA<sup><xref ref-type="table-fn" rid="table5fn7">g</xref></sup></td><td align="left" valign="top">&#x2212;0.409</td><td align="left" valign="top">1.470</td><td align="left" valign="top">.07</td><td align="left" valign="top">Not supported</td></tr><tr><td align="left" valign="top">H<sub>7</sub>: RDDMP<sup><xref ref-type="table-fn" rid="table5fn8">h</xref></sup> &#x2192; PRBHA</td><td align="left" valign="top">0.121</td><td align="left" valign="top">1.021</td><td align="left" valign="top">.15</td><td align="left" valign="top">Not supported</td></tr><tr><td align="left" valign="top">H<sub>8</sub>: RLCMD<sup><xref ref-type="table-fn" rid="table5fn9">i</xref></sup> &#x2192; PRBHA</td><td align="left" valign="top">0.167</td><td align="left" valign="top">2.068</td><td align="left" valign="top">.02</td><td align="left" valign="top">Supported</td></tr></tbody></table><table-wrap-foot><fn id="table5fn1"><p><sup>a</sup>IBER: immature blockchain ecosystem risk.</p></fn><fn id="table5fn2"><p><sup>b</sup>PRBHA: perceived risk of blockchain-based health care apps.</p></fn><fn id="table5fn3"><p><sup>c</sup>ORR: organizational readiness risk.</p></fn><fn id="table5fn4"><p><sup>d</sup>FGBBR: failure to gain blockchain benefits risk.</p></fn><fn id="table5fn5"><p><sup>e</sup>SR: security risk.</p></fn><fn id="table5fn6"><p><sup>f</sup>ECBS: existence of cloud-based blockchain solutions.</p></fn><fn id="table5fn7"><p><sup>g</sup>IABHA: adoption intention of blockchain-based health care apps.</p></fn><fn id="table5fn8"><p><sup>h</sup>RDDMP: risk of disclosing data and medical practices.</p></fn><fn id="table5fn9"><p><sup>i</sup>RLCMD: risk of losing control of medical data.</p></fn></table-wrap-foot></table-wrap><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>Structural model result. ECBS: existence of cloud-based blockchain solutions; FGBBR: failure to gain blockchain benefits risk; IABHA: adoption intention of blockchain-based health care apps; IBER: immature blockchain ecosystem risk; ORR: organizational readiness risk; PRBHA: perceived risk of blockchain-based health care apps; RDDMP: risk of disclosing data and medical practices; RLCMD: risk of losing control of medical data; SR: security risk.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e77933_fig02.png"/></fig><table-wrap id="t6" position="float"><label>Table 6.</label><caption><p><italic>R</italic><sup>2</sup> values.</p></caption><table id="table6" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Constructs</td><td align="left" valign="bottom"><italic>R</italic><sup>2</sup></td><td align="left" valign="bottom"><italic>R</italic><sup>2</sup> adjusted</td><td align="left" valign="bottom">Results</td></tr></thead><tbody><tr><td align="left" valign="top">FGBBR<sup><xref ref-type="table-fn" rid="table6fn1">a</xref></sup></td><td align="char" char="." valign="top">0.207</td><td align="char" char="." valign="top">0.199</td><td align="left" valign="top">Substantial</td></tr><tr><td align="left" valign="top">IABHA<sup><xref ref-type="table-fn" rid="table6fn2">b</xref></sup></td><td align="char" char="." valign="top">0.167</td><td align="char" char="." valign="top">0.163</td><td align="left" valign="top">Weak</td></tr><tr><td align="left" valign="top">ORR<sup><xref ref-type="table-fn" rid="table6fn3">c</xref></sup></td><td align="char" char="." valign="top">0.678</td><td align="char" char="." valign="top">0.677</td><td align="left" valign="top">Substantial</td></tr><tr><td align="left" valign="top">PRBHA<sup><xref ref-type="table-fn" rid="table6fn4">d</xref></sup></td><td align="char" char="." valign="top">0.960</td><td align="char" char="." valign="top">0.958</td><td align="left" valign="top">Substantial</td></tr></tbody></table><table-wrap-foot><fn id="table6fn1"><p><sup>a</sup>FGBBR: failure to gain blockchain benefits risk.</p></fn><fn id="table6fn2"><p><sup>b</sup>IABHA: adoption intention of blockchain-based health care apps.</p></fn><fn id="table6fn3"><p><sup>c</sup>ORR: organizational readiness risk.</p></fn><fn id="table6fn4"><p><sup>d</sup>PRBHA: perceived risk of blockchain-based health care apps.</p></fn></table-wrap-foot></table-wrap><p>Next, we take a close look at the hypothesized relationships of the structural model. The hypotheses H1a, H2-H4a, and H7-H8 represent the association between PRBHA and its dimensions (IBER, SR, FGBBR, ORR, RDDMP, and RLCMD). Of the 6 dimensions of PRBHA, 5 are positively and significantly associated with PRBHA: RLCMD (<italic>&#x03B2;</italic>=0.167; <italic>P=</italic>.02), SR (<italic>&#x03B2;</italic>=0.201; <italic>P=</italic>.03), IBER (<italic>&#x03B2;</italic>=0.205; <italic>P=</italic>.05), FGBBR (<italic>&#x03B2;</italic>=0.503; <italic>P=.00</italic>), ORR (<italic>&#x03B2;</italic>=0.171; <italic>P=.</italic>02), supporting H1a, H2, H3, H4a, and H8. Contrary to what we assumed, the positive association between RDDMP and PRBHA is not significant (<italic>&#x03B2;</italic>=0.121; <italic>P=</italic>.15). Therefore, hypothesis H7 is not supported. Hypothesis H6 predicted that PRBHA is negatively and significantly associated with IABHA. Contrary to our hypothesis, the negative association between PRBHA and IABHA is not significant (<italic>&#x03B2;</italic>=&#x2212;0.409; <italic>P=.</italic>07) and does not support H6.</p><p>The hypotheses H1b, H1c, and H4b represent the associations between 3 dimensions of perceived risks (IBER, FGBBR, and ORR). As hypothesized, IBER is positively and significantly associated with FGBBR (<italic>&#x03B2;</italic>=0.265; <italic>P=.</italic>01), supporting H1c. Then, IBER is positively and significantly associated with ORR (<italic>&#x03B2;</italic>=0.824; <italic>P=.00</italic>), supporting H1b. Finally, ORR is positively and significantly associated with FGBBR (<italic>&#x03B2;</italic>=0.211; <italic>P=.</italic>05), supporting H4b.</p><p>Finally, hypothesis H5 predicts that ECBS moderates the association between ORR and PRBHA. This hypothesis is also supported (<italic>&#x03B2;</italic>=&#x2013;0.085; <italic>P=.</italic>02), indicating that ECBS dampens the positive association between ORR and PRBHA. In other words, the positive association between ORR and PRBHA is weak when cloud-based blockchain solutions are present.</p></sec><sec id="s3-4"><title>Interpretation of the Impact of the Control Variable on the Model Estimation</title><p><xref ref-type="table" rid="table7">Tables 7</xref> and <xref ref-type="table" rid="table8">8</xref> present model estimation results without the control variable and with the control variable. Analysis of these results leads to 2 observations. The first observation concerns the association between the control variable (country) and the dependent variable (IABHA). <xref ref-type="table" rid="table8">Table 8</xref> shows that this association is not significant (<italic>P</italic>=.34 ). This suggests that whether a health care facility is based in Canada or Africa has no significant effect on that facility&#x2019;s intention to adopt a BBHA. The second observation concerns the effect of the control variable on the associations between the variables in the model. A comparison of the results in <xref ref-type="table" rid="table7">Tables 7</xref> and <xref ref-type="table" rid="table8">8</xref> shows that only one association is affected by the control variable. Unlike the model without the control variable, the association between PRBHA and IABHA becomes significant in the model with the control variable (<italic>P</italic>=.02 ). This means that the perception of the risks of BBHAs does not affect a health care facility&#x2019;s intention to adopt these apps in the same way, depending on whether the facility is in Canada or Africa.</p><table-wrap id="t7" position="float"><label>Table 7.</label><caption><p>Estimation of the model without a control variable.</p></caption><table id="table7" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom" rowspan="2">Associations between variables</td><td align="left" valign="bottom" colspan="4">Without control variable</td></tr><tr><td align="left" valign="bottom">Original sample (O)</td><td align="left" valign="bottom">Sample mean (SD)</td><td align="left" valign="bottom"><italic>t</italic> statistics (O/SD)</td><td align="left" valign="bottom"><italic>P</italic> values</td></tr></thead><tbody><tr><td align="left" valign="top">RDDMP<sup><xref ref-type="table-fn" rid="table7fn1">a</xref></sup> &#x2192; PRBHA<sup><xref ref-type="table-fn" rid="table7fn2">b</xref></sup></td><td align="char" char="." valign="top">0.121</td><td align="char" char="." valign="top">0.125 (0.119)</td><td align="char" char="." valign="top">1.021</td><td align="char" char="." valign="top">.15</td></tr><tr><td align="left" valign="top">ECBS<sup><xref ref-type="table-fn" rid="table7fn3">c</xref></sup> &#x2192; PRBHA</td><td align="char" char="." valign="top">&#x2212;0.014</td><td align="char" char="." valign="top">&#x2212;0.014 (0.021)</td><td align="char" char="." valign="top">0.679</td><td align="char" char="." valign="top">.25</td></tr><tr><td align="left" valign="top">PRBHA &#x2192; IABHA<sup><xref ref-type="table-fn" rid="table7fn4">d</xref></sup></td><td align="char" char="." valign="top">&#x2212;0.409</td><td align="char" char="." valign="top">&#x2212;0.339 (0.278)</td><td align="char" char="." valign="top">1.470</td><td align="char" char="." valign="top">.07</td></tr></tbody></table><table-wrap-foot><fn id="table7fn1"><p><sup>a</sup>RDDMP: risk of disclosing data and medical practices.</p></fn><fn id="table7fn2"><p><sup>b</sup>PRBHA: perceived risk of blockchain-based health care apps.</p></fn><fn id="table7fn3"><p><sup>c</sup>ECBS: existence of cloud-based blockchain solutions.</p></fn><fn id="table7fn4"><p><sup>d</sup>IABHA: adoption intention of blockchain-based health care apps.</p></fn></table-wrap-foot></table-wrap><table-wrap id="t8" position="float"><label>Table 8.</label><caption><p>Estimation of the model with control variable.</p></caption><table id="table8" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom" rowspan="2">Associations between variables</td><td align="left" valign="bottom" colspan="4">With control variable</td></tr><tr><td align="left" valign="bottom">Original sample (O)</td><td align="left" valign="bottom">Sample mean (SD)</td><td align="left" valign="bottom"><italic>t</italic> statistics (O/SD)</td><td align="left" valign="bottom"><italic>P</italic> values</td></tr></thead><tbody><tr><td align="left" valign="top">RDDMP<sup><xref ref-type="table-fn" rid="table8fn1">a</xref></sup> &#x2192; PRBHA<sup><xref ref-type="table-fn" rid="table8fn2">b</xref></sup></td><td align="char" char="." valign="top">0.121</td><td align="char" char="." valign="top">0.144 (0.109)</td><td align="char" char="." valign="top">1.116</td><td align="char" char="." valign="top">.13</td></tr><tr><td align="left" valign="top">ECBS<sup><xref ref-type="table-fn" rid="table8fn3">c</xref></sup> &#x2192; PRBHA</td><td align="char" char="." valign="top">&#x2212;0.014</td><td align="char" char="." valign="top">&#x2212;0.008 (0.020)</td><td align="char" char="." valign="top">0.703</td><td align="char" char="." valign="top">.24</td></tr><tr><td align="left" valign="top">PRBHA &#x2192; IABHA<sup><xref ref-type="table-fn" rid="table8fn4">d</xref></sup></td><td align="char" char="." valign="top">&#x2212;0.405</td><td align="char" char="." valign="top">&#x2212;0.436 (0.201)</td><td align="char" char="." valign="top">2.012</td><td align="char" char="." valign="top">.02</td></tr><tr><td align="left" valign="top">Country &#x2192; IABHA</td><td align="char" char="." valign="top">&#x2212;0.133</td><td align="char" char="." valign="top">&#x2212;0.147 (0.319)</td><td align="char" char="." valign="top">0.418</td><td align="char" char="." valign="top">.34</td></tr></tbody></table><table-wrap-foot><fn id="table8fn1"><p><sup>a</sup>RDDMP: risk of disclosing data and medical practices.</p></fn><fn id="table8fn2"><p><sup>b</sup>PRBHA: perceived risk of blockchain-based health care apps.</p></fn><fn id="table8fn3"><p><sup>c</sup>ECBS: existence of cloud-based blockchain solutions.</p></fn><fn id="table8fn4"><p><sup>d</sup>IABHA: adoption intention of blockchain-based health care apps.