<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v6i8e172</article-id>
    <article-id pub-id-type="pmid">30158101</article-id>
    <article-id pub-id-type="doi">10.2196/mhealth.9316</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>What Predicts Patients’ Adoption Intention Toward mHealth Services in China: Empirical Study</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Guo</surname>
          <given-names>Yi</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Puri</surname>
          <given-names>Arjun</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1">
        <name name-style="western">
          <surname>Deng</surname>
          <given-names>Zhaohua</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-7744-7818</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib2">
        <name name-style="western">
          <surname>Hong</surname>
          <given-names>Ziying</given-names>
        </name>
        <degrees>MA</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-4160-9739</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3">
        <name name-style="western">
          <surname>Ren</surname>
          <given-names>Cong</given-names>
        </name>
        <degrees>MA</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-7390-5175</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4">
        <name name-style="western">
          <surname>Zhang</surname>
          <given-names>Wei</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-0178-0750</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib5" corresp="yes">
      <name name-style="western">
        <surname>Xiang</surname>
        <given-names>Fei</given-names>
      </name>
      <degrees>PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>School of Medicine and Health Management</institution>
        <institution>Huazhong University of Science and Technology</institution>
        <addr-line>13 Hangkong Road, Qiaokou District</addr-line>
        <addr-line>Wuhan, 430030</addr-line>
        <country>China</country>
        <phone>86 13016442007</phone>
        <email>xiangfei@hust.edu.cn</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-9783-9253</ext-link></contrib>
    </contrib-group>
    <aff id="aff1">
    <sup>1</sup>
    <institution>School of Medicine and Health Management</institution>
    <institution>Huazhong University of Science and Technology</institution>  
    <addr-line>Wuhan</addr-line>
    <country>China</country></aff>
    <aff id="aff2">
    <sup>2</sup>
    <institution>Department of Medical Records Room</institution>
    <institution>Affiliated Central Hospital of Zhengzhou University</institution>  
    <addr-line>Zhengzhou</addr-line>
    <country>China</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Fei Xiang 
      <email>xiangfei@hust.edu.cn</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>08</month><year>2018</year></pub-date>
    <pub-date pub-type="epub">
      <day>29</day>
      <month>08</month>
      <year>2018</year>
    </pub-date>
    <volume>6</volume>
    <issue>8</issue>
    <elocation-id>e172</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>31</day>
        <month>10</month>
        <year>2017</year>
      </date>
      <date date-type="rev-request">
        <day>15</day>
        <month>3</month>
        <year>2018</year>
      </date>
      <date date-type="rev-recd">
        <day>8</day>
        <month>5</month>
        <year>2018</year>
      </date>
      <date date-type="accepted">
        <day>21</day>
        <month>6</month>
        <year>2018</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Zhaohua Deng, Ziying Hong, Cong Ren, Wei Zhang, Fei Xiang. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 29.08.2018.</copyright-statement>
    <copyright-year>2018</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://mhealth.jmir.org/2018/8/e172/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>With the increasing concerns about the health of individuals in China and the development of information technology, mHealth enables patients to access health information and interact with doctors anytime and anywhere. Examining patients’ willingness to use mHealth is considered critical because its success depends on the adoption of patients.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>The objective of our study was to explore the determinants of mHealth service adoption among Chinese patients using an extended technology acceptance model (TAM) with trust and perceived risks.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>We conducted a questionnaire-based survey in 3 large hospitals in China and analyzed the data using structural equation modeling.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>The results corroborated that the proposed model fits well. Trust, perceived usefulness, and perceived ease of use positively correlated with mHealth service adoption. Privacy and performance risks negatively correlated with the patients’ trust and adoption intention toward mHealth services. In addition, patients’ age and chronic diseases can help predict their trust level and adoption intention toward mHealth, respectively.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>We concluded that the TAM generally works in the context of mHealth adoption, although its significance has declined. In addition to technical factors, trust and perceived risks are critical for explaining mHealth service adoption among Chinese patients.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>mHealth service</kwd>
      <kwd>perceived risk</kwd>
      <kwd>trust</kwd>
      <kwd>TAM</kwd>
      <kwd>Chinese patients</kwd>
      <kwd>mobile phone</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Since Professor Robert Istepanian first proposed the concept of <italic>mHealth</italic> in 2005, it has become a new type of medical service mode combining medical services with the internet, medical sensors, mobile equipment, and information communication technology [<xref ref-type="bibr" rid="ref1">1</xref>]. Compared with traditional medical services, mHealth offers clear advantages, such as portability, mobility, personalization, and ubiquity [<xref ref-type="bibr" rid="ref2">2</xref>]. The users of mHealth services are diverse, ranging from general public, physicians, and nurses to patients with or without chronic diseases. mHealth services generally consist of Web-based appointments with physicians; Web-based health consultations; health information seeking; and medical examination result checking via wearable, portable devices; and smart devices or smartphone-based apps [<xref ref-type="bibr" rid="ref3">3</xref>]. Enabled with the mobile devices, health services are available without the constraints of time and space [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>]. mHealth services cost much less than the traditional ones [<xref ref-type="bibr" rid="ref6">6</xref>]. In addition, the Chinese government has been implementing the “Health China” strategy since 2016, and the primary objective of this strategy is to solve the problem of “difficulty and expense of seeing a doctor.” Thus, the development and success of mHealth services are important in implementing this national strategy.</p>
        <p>mHealth services have garnered extensive attention worldwide [<xref ref-type="bibr" rid="ref7">7</xref>]. A report released by the World Health Organization in 2011 affirmed that many countries had implemented mHealth care schemes [<xref ref-type="bibr" rid="ref8">8</xref>]. Moreover, the global telemedicine market was expected to reach 27.3 billion dollars in 2016 [<xref ref-type="bibr" rid="ref9">9</xref>]. For instance, more than 40,000 health care apps were available in the Apple iTunes Store in 2013 [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. To protect the rights of users, the US Food and Drug Administration has implemented certain laws for mHealth, such as approval, denial, and licensing of medical equipment [<xref ref-type="bibr" rid="ref11">11</xref>]. mHealth service has flourished in China as well. According to Wang, China’s market of mHealth services will have reached 12.53 billion in 2017 [<xref ref-type="bibr" rid="ref12">12</xref>]. Enabled by the internet, users can easily communicate their sensitive personal information, such as private diseases or emotions, to others. However, the risk of information leakage can hinder users from utilizing mHealth services [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>]. Risks incurred by legal concerns may also emerge because no specific law enforcement regulates mHealth services in China.</p>
        <p>Although mHealth services can reduce health care costs, improve health care quality, and promote health education, some problems may arouse individual risk perception. Considering the co-existence of technical advantages and potential risks of the mHealth service, we added perceived risk into the classic technology acceptance model (TAM) to analyze the users’ adoption of mHealth services. The TAM represents the positive factors, whereas the perceived risk represents the negative factors associated with mHealth service adoption. In addition, we introduced trust as a middle variable to further explore the beneficial effects of and the risk factors associated with the adoption of mHealth services.</p>
      </sec>
      <sec>
        <title>Literature Review and Hypothesis</title>
        <sec>
          <title>Literature Review</title>
          <p>Studies about mHealth services can be divided into four categories: (1) The current situation of services, which primarily focuses on the status quo of mobile medical services; the development of the services; and the existing defects, problems, or challenges; (2) the technical part of the services, which mainly explores the design and implementation of mHealth service platforms and system terminals; (3) the analysis and evaluation of application effects, which compares the effectiveness of certain mobile medical services and evaluates the effects; and (4) the acceptance of services, which empirically analyzes the factors influencing the consumers’ willingness to adopt mHealth services. For instance, Marzano et al have studied the application of mHealth care in the field of mental health and discussed the associated risks [<xref ref-type="bibr" rid="ref14">14</xref>]. Liang et al designed an emergency call service, which helped users to quickly and accurately transfer their emergency data to nearby search and rescue personnel through mobile medical social networks [<xref ref-type="bibr" rid="ref15">15</xref>]. Lv et al used randomized controlled trials to examine the impact of mHealth services that send health messages to patients with asthma on patients’ perceived control [<xref ref-type="bibr" rid="ref16">16</xref>]. Deng et al also compared the adoption of mHealth services between middle-aged and older users in China [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