</p></fn></table-wrap-foot></table-wrap></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>Our study first revealed that the risks of security, failure to obtain blockchain benefits, organizational unpreparedness, disclosure of medical data and practices, and loss of control over medical data increase health care organizations&#x2019; risk perceptions regarding BBHAs, reducing their intention to adopt these apps. These findings align with research by Glover and Benbasat [<xref ref-type="bibr" rid="ref35">35</xref>], which emphasized that the SR of personal data and the failure to gain benefits of a product purchased on the web play an important role in buyers&#x2019; overall risk perception regarding electronic transactions. Moreover, our study revealed that the RDDMP does not play a significant role in the overall risk perception of BBHAs. This result aligns with research that views data disclosure via blockchain not as a risk but as an advantage [<xref ref-type="bibr" rid="ref98">98</xref>]. This is the case with the study by Dubovitskaya et al [<xref ref-type="bibr" rid="ref98">98</xref>], in which the authors mention that disclosing data via blockchain in biomedical research allows pharmaceutical companies to disclose information about the production process of drugs. This will enable patients and regulatory bodies to know the context in which certain medical products are produced before they are certified or approved.</p><p>The second key finding of this study concerns the reciprocal association between 3 perceived risks of BBHAs: IBER, ORR, and FGBBR. The positive association between IBER and ORR indicates that an underdeveloped blockchain ecosystem&#x2014;characterized by limited expertise in development, governance, and regulatory clarity&#x2014;heightens the risk of organizational unpreparedness for adopting BBHAs. Additionally, the association between IBER and FGBBR suggests that ecosystem immaturity reduces the likelihood of realizing expected benefits, such as secure medical data sharing. Similarly, ORR is positively associated with FGBBR, as inadequate infrastructure and insufficiently trained personnel compromise the effective use of these technologies. For example, poor cryptographic key management by untrained users can introduce security vulnerabilities in blockchain-based apps [<xref ref-type="bibr" rid="ref3">3</xref>], thereby preventing organizations from achieving the intended data protection and operational efficiencies of such apps.</p><p>The third key finding of our study concerns the association between IT professionals&#x2019; perceived risk and their intention to adopt BBHAs. Our results show that organizations perceiving higher risks are less likely to adopt BBHAs, consistent with prior research on IT adoption, including Le et al [<xref ref-type="bibr" rid="ref99">99</xref>] study on self-service technologies. Their study showed that individual users&#x2019; concerns about technological risks reduce their willingness to engage with such systems. However, our study reveals regional differences in the association between perceived risk and intention to adopt BBHAs. In Canada, where health care systems are advanced and heavily funded, organizations are more skeptical due to limited performance feedback on BBHAs, leading to reduced motivation to invest. In contrast, health care organizations in developing African countries, which often have fragmented and underresourced systems, view BBHAs as opportunities to improve service delivery. Thus, perceived risks have a weaker impact on their adoption intentions. This regional variation aligns with the cross-national study by Hoover et al [<xref ref-type="bibr" rid="ref100">100</xref>] on cultural influences in risk perception and consumer behavior. These authors analyzed the influence of perceived brand risk on purchase intention in Mexico and the United States. They found that the cultural difference between Mexico and the United States makes perceived brand risk a less important factor in purchasing behavior in Mexico than in the United States.</p><p>The fourth relevant result of our study comes from the assessment of the moderating effect of the existence of blockchain solutions offered as SaaS on the relationship between organizational unreadiness and overall risk perception regarding BBHAs. The results of our study reveal that the possibility of using BBHAs as SaaS would reduce IT professionals&#x2019; perceived risk of the additional human and material resources required for their use and maintenance in health care settings. This result is in line with several studies that have analyzed the factors of cloud computing adoption in organizations [<xref ref-type="bibr" rid="ref86">86</xref>,<xref ref-type="bibr" rid="ref101">101</xref>,<xref ref-type="bibr" rid="ref102">102</xref>]. In their study, Zhu et al [<xref ref-type="bibr" rid="ref86">86</xref>] mention that the reduction of overall IT costs influences the use of cloud services. These costs include preliminary investment, upgrading, energy saving, and maintenance of cloud services [<xref ref-type="bibr" rid="ref86">86</xref>,<xref ref-type="bibr" rid="ref101">101</xref>].</p></sec><sec id="s4-2"><title>Theoretical and Practical Contributions</title><p>Our study makes a theoretical contribution by adopting and interpreting the perceived risk theory derived from marketing in the context of blockchain adoption in the health care sector. Originally, this theory was used to explain consumers&#x2019; purchasing decisions in the context of perceived product or service risks [<xref ref-type="bibr" rid="ref103">103</xref>-<xref ref-type="bibr" rid="ref105">105</xref>]. In information systems, perceived risk theory is used to analyze how perceived risks can influence the IT adoption decisions [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref93">93</xref>]. However, this theory addresses risks that apply broadly to IT as a whole, making it unsuitable for analyzing risks within specific IT categories. The results of our study highlight 2 risks specific to blockchain-based apps that are likely to influence the overall perceived risk regarding these apps and, therefore, their adoption in health care structures: RDDMP and RLCMD. Integrating these 2 risks as new constructs into the perceived risk theory contributes to its extension, making it more suitable for risk analysis in blockchain-based apps. Future research analyzing barriers to blockchain adoption in the health care sector can incorporate the 2 new risks into its theoretical model. Moreover, conducting our study in Canada and Africa allowed us to understand how contextual differences between Canada and Africa affect how risks are perceived in BBHAs and the intention to adopt them in Canadian and African health care organizations. This contributed to the generalizability of our results.</p><p>As a practical contribution, our study highlights the risks IT professionals in health care organizations perceive regarding BBHAs that may prevent their adoption in health care organizations. Knowledge of these risks would benefit the development agencies of blockchain-based apps and health care organizations [<xref ref-type="bibr" rid="ref106">106</xref>,<xref ref-type="bibr" rid="ref107">107</xref>]. For development agencies of blockchain-based apps, our findings will guide their advocacy discourse on the adoption of blockchain-based apps among health care organizations. These agencies can exploit these findings to formulate recommendations to mitigate risks that IT professionals perceive or educate IT professionals of health care organizations on strategies to avoid certain perceived risks [<xref ref-type="bibr" rid="ref108">108</xref>]. In addition, development agencies of blockchain-based apps can take advantage of our findings to develop BBHAs that minimize some risks that IT professionals perceive regarding these apps. For health care organizations, knowing the risks of BBHAs brings 2 major implications. First, these organizations handle sensitive data that require better protection against security attacks [<xref ref-type="bibr" rid="ref8">8</xref>]. Through our results, these organizations understand that despite the hype about the security of blockchain-based apps, these apps are exposed to SRs. Therefore, they must implement appropriate security policies to strengthen the security of these apps [<xref ref-type="bibr" rid="ref107">107</xref>]. Second, our study&#x2019;s results inform health care organizations&#x2019; decisions regarding adopting BBHAs. We believe that a good decision to adopt these apps should consider their benefits and potential risks [<xref ref-type="bibr" rid="ref109">109</xref>]. Knowing these risks would allow health care organizations to implement strategies to mitigate them and improve the use of BBHAs.</p></sec><sec id="s4-3"><title>Limitations</title><p>This study has 2 main limitations. The first limitation concerns the small number of IT professionals working in health care structures that have already adopted BBHAs or those in the process of adopting them. In addition, our study had a low participation of IT professionals from health care structures in Canada. The low participation of IT professionals from structures that use BBHAs, structures that are in the process of adopting these apps, and structures in Canada prevents variance in the dependent variable of our study, namely the intention to adopt BBHAs. Second, our research analyzes blockchain adoption in the health care sector, which is experiencing a low adoption rate of BBHAs. All these limitations constitute obstacles to the generalization of the results of this research.</p></sec><sec id="s4-4"><title>Directions for Future Research</title><p>We propose several avenues for future research. First, the conceptual model was validated using data from IT professionals in health care organizations. This choice was justified by the low knowledge of blockchain among health care professionals and patients [<xref ref-type="bibr" rid="ref110">110</xref>,<xref ref-type="bibr" rid="ref111">111</xref>]. It is essential to note that the successful implementation of IT in a health care organization necessitates the involvement of multiple stakeholders, including IT professionals, health care professionals, patients, health care organization managers, and health care regulators [<xref ref-type="bibr" rid="ref112">112</xref>]. Perceptions of each stakeholder regarding the risks associated with BBHAs may influence health care organizations&#x2019; intentions to adopt these apps [<xref ref-type="bibr" rid="ref113">113</xref>]. Therefore, we recommend that other researchers conduct similar research involving many stakeholders to better assess the factors that influence the intention of health care organizations to adopt BBHAs.</p><p>Second, our research focused primarily on the factors that may hinder health care organizations&#x2019; intention to adopt blockchain-based apps. Our choice is explained by the low adoption of blockchain-based apps in health care organizations [<xref ref-type="bibr" rid="ref76">76</xref>]. Therefore, the data for our research were primarily collected from health care organizations that have not yet adopted a blockchain-based app and those that are in the process of doing so. Future research may analyze the adoption challenges of these apps by collecting data from health care organizations that have already adopted these apps. Thus, health care organizations interested in adopting blockchain-based apps will be better informed about the challenges of adoption before implementing them. This helps reduce the perceived risks associated with blockchain-based health apps in health care organizations, as they can develop strategies to overcome the adoption challenges of these apps [<xref ref-type="bibr" rid="ref114">114</xref>].</p></sec><sec id="s4-5"><title>Conclusion</title><p>Our study sought to analyze the impact of IT professionals&#x2019; perceived risk concerning the intention to adopt BBHAs in health care facilities. Drawing on perceived risk theory, we identified 6 dimensions of risk that may explain IT professionals&#x2019; overall risk perception of BBHAs in health care facilities. Data collected from IT professionals in health care facilities through an online survey allowed us to evaluate the hypotheses of our conceptual model. The analysis of these data, using SmartPLS 4 software, yielded important results. The analysis of the correlations between perceived risk and its dimensions revealed that the latter are all positively associated with perceived risk. However, the RDDMP does not contribute significantly to the overall perception of IT professionals&#x2019; risks regarding using BBHAs. Then, our results revealed that the significance of the negative association between the general perception of risks of BBHAs and the intention to adopt these apps varies depending on whether the health care organization is in Africa or Canada. This association is nonsignificant in African health care organizations, while it is significant in Canadian health care organizations. Finally, the results of our study revealed that the existence of blockchain solutions in the form of SaaS reduces the overall perception of risks of IT professionals regarding BBHA, given the lack of resources (human and technical) necessary for their use in healthcare structures.