          <p>From the perspective of acceptance, Lim et al used the TAM as a theoretical basis to explore the adoption behavior in using mobile phones to search for health information [<xref ref-type="bibr" rid="ref18">18</xref>]. The results showed that perceived usefulness, perceived ease of use, and self-efficacy significantly affected the adoption. Another research showed that technical anxiety has no significant effect on the willingness to adopt [<xref ref-type="bibr" rid="ref19">19</xref>]. Wu et al combined TAM and theory of planned behavior to explore the adoption intentions of medical staff toward mobile medical services; the results confirmed that attitude, perceived usefulness, perceived behavioral control, and subjective norms significantly influence the willingness to adopt [<xref ref-type="bibr" rid="ref20">20</xref>]. Alaiad and Zhou built a model based on the unified theory of acceptance and use of technology (UTAUT) and investigated the willingness to adopt home medical robots for all types of personnel in the organization; the results validated that performance expectations and social effect convenience and conditions significantly affect users’ adoption of home medical robots and that privacy and ethical concerns negatively affect users’ adoption intentions [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        </sec>
        <sec>
          <title>Technology Acceptance Model</title>
          <p>Proposed by Davis in 1989, the TAM is a classical theory used in predicting and interpreting users’ adoption of and behavior toward information technology [<xref ref-type="bibr" rid="ref22">22</xref>]. Similar to the theory of rational behavior and the theory of planned behavior, TAM theory follows the idea of <italic>Faith-Intention-Behavior.</italic> For an individual, one’s faith, for example, attitude and beliefs, affects his or her intention to act in the first place, and then, the actual behavior will change accordingly [<xref ref-type="bibr" rid="ref23">23</xref>]. The TAM mainly consists of five variables: perceived usefulness, perceived ease of use, attitude, behavioral intention, and actual behavior. According to the TAM, whether an individual performs a certain goal behavior depends on his or her behavioral intention to perform the behavior. Behavioral intention is determined by one’s attitude and perceived usefulness toward a certain behavior or technology, which can also be called adoption intention. In addition, perceived usefulness and perceived ease of use can influence one’s attitude toward a certain behavior or technology [<xref ref-type="bibr" rid="ref24">24</xref>]. Later studies have proposed new theories based on the TAM, such as the TAM2 and UTAUT [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Compared with the TAM, TAM2 incorporates the antecedents of perceived usefulness; TAM 3 adds external factors influencing the perceived ease of use; and the UTAUT model combines exploratory factors, performance expectancy, effort expectancy, social influence, facilitating conditions, and four moderators (gender, age, experience, and voluntariness of use). mHealth service involves patients’ health issue, which is irreversible and cannot be returned. If patients use wrong health information, then the body will be greatly affected. Thus, patients’ risks should be considered. In this study, we combined the TAM and patients’ perceived risk concerns to examine their adoption of mHealth services.</p>
        </sec>
        <sec>
          <title>Perceived Risk</title>
          <p>Raymond A. Bauer, a Harvard University scholar in the field of psychology, introduced the concept of perceived risk. Bauer believed that any act of an individual can lead to unforeseen consequences. The undesirable or unexpected aspect of these consequences is that individuals cannot control them and that they may cause some loss to the individual, which is called the risk of an individual’s actions [<xref ref-type="bibr" rid="ref27">27</xref>]. Many scholars have further defined perceived risk in their research. Cunningham showed that if the final outcome of one’s behavior is unpleasant or perceived detrimental to him or her, the potential loss of this outcome will be perceived risks [<xref ref-type="bibr" rid="ref28">28</xref>]. Peter and Ryan believed that perceived risk is one’s subjective perception of the expected loss of a target behavior [<xref ref-type="bibr" rid="ref29">29</xref>]. Mitchell regarded perceived risk as one’s subjective assessment and perception where behavior may cause a loss [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