</p><p>Our study makes the following contributions. First, we highlight the types of risks likely to prevent the adoption of BBHAs in health care organizations despite their interest in adopting these apps.</p><p>Second, we show that RDDMP and RLCMD contribute to the overall risk perception of BBHAs. These risks are inherent to the characteristics of blockchain, and the fact that they are not considered in the perceived risk theory makes it unsuitable for risk analysis in blockchain-based apps. The perceived risk theory includes risks that are general to any IT and the integration of these new risks contributes to its extension by making it more suitable for the analysis of risks in blockchain-based apps. Finally, we show that the difference in context between Canada and Africa makes the overall perception of risk of BBHAs differently associated with the intention to adopt these apps between Canadian and African health care organizations. Our findings are beneficial to governments, health care organizations, and blockchain development agencies, which can implement strategies to mitigate some of the risks perceived by IT professionals related to BBHAs.</p></sec></sec></body><back><ack><p>No generative artificial intelligence (AI) tools were used at any stage in the preparation of this manuscript.</p></ack><notes><sec><title>Funding</title><p>The authors declared no financial support was received for this work.</p></sec><sec><title>Data Availability</title><p>The datasets generated or analyzed during this study are available from the corresponding author on reasonable request.</p></sec></notes><fn-group><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AVE</term><def><p>average variance extracted</p></def></def-item><def-item><term id="abb2">BBHA</term><def><p>blockchain-based health care apps</p></def></def-item><def-item><term id="abb3">CR</term><def><p>composite reliability</p></def></def-item><def-item><term id="abb4">ECBS</term><def><p>existence of cloud-based blockchain solutions</p></def></def-item><def-item><term id="abb5">FGBBR</term><def><p>failure to gain blockchain benefits risk</p></def></def-item><def-item><term id="abb6">IABHA</term><def><p>adoption intention of blockchain-based health care apps</p></def></def-item><def-item><term id="abb7">IBER</term><def><p>immature blockchain ecosystem risk</p></def></def-item><def-item><term id="abb8">ORR</term><def><p>organizational readiness risk</p></def></def-item><def-item><term id="abb9">PLS-SEM</term><def><p>partial least squares structural equation modeling</p></def></def-item><def-item><term id="abb10">PRBHA</term><def><p>perceived risk of blockchain-based health care apps</p></def></def-item><def-item><term id="abb11">PRT</term><def><p>perceived risk theory</p></def></def-item><def-item><term id="abb12">RDDMP</term><def><p>risk of disclosing data and medical practices</p></def></def-item><def-item><term id="abb13">RLCMD</term><def><p>risk of losing control of medical data</p></def></def-item><def-item><term id="abb14">SaaS</term><def><p>Software-as-a-Service</p></def></def-item><def-item><term id="abb15">SR</term><def><p>security risk</p></def></def-item><def-item><term id="abb16">STROBE</term><def><p>Strengthening the Reporting of Observational Studies in Epidemiology</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cho</surname><given-names>S</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>K (Kari</given-names> </name><name name-style="western"><surname>Cheong</surname><given-names>A</given-names> </name><name name-style="western"><surname>No</surname><given-names>WG</given-names> </name><name name-style="western"><surname>Vasarhelyi</surname><given-names>MA</given-names> </name></person-group><article-title>Chain of values: examining the economic impacts of blockchain on the value-added tax system</article-title><source>J Manag Inf Syst</source><year>2021</year><month>04</month><day>3</day><volume>38</volume><issue>2</issue><fpage>288</fpage><lpage>313</lpage><pub-id pub-id-type="doi">10.1080/07421222.2021.1912912</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sarker</surname><given-names>S</given-names> </name><name name-style="western"><surname>Henningsson</surname><given-names>S</given-names> </name><name name-style="western"><surname>Jensen</surname><given-names>T</given-names> </name><name name-style="western"><surname>Hedman</surname><given-names>J</given-names> </name></person-group><article-title>The use of blockchain as a resource for combating corruption in global shipping: an interpretive case study</article-title><source>J Manag Inf Syst</source><year>2021</year><month>04</month><day>3</day><volume>38</volume><issue>2</issue><fpage>338</fpage><lpage>373</lpage><pub-id pub-id-type="doi">10.1080/07421222.2021.1912919</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>McGhin</surname><given-names>T</given-names> </name><name name-style="western"><surname>Choo</surname><given-names>KKR</given-names> </name><name name-style="western"><surname>Liu</surname><given-names>CZC</given-names> </name><name name-style="western"><surname>He</surname><given-names>DB</given-names> </name></person-group><article-title>Blockchain in healthcare applications: research challenges and opportunities</article-title><source>J Netw Comput Appl</source><year>2019</year><month>06</month><volume>135</volume><fpage>62</fpage><lpage>75</lpage><pub-id pub-id-type="doi">10.1016/j.jnca.2019.02.027</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tandon</surname><given-names>A</given-names> </name><name name-style="western"><surname>Dhir</surname><given-names>A</given-names> </name><name name-style="western"><surname>Islam</surname><given-names>A</given-names> </name><name name-style="western"><surname>M&#x00E4;ntym&#x00E4;ki</surname><given-names>M</given-names> </name></person-group><article-title>Blockchain in healthcare: a systematic literature review, synthesizing framework and future research agenda</article-title><source>Comput Ind</source><year>2020</year><month>11</month><volume>122</volume><fpage>103290</fpage><pub-id pub-id-type="doi">10.1016/j.compind.2020.103290</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zaabar</surname><given-names>B</given-names> </name><name name-style="western"><surname>Cheikhrouhou</surname><given-names>O</given-names> </name><name name-style="western"><surname>Jamil</surname><given-names>F</given-names> </name><name name-style="western"><surname>Ammi</surname><given-names>M</given-names> </name><name name-style="western"><surname>Abid</surname><given-names>M</given-names> </name></person-group><article-title>HealthBlock: a secure blockchain-based healthcare data management system</article-title><source>Comput Netw</source><year>2021</year><month>12</month><volume>200</volume><fpage>108500</fpage><pub-id pub-id-type="doi">10.1016/j.comnet.2021.108500</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cadoret</surname><given-names>D</given-names> </name><name name-style="western"><surname>Kailas</surname><given-names>T</given-names> </name><name name-style="western"><surname>Velmovitsky</surname><given-names>P</given-names> </name><name name-style="western"><surname>Morita</surname><given-names>P</given-names> </name><name name-style="western"><surname>Igboeli</surname><given-names>O</given-names> </name></person-group><article-title>Proposed implementation of blockchain in British Columbia&#x2019;s health care data management</article-title><source>J Med Internet Res</source><year>2020</year><month>10</month><day>23</day><volume>22</volume><issue>10</issue><fpage>e20897</fpage><pub-id pub-id-type="doi">10.2196/20897</pub-id><pub-id pub-id-type="medline">33095183</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Palas</surname><given-names>M</given-names> </name><name name-style="western"><surname>Bunduchi</surname><given-names>R</given-names> </name></person-group><article-title>Exploring interpretations of blockchain&#x2019;s value in healthcare: a multi-stakeholder approach</article-title><source>Inf Technol People</source><year>2020</year><month>06</month><day>24</day><volume>34</volume><issue>2</issue><fpage>453</fpage><lpage>495</lpage><pub-id pub-id-type="doi">10.1108/ITP-01-2019-0008</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Esmaeilzadeh</surname><given-names>P</given-names> </name><name name-style="western"><surname>Mirzaei</surname><given-names>T</given-names> </name></person-group><article-title>The potential of blockchain technology for health information exchange: experimental study from patients&#x2019; perspectives</article-title><source>J Med Internet Res</source><year>2019</year><month>06</month><day>20</day><volume>21</volume><issue>6</issue><fpage>e14184</fpage><pub-id pub-id-type="doi">10.2196/14184</pub-id><pub-id pub-id-type="medline">31223119</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hylock</surname><given-names>RH</given-names> </name><name name-style="western"><surname>Zeng</surname><given-names>X</given-names> </name></person-group><article-title>A blockchain framework for patient-centered health records and exchange (HealthChain): evaluation and proof-of-concept study</article-title><source>J Med Internet Res</source><year>2019</year><month>08</month><day>31</day><volume>21</volume><issue>8</issue><fpage>e13592</fpage><pub-id pub-id-type="doi">10.2196/13592</pub-id><pub-id pub-id-type="medline">31471959</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="web"><article-title>How blockchain and AI improve healthcare supply chains</article-title><source>Medium</source><year>2022</year><access-date>2026-03-06</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://blog.medifakt.com/how-blockchain-and-ai-improve-healthcare-supply-chains-5d856d6e46d5">https://blog.medifakt.com/how-blockchain-and-ai-improve-healthcare-supply-chains-5d856d6e46d5</ext-link></comment></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Adams</surname><given-names>HS</given-names> </name></person-group><article-title>Top 10: blockchain platforms in healthcare</article-title><source>Healthcare Digital</source><year>2024</year><access-date>2026-03-06</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://healthcare-digital.com/technology-and-ai/top-10-blockchain-platforms-in-healthcare">https://healthcare-digital.com/technology-and-ai/top-10-blockchain-platforms-in-healthcare</ext-link></comment></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="web"><article-title>Embleema is a technology platform for registries and real-world studies</article-title><source>Embleema</source><year>2025</year><access-date>2026-03-06</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.embleema.com/aboutus">https://www.embleema.com/aboutus</ext-link></comment></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Dutta</surname><given-names>S</given-names> </name></person-group><article-title>Blockchain for healthcare: benefits, use cases &#x0026; real-world examples</article-title><source>Turing</source><year>2025</year><access-date>2026-03-06</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.turing.com/resources/blockchain-for-healthcare">https://www.turing.com/resources/blockchain-for-healthcare</ext-link></comment></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sanka</surname><given-names>AI</given-names> </name><name name-style="western"><surname>Irfan</surname><given-names>M</given-names> </name><name name-style="western"><surname>Huang</surname><given-names>I</given-names> </name><name name-style="western"><surname>Cheung</surname><given-names>RCC</given-names> </name></person-group><article-title>A survey of breakthrough in blockchain technology: adoptions, applications, challenges and future research</article-title><source>Comput Commun</source><year>2021</year><month>03</month><volume>169</volume><fpage>179</fpage><lpage>201</lpage><pub-id pub-id-type="doi">10.1016/j.comcom.2020.12.028</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pirtle</surname><given-names>C</given-names> </name><name name-style="western"><surname>Ehrenfeld</surname><given-names>J</given-names> </name></person-group><article-title>Blockchain for healthcare: the next generation of medical records?</article-title><source>J Med Syst</source><year>2018</year><month>08</month><day>10</day><volume>42</volume><issue>9</issue><fpage>172</fpage><pub-id pub-id-type="doi">10.1007/s10916-018-1025-3</pub-id><pub-id pub-id-type="medline">30097733</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chen</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Ding</surname><given-names>S</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Zheng</surname><given-names>HD</given-names> </name><name name-style="western"><surname>Yang</surname><given-names>SL</given-names> </name></person-group><article-title>Blockchain-based medical records secure storage and medical service framework</article-title><source>J Med Syst</source><year>2019</year><month>01</month><volume>43</volume><issue>1</issue><pub-id pub-id-type="doi">10.1007/s10916-018-1121-4</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Vardhini</surname><given-names>B</given-names> </name><name name-style="western"><surname>Dass</surname><given-names>SN</given-names> </name><name name-style="western"><surname>Sahana</surname><given-names>R</given-names> </name><name name-style="western"><surname>Chinnaiyan</surname><given-names>R</given-names> </name></person-group><article-title>A blockchain based electronic medical health records framework using smart contracts</article-title><conf-name>2021 International Conference on Computer Communication and Informatics (ICCCI)</conf-name><conf-date>Jan 27-29, 2021</conf-date><pub-id pub-id-type="doi">10.1109/ICCCI50826.2021.9402689</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jayaraman</surname><given-names>R</given-names> </name><name name-style="western"><surname>Salah</surname><given-names>K</given-names> </name><name name-style="western"><surname>King</surname><given-names>N</given-names> </name></person-group><article-title>Improving opportunities in healthcare supply chain processes via the internet of things and blockchain technology</article-title><source>Int J Healthc Inf Syst Inform</source><year>2019</year><volume>14</volume><issue>2</issue><fpage>49</fpage><lpage>65</lpage><pub-id pub-id-type="doi">10.4018/IJHISI.2019040104</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Liang</surname><given-names>TP</given-names> </name><name name-style="western"><surname>Kohli</surname><given-names>R</given-names> </name><name name-style="western"><surname>Huang</surname><given-names>HC</given-names> </name><name name-style="western"><surname>Li</surname><given-names>ZL</given-names> </name></person-group><article-title>What drives the adoption of the blockchain technology? A fit-viability perspective</article-title><source>J Manag Inf Syst</source><year>2021</year><month>04</month><day>3</day><volume>38</volume><issue>2</issue><fpage>314</fpage><lpage>337</lpage><pub-id pub-id-type="doi">10.1080/07421222.2021.1912915</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Clohessy</surname><given-names>T</given-names> </name><name name-style="western"><surname>Acton</surname><given-names>T</given-names> </name></person-group><article-title>Investigating the influence of organizational factors on blockchain adoption</article-title><source>Ind Manang Data Syst</source><year>2019</year><month>08</month><day>12</day><volume>119</volume><issue>7</issue><fpage>1457</fpage><lpage>1491</lpage><pub-id pub-id-type="doi">10.1108/IMDS-08-2018-0365</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Folkinshteyn</surname><given-names>D</given-names> </name><name name-style="western"><surname>Lennon</surname><given-names>M</given-names> </name></person-group><article-title>Braving Bitcoin: a technology acceptance model (TAM) analysis</article-title><source>J Inf Technol Case Appl Res</source><year>2016</year><month>10</month><volume>18</volume><issue>4</issue><fpage>220</fpage><lpage>249</lpage><pub-id pub-id-type="doi">10.1080/15228053.2016.1275242</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Janssen</surname><given-names>M</given-names> </name><name name-style="western"><surname>Weerakkody</surname><given-names>V</given-names> </name><name name-style="western"><surname>Ismagilova</surname><given-names>E</given-names> </name><name name-style="western"><surname>Sivarajah</surname><given-names>U</given-names> </name><name name-style="western"><surname>Irani</surname><given-names>Z</given-names> </name></person-group><article-title>A framework for analysing blockchain technology adoption: integrating institutional, market and technical factors</article-title><source>Int J Inf Manage</source><year>2020</year><month>02</month><volume>50</volume><fpage>302</fpage><lpage>309</lpage><pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2019.08.012</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rashideh</surname><given-names>W</given-names> </name></person-group><article-title>Blockchain technology framework: current and future perspectives for the tourism industry</article-title><source>Tour Manag</source><year>2020</year><month>10</month><volume>80</volume><fpage>104125</fpage><pub-id pub-id-type="doi">10.1016/j.tourman.2020.104125</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yoo</surname><given-names>K</given-names> </name><name name-style="western"><surname>Bae</surname><given-names>K</given-names> </name><name name-style="western"><surname>Park</surname><given-names>E</given-names> </name><name name-style="western"><surname>Yang</surname><given-names>T</given-names> </name></person-group><article-title>Understanding the diffusion and adoption of Bitcoin transaction services: the integrated approach</article-title><source>Telemat Inform</source><year>2020</year><month>10</month><volume>53</volume><fpage>101302</fpage><pub-id pub-id-type="doi">10.1016/j.tele.2019.101302</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Maythu</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Kwok</surname><given-names>AOJ</given-names> </name><name name-style="western"><surname>Teh</surname><given-names>PL</given-names> </name></person-group><article-title>Blockchain technology diffusion in tourism: evidence from early enterprise adopters and innovators</article-title><source>Heliyon</source><year>2024</year><month>01</month><day>30</day><volume>10</volume><issue>2</issue><fpage>e24675</fpage><pub-id pub-id-type="doi">10.1016/j.heliyon.2024.e24675</pub-id><pub-id pub-id-type="medline">38304774</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Agbo</surname><given-names>CC</given-names> </name><name name-style="western"><surname>Mahmoud</surname><given-names>QH</given-names> </name><name name-style="western"><surname>Eklund</surname><given-names>JM</given-names> </name></person-group><article-title>Blockchain technology in healthcare: a systematic review</article-title><source>Healthcare (Basel)</source><year>2019</year><month>04</month><day>4</day><volume>7</volume><issue>2</issue><fpage>56</fpage><pub-id pub-id-type="doi">10.3390/healthcare7020056</pub-id><pub-id pub-id-type="medline">30987333</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Bauer</surname><given-names>RA</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Robert</surname><given-names>SH</given-names> </name></person-group><article-title>Consumer behaviour as risk taking</article-title><source>Dynamic Marketing for a Changing World: Proceedings of the 43rd National Conference of the American Marketing Association</source><year>1960</year><publisher-name>American Marketing Association</publisher-name><fpage>389</fpage><lpage>398</lpage><pub-id pub-id-type="other">9781613112991</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Schlegel</surname><given-names>D</given-names> </name><name name-style="western"><surname>Uenal</surname><given-names>Y</given-names> </name></person-group><article-title>A perceived risk perspective on narrow artificial intelligence</article-title><access-date>2026-03-29</access-date><conf-name>25th Pacific Asia Conference on Information Systems (PACIS)</conf-name><conf-date>Jun 20-24, 2021</conf-date><comment><ext-link ext-link-type="uri" xlink:href="https://aisel.aisnet.org/pacis2021/44">https://aisel.aisnet.org/pacis2021/44</ext-link></comment></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Martins</surname><given-names>C</given-names> </name><name name-style="western"><surname>Oliveira</surname><given-names>T</given-names> </name><name name-style="western"><surname>Popovi&#x010D;</surname><given-names>A</given-names> </name></person-group><article-title>Understanding the Internet banking adoption: a unified theory of acceptance and use of technology and perceived risk application</article-title><source>Int J Inf Manage</source><year>2014</year><month>02</month><volume>34</volume><issue>1</issue><fpage>1</fpage><lpage>13</lpage><pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2013.06.002</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gefen</surname><given-names>D</given-names> </name><name name-style="western"><surname>Karahanna</surname><given-names>E</given-names> </name></person-group><article-title>Trust and TAM in online shopping: an integrated model</article-title><source>MIS Q</source><year>2003</year><volume>27</volume><issue>1</issue><fpage>51</fpage><lpage>90</lpage><pub-id pub-id-type="doi">10.2307/30036519</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Khedmatgozar</surname><given-names>HR</given-names> </name></person-group><article-title>The impact of perceived risks on internet banking adoption in Iran: a longitudinal survey</article-title><source>Electron Commer Res</source><year>2021</year><month>03</month><volume>21</volume><issue>1</issue><fpage>147</fpage><lpage>167</lpage><pub-id pub-id-type="doi">10.1007/s10660-021-09475-y</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Verhagen</surname><given-names>T</given-names> </name><name name-style="western"><surname>Meents</surname><given-names>S</given-names> </name><name name-style="western"><surname>Tan</surname><given-names>YH</given-names> </name></person-group><article-title>Perceived risk and trust associated with purchasing at electronic marketplaces</article-title><source>Eur J Inf Syst</source><year>2006</year><month>12</month><volume>15</volume><issue>6</issue><fpage>542</fpage><lpage>555</lpage><pub-id pub-id-type="doi">10.1057/palgrave.ejis.3000644</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Littler</surname><given-names>D</given-names> </name><name name-style="western"><surname>Melanthiou</surname><given-names>D</given-names> </name></person-group><article-title>Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: the case of Internet Banking</article-title><source>J Retailing Consum Serv</source><year>2006</year><month>11</month><volume>13</volume><issue>6</issue><fpage>431</fpage><lpage>443</lpage><pub-id pub-id-type="doi">10.1016/j.jretconser.2006.02.006</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Featherman</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Pavlou</surname><given-names>PA</given-names> </name></person-group><article-title>Predicting e-services adoption: a perceived risk facets perspective</article-title><source>Int J Hum Comput Stud</source><year>2003</year><month>10</month><volume>59</volume><issue>4</issue><fpage>451</fpage><lpage>474</lpage><pub-id pub-id-type="doi">10.1016/S1071-5819(03)00111-3</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Glover</surname><given-names>S</given-names> </name><name name-style="western"><surname>Benbasat</surname><given-names>I</given-names> </name></person-group><article-title>A comprehensive model of perceived risk of e-commerce transactions</article-title><source>Int J Electron Commer</source><year>2010</year><month>12</month><volume>15</volume><issue>2</issue><fpage>47</fpage><lpage>78</lpage><pub-id pub-id-type="doi">10.2753/JEC1086-4415150202</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pavlou</surname><given-names>PA</given-names> </name><name name-style="western"><surname>Gefen</surname><given-names>D</given-names> </name></person-group><article-title>Building effective online marketplaces with institution-based trust</article-title><source>Inf Syst Res</source><year>2004</year><month>03</month><volume>15</volume><issue>1</issue><fpage>37</fpage><lpage>59</lpage><pub-id pub-id-type="doi">10.1287/isre.1040.0015</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pavlou</surname><given-names>PA</given-names> </name></person-group><article-title>Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model</article-title><source>Int J Electron Commer</source><year>2003</year><month>04</month><volume>7</volume><issue>3</issue><fpage>101</fpage><lpage>134</lpage><pub-id