          <p>When introduced into the field of behavior research, Bauer emphasized the subjectivity of perceived risks rather than focusing on objective risks [<xref ref-type="bibr" rid="ref27">27</xref>]. Although objective risks persist, only subjective risks perceived by an individual might affect his or her behavior. On the basis of Bauer’s work, several scholars have explored the dimensions of perceived risks. Jacoby and Kaplan classified the perceived risk into 5 types: financial, performance, physical, psychological, and social [<xref ref-type="bibr" rid="ref31">31</xref>]. Stone and Grønhaug added the time risk into the previous research and proved that the 6 types can interpret the perceived risk at a rate of 88.8% [<xref ref-type="bibr" rid="ref32">32</xref>]. Of all the classification methods, the 6 types of perceived risk have been generally recognized by the academic community. However, the specific variables of the perceived risk are not limited to the 6 types. Scholars usually group them into different risk variables according to their research context. For instance, Lee studied individuals’ adoption of Web-based banking services from the perspectives of function, time, financial, social, and security risks [<xref ref-type="bibr" rid="ref33">33</xref>]. Kim et al examined the effect of perceived risks on individuals’ e-commerce purchasing decisions based on 3 dimensions: privacy protection, security protection, and information quality [<xref ref-type="bibr" rid="ref34">34</xref>]. Although perceived risks are mainly adopted in the context of business, they are being gradually applied to the health care fields, for example, wearable devices and electronic medical records [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>].</p>
        </sec>
        <sec>
          <title>Theoretical Foundation and Hypothesis</title>
          <sec>
          <title>Trust</title>
          <p>Trust is an essential factor for attracting new users and maintaining the loyalty of old users [<xref ref-type="bibr" rid="ref34">34</xref>]. If one trusts the services provided by mHealth, he or she is likely to adopt the service [<xref ref-type="bibr" rid="ref37">37</xref>]. In this study, we utilized the definition of trust by Doney et al and Yang et al [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. Trust lies on users’ willingness to believe and implement the advices or information acquired through mHealth services; thus, users prefer to believe that mHealth services can fulfill their health needs [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. As a belief variable, trust is an individual’s positive expectation toward another party’s future behaviors [<xref ref-type="bibr" rid="ref40">40</xref>]. According to the TAM, individuals’ beliefs can influence their attitudes and adoption intentions. If one trusts mHealth and has a positive attitude toward mHealth services, he or she is likely to adopt these services. Therefore, we propose the following hypothesis:</p>  
              <disp-formula>H1: One’s trust toward mHealth services is positively associated with his or her intention to adopt the services.</disp-formula>
          </sec>
          <sec>
            <title>Perceived Usefulness</title>
            <p>According to Holden and Karsh, perceived usefulness refers to one’s subjective perception that the use of new technologies or services will improve his or her work efficiency [<xref ref-type="bibr" rid="ref24">24</xref>]. In this study, perceived usefulness is one’s belief that the use of mHealth services can enhance or improve his or her health condition, which suggests that mHealth services might be useful for individuals to obtain low-cost health information easily and fast, thereby eventually improving the overall health care quality [<xref ref-type="bibr" rid="ref41">41</xref>]. In the TAM theory, perceived usefulness may exert an influence on one’s attitude and adoption intention [<xref ref-type="bibr" rid="ref42">42</xref>]. For instance, Lim et al. confirmed that perceived usefulness significantly affected women’s adoption intention of health information seeking using mobile phones [<xref ref-type="bibr" rid="ref18">18</xref>]. Wu et al proved that medical staff are likely to adopt mHealth services if they perceive it as useful in their daily work [<xref ref-type="bibr" rid="ref20">20</xref>]. Similar to attitudes, trust is a classic belief variable. According to the TAM theory, perceived usefulness can significantly influence people’s attitudes toward a certain service or technology. If one perceives a service as useful, he or she turns to evaluate it as highly positive [<xref ref-type="bibr" rid="ref24">24</xref>]. Therefore, we argue that an individual is likely to trust mHealth services if he or she perceives these services as useful. Moreover, an individual is likely to adopt mHealth services if he or she perceives them as useful. Therefore, we propose the following hypotheses:</p>