pub-id-type="doi">10.1080/10864415.2003.11044275</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Spiekermann</surname><given-names>S</given-names> </name><name name-style="western"><surname>Paraschiv</surname><given-names>C</given-names> </name></person-group><article-title>Motivating human&#x2013;agent interaction: transferring insights from behavioral marketing to interface design</article-title><source>Electron Commer Res</source><year>2002</year><month>07</month><volume>2</volume><issue>3</issue><fpage>255</fpage><lpage>285</lpage><pub-id pub-id-type="doi">10.1023/A:1016062632182</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chiu</surname><given-names>C</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>ETG</given-names> </name><name name-style="western"><surname>Fang</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Huang</surname><given-names>H</given-names> </name></person-group><article-title>Understanding customers&#x2019; repeat purchase intentions in B2C e&#x2010;commerce: the roles of utilitarian value, hedonic value and perceived risk</article-title><source>Inf Syst J</source><year>2014</year><month>01</month><volume>24</volume><issue>1</issue><fpage>85</fpage><lpage>114</lpage><pub-id pub-id-type="doi">10.1111/j.1365-2575.2012.00407.x</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cocosila</surname><given-names>M</given-names> </name><name name-style="western"><surname>Archer</surname><given-names>N</given-names> </name><name name-style="western"><surname>Yuan</surname><given-names>Y</given-names> </name></person-group><article-title>Early investigation of new information technology acceptance: a perceived risk - motivation model</article-title><source>Commun Assoc Inf Syst</source><year>2009</year><volume>25</volume><pub-id pub-id-type="doi">10.17705/1CAIS.02530</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Erol</surname><given-names>I</given-names> </name><name name-style="western"><surname>Ar</surname><given-names>IM</given-names> </name><name name-style="western"><surname>Ozdemir</surname><given-names>AI</given-names> </name><etal/></person-group><article-title>Assessing the feasibility of blockchain technology in industries: evidence from Turkey</article-title><source>J Enterp Inf Manag</source><year>2021</year><month>04</month><day>12</day><volume>34</volume><issue>3</issue><fpage>746</fpage><lpage>769</lpage><pub-id pub-id-type="doi">10.1108/JEIM-09-2019-0309</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Akella</surname><given-names>GK</given-names> </name><name name-style="western"><surname>Wibowo</surname><given-names>S</given-names> </name><name name-style="western"><surname>Grandhi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mubarak</surname><given-names>S</given-names> </name></person-group><article-title>A systematic review of blockchain technology adoption barriers and enablers for smart and sustainable agriculture</article-title><source>Big Data Cogn Comput</source><year>2023</year><volume>7</volume><issue>2</issue><fpage>86</fpage><pub-id pub-id-type="doi">10.3390/bdcc7020086</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Kaushal</surname><given-names>RK</given-names> </name><name name-style="western"><surname>Kumar</surname><given-names>N</given-names> </name><name name-style="western"><surname>Panda</surname><given-names>SN</given-names> </name><name name-style="western"><surname>Kukreja</surname><given-names>V</given-names> </name></person-group><article-title>Immutable smart contracts on blockchain technology: its benefits and barriers</article-title><conf-name>2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)</conf-name><conf-date>Sep 3-4, 2021</conf-date><pub-id pub-id-type="doi">10.1109/ICRITO51393.2021.9596538</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>White</surname><given-names>GRT</given-names> </name></person-group><article-title>Future applications of blockchain in business and management: a Delphi study</article-title><source>Strat Change</source><year>2017</year><month>09</month><volume>26</volume><issue>5</issue><fpage>439</fpage><lpage>451</lpage><pub-id pub-id-type="doi">10.1002/jsc.2144</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Komulainen</surname><given-names>R</given-names> </name><name name-style="western"><surname>N&#x00E4;tti</surname><given-names>S</given-names> </name></person-group><article-title>Barriers to blockchain adoption: empirical observations from securities services value network</article-title><source>J Bus Res</source><year>2023</year><month>04</month><volume>159</volume><fpage>113714</fpage><pub-id pub-id-type="doi">10.1016/j.jbusres.2023.113714</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Raut</surname><given-names>RD</given-names> </name><name name-style="western"><surname>Priyadarshinee</surname><given-names>P</given-names> </name><name name-style="western"><surname>Gardas</surname><given-names>BB</given-names> </name><name name-style="western"><surname>Jha</surname><given-names>MK</given-names> </name></person-group><article-title>Analyzing the factors influencing cloud computing adoption using three stage hybrid SEM-ANN-ISM (SEANIS) approach</article-title><source>Technol Forecast Soc Change</source><year>2018</year><month>09</month><volume>134</volume><fpage>98</fpage><lpage>123</lpage><pub-id pub-id-type="doi">10.1016/j.techfore.2018.05.020</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Griggs</surname><given-names>KN</given-names> </name><name name-style="western"><surname>Ossipova</surname><given-names>O</given-names> </name><name name-style="western"><surname>Kohlios</surname><given-names>CP</given-names> </name><name name-style="western"><surname>Baccarini</surname><given-names>AN</given-names> </name><name name-style="western"><surname>Howson</surname><given-names>EA</given-names> </name><name name-style="western"><surname>Hayajneh</surname><given-names>T</given-names> </name></person-group><article-title>Healthcare blockchain system using smart contracts for secure automated remote patient monitoring</article-title><source>J Med Syst</source><year>2018</year><month>06</month><day>6</day><volume>42</volume><issue>7</issue><fpage>130</fpage><pub-id pub-id-type="doi">10.1007/s10916-018-0982-x</pub-id><pub-id pub-id-type="medline">29876661</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Khezr</surname><given-names>S</given-names> </name><name name-style="western"><surname>Moniruzzaman</surname><given-names>M</given-names> </name><name name-style="western"><surname>Yassine</surname><given-names>A</given-names> </name><name name-style="western"><surname>Benlamri</surname><given-names>R</given-names> </name></person-group><article-title>Blockchain technology in healthcare: a comprehensive review and directions for future research</article-title><source>Appl Sci (Basel)</source><year>2019</year><volume>9</volume><issue>9</issue><fpage>1736</fpage><pub-id pub-id-type="doi">10.3390/app9091736</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zamani</surname><given-names>E</given-names> </name><name name-style="western"><surname>He</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Phillips</surname><given-names>M</given-names> </name></person-group><article-title>On the security risks of the blockchain</article-title><source>J Comput Inform Syst</source><year>2020</year><month>11</month><day>1</day><volume>60</volume><issue>6</issue><fpage>495</fpage><lpage>506</lpage><pub-id pub-id-type="doi">10.1080/08874417.2018.1538709</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Radanovi&#x0107;</surname><given-names>I</given-names> </name><name name-style="western"><surname>Liki&#x0107;</surname><given-names>R</given-names> </name></person-group><article-title>Opportunities for use of blockchain technology in medicine</article-title><source>Appl Health Econ Health Policy</source><year>2018</year><month>10</month><volume>16</volume><issue>5</issue><fpage>583</fpage><lpage>590</lpage><pub-id pub-id-type="doi">10.1007/s40258-018-0412-8</pub-id><pub-id pub-id-type="medline">30022440</pub-id></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hussien</surname><given-names>HM</given-names> </name><name name-style="western"><surname>Yasin</surname><given-names>SM</given-names> </name><name name-style="western"><surname>Udzir</surname><given-names>SNI</given-names> </name><name name-style="western"><surname>Zaidan</surname><given-names>AA</given-names> </name><name name-style="western"><surname>Zaidan</surname><given-names>BB</given-names> </name></person-group><article-title>A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future direction</article-title><source>J Med Syst</source><year>2019</year><month>09</month><day>14</day><volume>43</volume><issue>10</issue><fpage>1</fpage><lpage>35</lpage><pub-id pub-id-type="doi">10.1007/s10916-019-1445-8</pub-id><pub-id pub-id-type="medline">31522262</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gaur</surname><given-names>N</given-names> </name></person-group><article-title>Blockchain challenges in adoption</article-title><source>Manag Financ</source><year>2019</year><month>08</month><day>12</day><volume>46</volume><issue>6</issue><fpage>849</fpage><lpage>858</lpage><pub-id pub-id-type="doi">10.1108/MF-07-2019-0328</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ragowsky</surname><given-names>A</given-names> </name><name name-style="western"><surname>Licker</surname><given-names>PS</given-names> </name><name name-style="western"><surname>Gefen</surname><given-names>D</given-names> </name></person-group><article-title>Organizational IT Maturity (OITM): a measure of organizational readiness and effectiveness to obtain value from its information technology</article-title><source>Inform Syst Manage</source><year>2012</year><month>03</month><volume>29</volume><issue>2</issue><fpage>148</fpage><lpage>160</lpage><pub-id pub-id-type="doi">10.1080/10580530.2012.662104</pub-id></nlm-citation></ref><ref id="ref54"><label>54</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mouzakitis</surname><given-names>S</given-names> </name><name name-style="western"><surname>Askounis</surname><given-names>D</given-names> </name></person-group><article-title>A knowledge-based framework for measuring organizational readiness for the adoption of B2B integration systems</article-title><source>Inf Syst Manag</source><year>2010</year><month>01</month><volume>27</volume><issue>3</issue><fpage>253</fpage><lpage>266</lpage><pub-id pub-id-type="doi">10.1080/10580530.2010.493842</pub-id></nlm-citation></ref><ref id="ref55"><label>55</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hosseini</surname><given-names>L</given-names> </name><name name-style="western"><surname>Tang</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mookerjee</surname><given-names>V</given-names> </name><name name-style="western"><surname>Sriskandarajah</surname><given-names>C</given-names> </name></person-group><article-title>A Switch in Time Saves the Dime: a model to reduce rental cost in cloud computing</article-title><source>Inf Systems Res</source><year>2020</year><month>09</month><volume>31</volume><issue>3</issue><fpage>753</fpage><lpage>775</lpage><pub-id pub-id-type="doi">10.1287/isre.2019.0912</pub-id></nlm-citation></ref><ref id="ref56"><label>56</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tripathi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mishra</surname><given-names>V</given-names> </name></person-group><article-title>Determinants of cloud computing adoption: a comparative study</article-title><source>Pac Asia J Assoc Inf Syst</source><year>2019</year><volume>11</volume><issue>3</issue><fpage>28</fpage><lpage>54</lpage><pub-id pub-id-type="doi">10.17705/1pais.11303</pub-id><pub-id pub-id-type="medline">2500368009</pub-id></nlm-citation></ref><ref id="ref57"><label>57</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Rogers</surname><given-names>EM</given-names> </name></person-group><source>Diffusion of Innovations</source><year>2003</year><edition>5</edition><publisher-name>The Free Press</publisher-name><pub-id pub-id-type="other">0-7432-5823-1</pub-id></nlm-citation></ref><ref id="ref58"><label>58</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hanafizadeh</surname><given-names>P</given-names> </name><name name-style="western"><surname>Khedmatgozar</surname><given-names>HR</given-names> </name></person-group><article-title>The mediating role of the dimensions of the perceived risk in the effect of customers&#x2019; awareness on the