                <disp-formula>H2a: Perceived usefulness is positively associated with one’s trust toward mHealth services.</disp-formula>
                <disp-formula>H2b: Perceived usefulness is positively associated with one’s adoption intention toward mHealth services.</disp-formula>
          </sec>
          <sec>
            <title>Perceived Ease of Use</title>
            <p>Another commonly used variable in the study on technology adoption behavior is <italic>perceived ease of use</italic>, which has been defined as the perception that using a particular technology will be free from physical or mental efforts [<xref ref-type="bibr" rid="ref24">24</xref>]. In the mHealth context, perceived ease of use refers to the degree of difficulty experienced during the use of mHealth services. Different from the traditional health services, mHealth is based on the internet and mobile devices that provide health services [<xref ref-type="bibr" rid="ref43">43</xref>]. Compared with elderly individuals, young individuals are more open to new things and are more likely to perceive mHealth services as easy to use. In the TAM, perceived ease of use has a direct influence on perceived usefulness and attitude [<xref ref-type="bibr" rid="ref42">42</xref>]. Perceived usefulness is important for one’s adoption intention. An individual will not use mHealth services if he or she perceives them as difficult to use regardless of the provision of usefulness [<xref ref-type="bibr" rid="ref44">44</xref>]. Therefore, we propose the following hypotheses:</p>
                <disp-formula>H3a: Perceived ease of use is positively associated with one’s trust toward mHealth services.</disp-formula>
                <disp-formula>H3b: Perceived ease of use is positively associated with one’s adoption intention toward mHealth services.</disp-formula>
            <fig id="figure1" position="float">
              <label>Figure 1</label>
              <caption>
                <p>Proposed research model. H: hypothesis.</p>
              </caption>
              <graphic xlink:href="mhealth_v6i8e172_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
          </sec>
          <sec>
            <title>Perceived Risk</title>
            <p><italic>Perceived risk</italic> refers to one’s perception of uncertainty in the use of mHealth services and its severity in terms of consequences [<xref ref-type="bibr" rid="ref45">45</xref>]. The mHealth service in China is still in its infancy stage, promising but also problematic [<xref ref-type="bibr" rid="ref24">24</xref>]. Potential problems, such as privacy invasion, may pose a certain risk to users. mHealth services might not work well in terms of desired performance. Meanwhile, legal concern is also highlighted in China’s context, where no specific law enforcement regulates the interest of parties in mHealth services. In this study, we measured the perceived risks through the following 3 variables: privacy risk, performance risk, and legal concern. The measurement of legal concern was shown by Alaiad and Zhou. In their research, they explored the effect of privacy, ethical, and legal concerns on the adoption intention toward home medical robots [<xref ref-type="bibr" rid="ref21">21</xref>]. In the mHealth context, privacy risk refers to the possibility of information abuse due to the use of mHealth services, such as information theft and leakage [<xref ref-type="bibr" rid="ref46">46</xref>]. Performance risk refers to the possibility of a match between the desired outcomes and actual use of mHealth services. Legal concern refers to the possibility of users’ worry due to lack of law enforcement [<xref ref-type="bibr" rid="ref21">21</xref>]. Previous research has also shown that perceived risk and privacy can effectively predict users’ adoption intention and trust [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. We argue that the greater the perceived risk, the lesser the trust and adoption intention toward mHealth services. Therefore, we propose the following hypotheses:</p>
                <disp-formula>H4a: Privacy risk is negatively associated with one’s trust toward mHealth services.</disp-formula>
                <disp-formula>H4b: Privacy risk is negatively associated with one’s adoption intention toward mHealth services.</disp-formula>
                <disp-formula>H5a: Performance risk is negatively associated with one’s trust toward mHealth services.</disp-formula>
                <disp-formula>H5b: Performance risk is negatively associated with one’s adoption intention toward mHealth services.</disp-formula>
                <disp-formula>H6a: Legal concern is negatively associated with one’s trust toward mHealth services.</disp-formula>
                <disp-formula>H6b: Legal concern is negatively associated with one’s adoption intention toward mHealth services.</disp-formula>
          </sec>
          <sec>
            <title>Control Variables</title>