adoption of Internet banking in Iran</article-title><source>Electron Commer Res</source><year>2012</year><month>05</month><volume>12</volume><issue>2</issue><fpage>151</fpage><lpage>175</lpage><pub-id pub-id-type="doi">10.1007/s10660-012-9090-z</pub-id></nlm-citation></ref><ref id="ref59"><label>59</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lee</surname><given-names>MC</given-names> </name></person-group><article-title>Factors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit</article-title><source>Electron Commer Res Appl</source><year>2009</year><month>05</month><volume>8</volume><issue>3</issue><fpage>130</fpage><lpage>141</lpage><pub-id pub-id-type="doi">10.1016/j.elerap.2008.11.006</pub-id></nlm-citation></ref><ref id="ref60"><label>60</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Govindan</surname><given-names>K</given-names> </name><name name-style="western"><surname>Nasr</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Saeed Heidary</surname><given-names>M</given-names> </name><name name-style="western"><surname>Nosrati-Abarghooee</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mina</surname><given-names>H</given-names> </name></person-group><article-title>Prioritizing adoption barriers of platforms based on blockchain technology from balanced scorecard perspectives in healthcare industry: a structural approach</article-title><source>Int J Prod Res</source><year>2023</year><month>06</month><day>3</day><volume>61</volume><issue>11</issue><fpage>3512</fpage><lpage>3526</lpage><pub-id pub-id-type="doi">10.1080/00207543.2021.2013560</pub-id></nlm-citation></ref><ref id="ref61"><label>61</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mittal</surname><given-names>S</given-names> </name><name name-style="western"><surname>Ghosh</surname><given-names>M</given-names> </name></person-group><article-title>A novel two-level secure access control approach for blockchain platform in healthcare</article-title><source>Int J Inf Secur</source><year>2023</year><month>08</month><volume>22</volume><issue>4</issue><fpage>799</fpage><lpage>817</lpage><pub-id pub-id-type="doi">10.1007/s10207-023-00664-4</pub-id></nlm-citation></ref><ref id="ref62"><label>62</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Porsdam Mann</surname><given-names>S</given-names> </name><name name-style="western"><surname>Savulescu</surname><given-names>J</given-names> </name><name name-style="western"><surname>Ravaud</surname><given-names>P</given-names> </name><name name-style="western"><surname>Benchoufi</surname><given-names>M</given-names> </name></person-group><article-title>Blockchain, consent and prosent for medical research</article-title><source>J Med Ethics</source><year>2021</year><month>04</month><day>13</day><volume>47</volume><issue>4</issue><fpage>244</fpage><lpage>250</lpage><pub-id pub-id-type="doi">10.1136/medethics-2019-105963</pub-id><pub-id pub-id-type="medline">32366703</pub-id></nlm-citation></ref><ref id="ref63"><label>63</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wang</surname><given-names>X</given-names> </name><name name-style="western"><surname>Cheng</surname><given-names>Z</given-names> </name></person-group><article-title>Cross-sectional studies: strengths, weaknesses, and recommendations</article-title><source>Chest</source><year>2020</year><month>07</month><volume>158</volume><issue>1S</issue><fpage>S65</fpage><lpage>S71</lpage><pub-id pub-id-type="doi">10.1016/j.chest.2020.03.012</pub-id><pub-id pub-id-type="medline">32658654</pub-id></nlm-citation></ref><ref id="ref64"><label>64</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>von Elm</surname><given-names>E</given-names> </name><name name-style="western"><surname>Altman</surname><given-names>DG</given-names> </name><name name-style="western"><surname>Egger</surname><given-names>M</given-names> </name><etal/></person-group><article-title>The Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) statement: guidelines for reporting observational studies</article-title><source>Epidemiology (Sunnyvale)</source><year>2007</year><month>11</month><volume>18</volume><issue>6</issue><fpage>800</fpage><lpage>804</lpage><pub-id pub-id-type="doi">10.1097/EDE.0b013e3181577654</pub-id><pub-id pub-id-type="medline">18049194</pub-id></nlm-citation></ref><ref id="ref65"><label>65</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mitchell</surname><given-names>VW</given-names> </name></person-group><article-title>Consumer perceived risk: conceptualisations and models</article-title><source>Eur J Mark</source><year>1999</year><month>02</month><day>1</day><volume>33</volume><issue>1/2</issue><fpage>163</fpage><lpage>195</lpage><pub-id pub-id-type="doi">10.1108/03090569910249229</pub-id></nlm-citation></ref><ref id="ref66"><label>66</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Davis</surname><given-names>FD</given-names> </name><name name-style="western"><surname>Bagozzi</surname><given-names>RP</given-names> </name><name name-style="western"><surname>Warshaw</surname><given-names>PR</given-names> </name></person-group><article-title>User acceptance of computer technology: a comparison of two theoretical models</article-title><source>Manage Sci</source><year>1989</year><month>08</month><volume>35</volume><issue>8</issue><fpage>982</fpage><lpage>1003</lpage><pub-id pub-id-type="doi">10.1287/mnsc.35.8.982</pub-id></nlm-citation></ref><ref id="ref67"><label>67</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Venkatesh</surname><given-names>V</given-names> </name><name name-style="western"><surname>Thong</surname><given-names>JYL</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>X</given-names> </name></person-group><article-title>Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology</article-title><source>MIS Q</source><year>2012</year><month>03</month><day>1</day><volume>36</volume><issue>1</issue><fpage>157</fpage><lpage>178</lpage><pub-id pub-id-type="doi">10.2307/41410412</pub-id></nlm-citation></ref><ref id="ref68"><label>68</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Teo</surname><given-names>HH</given-names> </name><name name-style="western"><surname>Wei</surname><given-names>KK</given-names> </name><name name-style="western"><surname>Benbasat</surname><given-names>I</given-names> </name></person-group><article-title>Predicting intention to adopt interorganizational linkages: an institutional perspective</article-title><source>MIS Q</source><year>2003</year><month>03</month><day>1</day><volume>27</volume><issue>1</issue><fpage>19</fpage><lpage>49</lpage><pub-id pub-id-type="doi">10.2307/30036518</pub-id></nlm-citation></ref><ref id="ref69"><label>69</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Garg</surname><given-names>P</given-names> </name><name name-style="western"><surname>Gupta</surname><given-names>B</given-names> </name><name name-style="western"><surname>Chauhan</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Sivarajah</surname><given-names>U</given-names> </name><name name-style="western"><surname>Gupta</surname><given-names>S</given-names> </name><name name-style="western"><surname>Modgil</surname><given-names>S</given-names> </name></person-group><article-title>Measuring the perceived benefits of implementing blockchain technology in the banking sector</article-title><source>Technol Forecast Soc Change</source><year>2021</year><month>02</month><volume>163</volume><fpage>120407</fpage><pub-id pub-id-type="doi">10.1016/j.techfore.2020.120407</pub-id></nlm-citation></ref><ref id="ref70"><label>70</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kouhizadeh</surname><given-names>M</given-names> </name><name name-style="western"><surname>Saberi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Sarkis</surname><given-names>J</given-names> </name></person-group><article-title>Blockchain technology and the sustainable supply chain: theoretically exploring adoption barriers</article-title><source>Int J Prod Econ</source><year>2021</year><month>01</month><volume>231</volume><issue>2021</issue><fpage>107831</fpage><pub-id pub-id-type="doi">10.1016/j.ijpe.2020.107831</pub-id></nlm-citation></ref><ref id="ref71"><label>71</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Shah</surname><given-names>MH</given-names> </name><name name-style="western"><surname>Peikari</surname><given-names>HR</given-names> </name><name name-style="western"><surname>Yasin</surname><given-names>NM</given-names> </name></person-group><article-title>The determinants of individuals&#x2019; perceived e-security: evidence from Malaysia</article-title><source>Int J Inf Manage</source><year>2014</year><month>02</month><volume>34</volume><issue>1</issue><fpage>48</fpage><lpage>57</lpage><pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2013.10.001</pub-id></nlm-citation></ref><ref id="ref72"><label>72</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>B&#x00E9;langer</surname><given-names>F</given-names> </name><name name-style="western"><surname>Carter</surname><given-names>L</given-names> </name></person-group><article-title>Trust and risk in e-government adoption</article-title><source>J Strateg Inf Syst</source><year>2008</year><month>06</month><volume>17</volume><issue>2</issue><fpage>165</fpage><lpage>176</lpage><pub-id pub-id-type="doi">10.1016/j.jsis.2007.12.002</pub-id></nlm-citation></ref><ref id="ref73"><label>73</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hartono</surname><given-names>E</given-names> </name><name name-style="western"><surname>Holsapple</surname><given-names>CW</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>KY</given-names> </name><name name-style="western"><surname>Na</surname><given-names>KS</given-names> </name><name name-style="western"><surname>Simpson</surname><given-names>JT</given-names> </name></person-group><article-title>Measuring perceived security in B2C electronic commerce website usage: a respecification and validation</article-title><source>Decis Support Syst</source><year>2014</year><month>06</month><volume>62</volume><issue>2014</issue><fpage>11</fpage><lpage>21</lpage><pub-id pub-id-type="doi">10.1016/j.dss.2014.02.006</pub-id></nlm-citation></ref><ref id="ref74"><label>74</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Iacovou</surname><given-names>CL</given-names> </name><name name-style="western"><surname>Benbasat</surname><given-names>I</given-names> </name><name name-style="western"><surname>Dexter</surname><given-names>AS</given-names> </name></person-group><article-title>Electronic data interchange and small organizations: adoption and impact of technology</article-title><source>MIS Q</source><year>1995</year><month>12</month><day>1</day><volume>19</volume><issue>4</issue><fpage>465</fpage><lpage>485</lpage><pub-id pub-id-type="doi">10.2307/249629</pub-id></nlm-citation></ref><ref id="ref75"><label>75</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Santos</surname><given-names>FM</given-names> </name><name name-style="western"><surname>Eisenhardt</surname><given-names>KM</given-names> </name></person-group><article-title>Organizational boundaries and theories of organization</article-title><source>Organ Sci</source><year>2005</year><month>10</month><volume>16</volume><issue>5</issue><fpage>491</fpage><lpage>508</lpage><pub-id pub-id-type="doi">10.1287/orsc.1050.0152</pub-id></nlm-citation></ref><ref id="ref76"><label>76</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Alzahrani</surname><given-names>S</given-names> </name><name name-style="western"><surname>Daim</surname><given-names>T</given-names> </name><name name-style="western"><surname>Choo</surname><given-names>KKR</given-names> </name></person-group><article-title>Assessment of the blockchain technology adoption for the management of the electronic health record systems</article-title><source>IEEE Trans Eng Manage</source><year>2023</year><volume>70</volume><issue>8</issue><fpage>2846</fpage><lpage>2863</lpage><pub-id pub-id-type="doi">10.1109/TEM.2022.3158185</pub-id></nlm-citation></ref><ref id="ref77"><label>77</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kyriakidou</surname><given-names>V</given-names> </name><name name-style="western"><surname>Michalakelis</surname><given-names>C</given-names> </name><name name-style="western"><surname>Sphicopoulos</surname><given-names>T</given-names> </name></person-group><article-title>Assessment of information and communications technology maturity level</article-title><source>Telecommun Policy</source><year>2013</year><month>02</month><volume>37</volume><issue>1</issue><fpage>48</fpage><lpage>62</lpage><pub-id pub-id-type="doi">10.1016/j.telpol.2012.08.001</pub-id></nlm-citation></ref><ref id="ref78"><label>78</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Beck</surname><given-names>JT</given-names> </name><name name-style="western"><surname>Rahinel</surname><given-names>R</given-names> </name><name name-style="western"><surname>Bleier</surname><given-names>A</given-names> </name></person-group><article-title>Company worth keeping: personal control and preferences for brand leaders</article-title><source>J Consum Res</source><year>2020</year><month>02</month><day>1</day><volume>46</volume><issue>5</issue><fpage>871</fpage><lpage>886</lpage><pub-id pub-id-type="doi">10.1093/jcr/ucz040</pub-id></nlm-citation></ref><ref id="ref79"><label>79</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nogueira</surname><given-names>M</given-names> </name><name name-style="western"><surname>Dias</surname><given-names>F</given-names> </name><name name-style="western"><surname>Santos</surname><given-names>V</given-names> </name></person-group><article-title>Sustainable mobility choices: exploring the impact of consumers&#x2019; values, attitudes, perceived behavioural control and subjective norms on the likelihood to choose sustainable mobility options</article-title><source>J Consum Behav</source><year>2023</year><month>03</month><access-date>2026-03-24</access-date><volume>22</volume><issue>2</issue><fpage>511</fpage><lpage>528</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/doi/10.1002/cb.2144">https://onlinelibrary.wiley.com/doi/10.1002/cb.2144</ext-link></comment><pub-id pub-id-type="doi">10.1002/cb.2144</pub-id></nlm-citation></ref><ref id="ref80"><label>80</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Braga de Oliveira Friaes</surname><given-names>LC</given-names> </name><name name-style="western"><surname>Poleto</surname><given-names>T</given-names> </name><name name-style="western"><surname>Negreiros Clemente</surname><given-names>TR</given-names> </name><name name-style="western"><surname>Ramos</surname><given-names>CC</given-names> </name><name name-style="western"><surname>de Carvalho</surname><given-names>VDH</given-names> </name><name name-style="western"><surname>Nepomuceno</surname><given-names>TCC</given-names> </name></person-group><article-title>Relational governance in the ITO: the role of self-determination theory and the mediating effect of control perceived</article-title><source>Acad Rev Latinaom Ad</source><year>2023</year><month>06</month><day>29</day><volume>36</volume><issue>2</issue><fpage>177</fpage><lpage>198</lpage><pub-id pub-id-type="doi">10.1108/ARLA-10-2022-0182</pub-id></nlm-citation></ref><ref id="ref81"><label>81</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Malhotra</surname><given-names>NK</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>SS</given-names> </name><name name-style="western"><surname>Agarwal</surname><given-names>J</given-names> </name></person-group><article-title>Internet Users&#x2019; Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model</article-title><source>Inf Syst Res</source><year>2004</year><month>12</month><volume>15</volume><issue>4</issue><fpage>336</fpage><lpage>355</lpage><pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id></nlm-citation></ref><ref id="ref82"><label>82</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bansal</surname><given-names>G</given-names> </name><name name-style="western"><surname>Zahedi</surname><given-names>F &#x201C;Mariam</given-names> </name><name name-style="western"><surname>Gefen</surname><given-names>D</given-names> </name></person-group><article-title>The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online</article-title><source>Decis Support Syst</source><year>2010</year><month>05</month><volume>49</volume><issue>2</issue><fpage>138</fpage><lpage>150</lpage><pub-id pub-id-type="doi">10.1016/j.dss.2010.01.010</pub-id></nlm-citation></ref><ref id="ref83"><label>83</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bansal</surname><given-names>G</given-names> </name><name name-style="western"><surname>Zahedi</surname><given-names>FM</given-names> </name><name name-style="western"><surname>Gefen</surname><given-names>D</given-names> </name></person-group><article-title>Do context and personality matter? Trust and privacy concerns in disclosing private information online</article-title><source>Inf Manag</source><year>2016</year><month>01</month><volume>53</volume><issue>1</issue><fpage>1</fpage><lpage>21</lpage><pub-id pub-id-type="doi">10.1016/j.im.2015.08.001</pub-id></nlm-citation></ref><ref id="ref84"><label>84</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Merriam</surname><given-names>SB</given-names> </name><name name-style="western"><surname>Tisdell</surname><given-names>EJ</given-names> </name></person-group><source>Qualitative Research: A Guide to Design and Implementation</source><year>2016</year><edition>4</edition><publisher-name>San Francisco, CA: Jossey-Bass</publisher-name><fpage>368</fpage><pub-id pub-id-type="other">978-1-119-00361-8</pub-id></nlm-citation></ref><ref id="ref85"><label>85</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Soper</surname><given-names>D</given-names> </name><name name-style="western"><surname>Soper</surname><given-names>D</given-names> </name></person-group><article-title>A-priori sample size calculator for structural equation models</article-title><source>Free Statistics Calculators</source><year>2014</year><access-date>2024-03-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.danielsoper.com/statcalc/calculator.aspx?id=89">https://www.danielsoper.com/statcalc/calculator.aspx?id=89</ext-link></comment></nlm-citation></ref><ref id="ref86"><label>86</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhu</surname><given-names>K</given-names> </name><name name-style="western"><surname>Kraemer</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>S</given-names> </name></person-group><article-title>The process of innovation assimilation by firms in different countries: a technology diffusion perspective on e-business</article-title><source>Manage Sci</source><year>2006</year><month>10</month><volume>52</volume><issue>10</issue><fpage>1557</fpage><lpage>1576</lpage><pub-id pub-id-type="doi">10.1287/mnsc.1050.0487</pub-id></nlm-citation></ref><ref id="ref87"><label>87</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhu</surname><given-names>K</given-names> </name><name name-style="western"><surname>Kraemer</surname><given-names>K</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>S</given-names> </name></person-group><article-title>Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors</article-title><source>Eur J Inf Syst</source><year>2003</year><month>12</month><volume>12</volume><issue>4</issue><fpage>251</fpage><lpage>268</lpage><pub-id pub-id-type="doi">10.1057/palgrave.ejis.3000475</pub-id></nlm-citation></ref><ref id="ref88"><label>88</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Podsakoff</surname><given-names>PM</given-names> </name><name name-style="western"><surname>MacKenzie</surname><given-names>SB</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>JY</given-names> </name><name name-style="western"><surname>Podsakoff</surname><given-names>NP</given-names> </name></person-group><article-title>Common method biases in behavioral research: a critical review of the literature and recommended remedies</article-title><source>J Appl Psychol</source><year>2003</year><month>10</month><volume>88</volume><issue>5</issue><fpage>879</fpage><lpage>903</lpage><pub-id pub-id-type="doi">10.1037/0021-9010.88.5.879</pub-id><pub-id pub-id-type="medline">14516251</pub-id></nlm-citation></ref><ref id="ref89"><label>89</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Guan</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Hou</surname><given-names>F</given-names> </name><name name-style="western"><surname>Li</surname><given-names>B</given-names> </name><name name-style="western"><surname>Phang</surname><given-names>CW</given-names> </name><name name-style="western"><surname>Chong</surname><given-names>AYL</given-names> </name></person-group><article-title>What influences the purchase of virtual gifts in live streaming in China? A cultural context&#x2010;sensitive model</article-title><source>Inf Syst J</source><year>2022</year><month>05</month><access-date>2026-03-29</access-date><volume>32</volume><issue>3</issue><fpage>653</fpage><lpage>689</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/toc/13652575/32/3">https://onlinelibrary.wiley.com/toc/13652575/32/3</ext-link></comment><pub-id pub-id-type="doi">10.1111/isj.12367</pub-id></nlm-citation></ref><ref id="ref90"><label>90</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hair</surname><given-names>JF</given-names> </name><name name-style="western"><surname>Sarstedt</surname><given-names>M</given-names> </name><name name-style="western"><surname>Ringle</surname><given-names>CM</given-names> </name><name name-style="western"><surname>Mena</surname><given-names>JA</given-names> </name></person-group><article-title>An assessment of the use of partial least squares structural equation modeling in marketing research</article-title><source>J Acad Mark Sci</source><year>2012</year><month>05</month><volume>40</volume><issue>3</issue><fpage>414</fpage><lpage>433</lpage><pub-id pub-id-type="doi">10.1007/s11747-011-0261-6</pub-id></nlm-citation></ref><ref id="ref91"><label>91</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hair</surname><given-names>JF</given-names> </name><name name-style="western"><surname>Howard</surname><given-names>MC</given-names> </name><name name-style="western"><surname>Nitzl</surname><given-names>C</given-names> </name></person-group><article-title>Assessing measurement model quality in PLS-SEM using confirmatory composite analysis</article-title><source>J Bus Res</source><year>2020</year><month>03</month><volume>109</volume><fpage>101</fpage><lpage>110</lpage><pub-id pub-id-type="doi">10.1016/j.jbusres.2019.11.069</pub-id></nlm-citation></ref><ref id="ref92"><label>92</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fornell</surname><given-names>C</given-names> </name><name name-style="western"><surname>Larcker</surname><given-names>DF</given-names> </name></person-group><article-title>Evaluating structural equation models with unobservable variables and measurement error</article-title><source>J Mark Res</source><year>1981</year><month>02</month><volume>18</volume><issue>1</issue><fpage>39</fpage><lpage>50</lpage><pub-id pub-id-type="doi">10.1177/002224378101800104</pub-id></nlm-citation></ref><ref id="ref93"><label>93</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Im</surname><given-names>I</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Han</surname><given-names>HJ</given-names> </name></person-group><article-title>The effects of perceived risk and technology type on users&#x2019; acceptance of technologies</article-title><source>Inf Manag</source><year>2008</year><month>01</month><volume>45</volume><issue>1</issue><fpage>1</fpage><lpage>9</lpage><pub-id pub-id-type="doi">10.1016/j.im.2007.03.005</pub-id></nlm-citation></ref><ref id="ref94"><label>94</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Becker</surname><given-names>JM</given-names> </name><name name-style="western"><surname>Ringle</surname><given-names>CM</given-names> </name><name name-style="western"><surname>Sarstedt</surname><given-names>M</given-names> </name><name name-style="western"><surname>V&#x00F6;lckner</surname><given-names>F</given-names> </name></person-group><article-title>How collinearity affects mixture regression results</article-title><source>Mark Lett</source><year>2015</year><month>12</month><volume>26</volume><issue>4</issue><fpage>643</fpage><lpage>659</lpage><pub-id pub-id-type="doi">10.1007/s11002-014-9299-9</pub-id></nlm-citation></ref><ref id="ref95"><label>95</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hair</surname><given-names>JF</given-names> </name><name name-style="western"><surname>Astrachan</surname><given-names>CB</given-names> </name><name name-style="western"><surname>Moisescu</surname><given-names>OI</given-names> </name><etal/></person-group><article-title>Executing and interpreting applications of PLS-SEM: updates for family business researchers</article-title><source>J Fam Bus Strateg</source><year>2021</year><month>09</month><volume>12</volume><issue>3</issue><fpage>100392</fpage><pub-id pub-id-type="doi">10.1016/j.jfbs.2020.100392</pub-id></nlm-citation></ref><ref id="ref96"><label>96</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bawack</surname><given-names>RE</given-names> </name><name name-style="western"><surname>Wamba</surname><given-names>SF</given-names> </name><name name-style="western"><surname>Carillo</surname><given-names>KDA</given-names> </name></person-group><article-title>Exploring the role of personality, trust, and privacy in customer experience performance during voice shopping: evidence from SEM and fuzzy set qualitative comparative analysis</article-title><source>Int J Inf Manage</source><year>2021</year><month>06</month><volume>58</volume><fpage>102309</fpage><pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2021.102309</pub-id></nlm-citation></ref><ref id="ref97"><label>97</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jr.