            <p>Adding control variables will increase the explanatory power [<xref ref-type="bibr" rid="ref47">47</xref>]. The control variables include gender, age, education, and chronic diseases. Patients with chronic diseases, who suffer throughout their lifetime, are more aware of their health condition and need constant health care compared with patients with acute diseases. Thus, we propose that chronic diseases may lead patients to significant mHealth service usage because of the associated convenience. Long-term monitoring of chronic diseases is very important for the treatment and transformation of diseases. We argue that whether users suffer from chronic diseases may affect the adoption intention toward mHealth services to some extent. On the basis of the abovementioned reasons, in this study, we used <italic>chronic diseases</italic> as the control variable.</p>
            <p>Considering all the above mentioned hypotheses, we propose a new research model as shown in <xref ref-type="fig" rid="figure1">Figure 1</xref>.</p>
          </sec>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Development of the Study Questionnaire</title>
        <p>We developed a survey questionnaire for the proposed research model. The measurement items were either directly obtained from extant studies or slightly modified to fit in China’s context. Items for perceived usefulness are from Mun and Hwang and Parkes, and those for perceived ease of use are from Burton-Jones and Hubona [<xref ref-type="bibr" rid="ref48">48</xref>-<xref ref-type="bibr" rid="ref50">50</xref>]. Items for privacy risk, performance risk, and legal concern are from Featherman and Pavlou, Nepomuceno et al, and Alaiad and Zhou, respectively [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. Items for trust are from Mun et al and Martin et al [<xref ref-type="bibr" rid="ref53">53</xref>,<xref ref-type="bibr" rid="ref54">54</xref>] and those for adoption intention are from Wu et al [<xref ref-type="bibr" rid="ref55">55</xref>].</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Demographic characteristics of the participants (N=388).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="570"/>
            <col width="400"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Characteristic</td>
                <td>Number of participants, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3"><bold>Gender</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Male</td>
                <td>203 (52.3)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Female</td>
                <td>185 (47.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Age (years)</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>≤20</td>
                <td>21 (5.4)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>21-30</td>
                <td>116 (29.9)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>31-40</td>
                <td>123 (31.7)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>41-50</td>
                <td>85 (21.9)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>51-60</td>
                <td>32 (8.2)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>≥60</td>
                <td>11 (2.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Education level</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Junior high school and below</td>
                <td>32 (8.2)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>High school</td>
                <td>54 (13.9)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Specialist college</td>
                <td>82 (21.1)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Undergraduate degree</td>
                <td>180 (46.4)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Master’s degree</td>
                <td>35 (9.0)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Doctoral degree and higher</td>
                <td>5 (1.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Marital status</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Unmarried</td>
                <td>64 (16.5)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Married</td>
                <td>288 (74.2)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Divorced</td>
                <td>28 (7.2)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Widowed</td>
                <td>8 (2.1)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Career</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Enterprises (state-owned or foreign or private)</td>
                <td>54 (13.9)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Civil servants</td>
                <td>101 (26.0)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Medical workers</td>
                <td>35 (9.0)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Freelancers</td>
                <td>46 (11.9)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Self-employed</td>
                <td>34 (8.8)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Students</td>
                <td>47 (12.1)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Other</td>
                <td>71 (18.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Personal monthly income (Chinese yuan)</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>≤1000</td>
                <td>43 (11.1)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1001-3000</td>