</surname><given-names>JFH</given-names> </name><name name-style="western"><surname>Matthews</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Matthews</surname><given-names>RL</given-names> </name><name name-style="western"><surname>Sarstedt</surname><given-names>M</given-names> </name></person-group><article-title>PLS-SEM or CB-SEM: updated guidelines on which method to use</article-title><source>Int J Multivar Data Anal</source><year>2017</year><volume>1</volume><issue>2</issue><fpage>107</fpage><pub-id pub-id-type="doi">10.1504/IJMDA.2017.087624</pub-id></nlm-citation></ref><ref id="ref98"><label>98</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dubovitskaya</surname><given-names>A</given-names> </name><name name-style="western"><surname>Novotny</surname><given-names>P</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>F</given-names> </name></person-group><article-title>Applications of blockchain technology for data-sharing in oncology: results from a systematic literature review</article-title><source>Oncology (Williston Park, NY)</source><year>2020</year><volume>98</volume><issue>6</issue><fpage>403</fpage><lpage>411</lpage><pub-id pub-id-type="doi">10.1159/000504325</pub-id><pub-id pub-id-type="medline">31794967</pub-id></nlm-citation></ref><ref id="ref99"><label>99</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Le</surname><given-names>NT</given-names> </name><name name-style="western"><surname>Rao Hill</surname><given-names>S</given-names> </name><name name-style="western"><surname>Troshani</surname><given-names>I</given-names> </name></person-group><article-title>Perceived control and perceived risk in self-service technology recovery</article-title><source>J Comput Inf Syst</source><year>2022</year><month>01</month><day>2</day><volume>62</volume><issue>1</issue><fpage>164</fpage><lpage>173</lpage><pub-id pub-id-type="doi">10.1080/08874417.2020.1756533</pub-id></nlm-citation></ref><ref id="ref100"><label>100</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hoover</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Green</surname><given-names>RT</given-names> </name><name name-style="western"><surname>Saegert</surname><given-names>J</given-names> </name></person-group><article-title>A cross-national study of perceived risk: does perceived risk have the same effect on consumers in a foreign country as in the United States</article-title><source>J Mark</source><year>1978</year><volume>42</volume><issue>3</issue><fpage>102</fpage><lpage>108</lpage><pub-id pub-id-type="doi">10.1177/002224297804200318</pub-id></nlm-citation></ref><ref id="ref101"><label>101</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ali</surname><given-names>O</given-names> </name><name name-style="western"><surname>Shrestha</surname><given-names>A</given-names> </name><name name-style="western"><surname>Osmanaj</surname><given-names>V</given-names> </name><name name-style="western"><surname>Muhammed</surname><given-names>S</given-names> </name></person-group><article-title>Cloud computing technology adoption: an evaluation of key factors in local governments</article-title><source>Inf Technol People</source><year>2020</year><month>04</month><day>28</day><volume>34</volume><issue>2</issue><fpage>666</fpage><lpage>703</lpage><pub-id pub-id-type="doi">10.1108/ITP-03-2019-0119</pub-id></nlm-citation></ref><ref id="ref102"><label>102</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cervone</surname><given-names>HF</given-names> </name></person-group><article-title>An overview of virtual and cloud computing</article-title><source>OCLC Syst Serv</source><year>2010</year><month>08</month><day>24</day><volume>26</volume><issue>3</issue><fpage>162</fpage><lpage>165</lpage><pub-id pub-id-type="doi">10.1108/10650751011073607</pub-id></nlm-citation></ref><ref id="ref103"><label>103</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Simcock</surname><given-names>P</given-names> </name><name name-style="western"><surname>Sudbury</surname><given-names>L</given-names> </name><name name-style="western"><surname>Wright</surname><given-names>G</given-names> </name></person-group><article-title>Age, perceived risk and satisfaction in consumer decision making: a review and extension</article-title><source>J Mark Manag</source><year>2006</year><month>04</month><volume>22</volume><issue>3-4</issue><fpage>355</fpage><lpage>377</lpage><pub-id pub-id-type="doi">10.1362/026725706776861163</pub-id></nlm-citation></ref><ref id="ref104"><label>104</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Phamthi</surname><given-names>VA</given-names> </name><name name-style="western"><surname>Nagy</surname><given-names>&#x00C1;</given-names> </name><name name-style="western"><surname>Ngo</surname><given-names>TM</given-names> </name></person-group><article-title>The influence of perceived risk on purchase intention in e&#x2010;commerce&#x2014;Systematic review and research agenda</article-title><source>Int J Consum Stud</source><year>2024</year><month>07</month><access-date>2026-03-24</access-date><volume>48</volume><issue>4</issue><fpage>e13067</fpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/doi/10.1111/ijcs.13067">https://onlinelibrary.wiley.com/doi/10.1111/ijcs.13067</ext-link></comment><pub-id pub-id-type="doi">10.1111/ijcs.13067</pub-id></nlm-citation></ref><ref id="ref105"><label>105</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kim</surname><given-names>LH</given-names> </name><name name-style="western"><surname>Qu</surname><given-names>H</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>DJ</given-names> </name></person-group><article-title>A study of perceived risk and risk reduction of purchasing air&#x2010;tickets online</article-title><source>J Travel Tour Mark</source><year>2009</year><month>05</month><volume>26</volume><issue>3</issue><fpage>203</fpage><lpage>224</lpage><pub-id pub-id-type="doi">10.1080/10548400902925031</pub-id></nlm-citation></ref><ref id="ref106"><label>106</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Abdelwahed</surname><given-names>IM</given-names> </name><name name-style="western"><surname>Ramadan</surname><given-names>N</given-names> </name><name name-style="western"><surname>Hefny</surname><given-names>HA</given-names> </name></person-group><article-title>Cybersecurity risks of blockchain technology</article-title><source>Int J Comput Appl</source><year>2020</year><volume>177</volume><issue>42</issue><fpage>8</fpage><lpage>14</lpage><pub-id pub-id-type="doi">10.5120/ijca2020919922</pub-id></nlm-citation></ref><ref id="ref107"><label>107</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Behzadi</surname><given-names>L</given-names> </name><name name-style="western"><surname>Joseph</surname><given-names>J</given-names> </name></person-group><source>Blockchain Security Considerations</source><year>2024</year><publisher-name>CRC Press</publisher-name><fpage>73</fpage><lpage>92</lpage><pub-id pub-id-type="doi">10.1201/9781003462033-6</pub-id></nlm-citation></ref><ref id="ref108"><label>108</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bordeianu</surname><given-names>AA</given-names> </name><name name-style="western"><surname>Popescu</surname><given-names>DE</given-names> </name></person-group><article-title>Blockchain variables and possible attacks: a technical survey</article-title><source>Computers</source><year>2025</year><volume>14</volume><issue>12</issue><fpage>567</fpage><pub-id pub-id-type="doi">10.3390/computers14120567</pub-id></nlm-citation></ref><ref id="ref109"><label>109</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Drljevic</surname><given-names>N</given-names> </name><name name-style="western"><surname>Aranda</surname><given-names>DA</given-names> </name><name name-style="western"><surname>Stantchev</surname><given-names>V</given-names> </name></person-group><article-title>Perspectives on risks and standards that affect the requirements engineering of blockchain technology</article-title><source>Comput Stand Inter</source><year>2020</year><month>03</month><volume>69</volume><fpage>103409</fpage><pub-id pub-id-type="doi">10.1016/j.csi.2019.103409</pub-id></nlm-citation></ref><ref id="ref110"><label>110</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Govindarajan</surname><given-names>UH</given-names> </name><name name-style="western"><surname>Narang</surname><given-names>G</given-names> </name><name name-style="western"><surname>Singh</surname><given-names>DK</given-names> </name><name name-style="western"><surname>Yadav</surname><given-names>VS</given-names> </name></person-group><article-title>Blockchain technologies adoption in healthcare: overcoming barriers amid the hype cycle to enhance patient care</article-title><source>Technol Forecast Soc Change</source><year>2025</year><month>04</month><volume>213</volume><fpage>124031</fpage><pub-id pub-id-type="doi">10.1016/j.techfore.2025.124031</pub-id></nlm-citation></ref><ref id="ref111"><label>111</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Attaran</surname><given-names>M</given-names> </name></person-group><article-title>Blockchain technology in healthcare: challenges and opportunities</article-title><source>Int J Healthc Manag</source><year>2022</year><month>01</month><day>2</day><volume>15</volume><issue>1</issue><fpage>70</fpage><lpage>83</lpage><pub-id pub-id-type="doi">10.1080/20479700.2020.1843887</pub-id></nlm-citation></ref><ref id="ref112"><label>112</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Prashar</surname><given-names>A</given-names> </name><name name-style="western"><surname>Sunder M</surname><given-names>V</given-names> </name></person-group><article-title>Blockchain barriers in hospitals: a stakeholder theoretic perspective</article-title><source>Benchmarking</source><year>2026</year><month>01</month><day>1</day><volume>33</volume><issue>1</issue><fpage>1</fpage><lpage>32</lpage><pub-id pub-id-type="doi">10.1108/BIJ-03-2023-0185</pub-id></nlm-citation></ref><ref id="ref113"><label>113</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nanda</surname><given-names>S</given-names> </name><name name-style="western"><surname>Nanda</surname><given-names>S</given-names> </name></person-group><article-title>Blockchain adoption in health market: a systems thinking and modelling approach</article-title><source>J Asia Bus Stud</source><year>2022</year><month>03</month><day>23</day><volume>16</volume><issue>2</issue><fpage>396</fpage><lpage>405</lpage><pub-id pub-id-type="doi">10.1108/JABS-11-2020-0457</pub-id></nlm-citation></ref><ref id="ref114"><label>114</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Onik</surname><given-names>MMH</given-names> </name><name name-style="western"><surname>Aich</surname><given-names>S</given-names> </name><name name-style="western"><surname>Yang</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>CS</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>HC</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Dey</surname><given-names>N</given-names> </name><name name-style="western"><surname>Das</surname><given-names>H</given-names> </name><name name-style="western"><surname>Naik</surname><given-names>B</given-names> </name><name name-style="western"><surname>Behera</surname><given-names>HS</given-names> </name></person-group><article-title>Chapter 8 - blockchain in healthcare: challenges and solutions</article-title><source>Big Data Analytics for Intelligent Healthcare</source><year>2019</year><publisher-name>Academic Press</publisher-name><fpage>197</fpage><lpage>226</lpage><pub-id pub-id-type="doi">10.1016/B978-0-12-818146-1.00008-8</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Measurement of items.</p><media xlink:href="jmir_v28i1e77933_app1.docx" xlink:title="DOCX File, 18 KB"/></supplementary-material></app-group></back></article>