                <td>64 (16.5)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3001-5000</td>
                <td>142 (36.6)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>5001-7000</td>
                <td>94 (24.2)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>≥7000</td>
                <td>45 (11.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Suffering from chronic diseases</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Yes</td>
                <td>138 (35.6)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>No</td>
                <td>250 (64.4)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>To ensure the quality of the designed questionnaire, we performed a pretest among 30 postgraduates and 30 undergraduates in the Tongji Medical College. We assumed that the medical students were young and familiar with mHealth services in general, and they may have had considerable opinions regarding these services. The final questionnaire was developed on the basis of the modifications of the pretest. The questionnaire consists of 34 questions with two sections: (1) 7 questions about demographic information (eg, age, gender, educational level, and chronic diseases) and (2) 27 questions to measure perceived usefulness, perceived ease of use, privacy risk, performance risk, legal concern, trust, and adoption intention. All the items in section 2 were measured using a 5-point Likert scale, with scores ranging from 1 (strongly disagree) to 5 (strongly agree). The details of the questionnaire can be found in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>Data Collection</title>
        <p>To test the proposed research model, we conducted an on-site survey in 3 large hospitals in China from September 20 to October 20, 2016. Among them, one is a medical college hospital, where patients comprise the students or faculty members studying or working in the university campus and the other two are famous hospitals in central China, where patients come from all over China, particularly the central region. Both are affiliated with this medical college. The target population included patients and their caregivers, who may be highly interested in mHealth services. We first asked them politely whether they would give 5-10 minutes to participate in our survey. If they answered yes, the survey was conducted accordingly. Small gifts were provided as incentives to those who completed the questionnaire. To avoid disturbing patients, we asked patients and their caregivers either waiting for a doctor or chatting with each other in the hospital waiting and resting areas to fill in our questionnaires; a total of 450 questionnaires were distributed and collected. After discarding the questionnaires with incomplete answers and those with the same answers, we obtained a total of 388 usable responses; the effective response rate was 86.2%. Approximately, 52.3% (203/388) of the respondents were male, and the age of the respondents ranged from 20 to 60 years. Approximately 67.0% (260/388) of the respondents were younger than 40 years and 2.8% (11/388) were older than 60 years. Approximately half of the respondents had a bachelor’s degree or higher, and 35.6% (138/388) of the respondents had at least one chronic disease. <xref ref-type="table" rid="table1">Table 1</xref> shows the detailed information of the respondents.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Structural Equation Model</title>
        <p>The structural equation model includes the measurement and structural models. We analyzed the research model using a two-step approach with an exploratory factor analysis and a confirmatory factor analysis to test the measurement and structural models, respectively [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
      </sec>
      <sec>
        <title>Results of the Measurement Model Testing</title>
        <p>We performed a confirmatory factor analysis to test the measurement equation, including reliability and validity tests. Reliability refers to the degree of reliability of each construct. Composite reliability and Cronbach alpha were used to measure the reliability. Validity is a measure of the validity of a measurement scale, usually based on discriminant validity and convergent validity. Discriminant validity refers to the degree of difference between the items with different latent variables, which can be tested using the average variance extracted of each latent variable and the standard load of each item. <xref ref-type="table" rid="table2">Table 2</xref> shows the confirmatory factor analysis results of the measurement model. The composite reliability, Cronbach alpha, and average variance extracted of each construct and all the standard loadings are greater than the recommended values, indicating a good reliability and discriminant validity [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
        <p>Convergent validity refers to a higher level of correlation between the measurement items of the same variable, which can be tested using the square root of the average variance extracted of each construct and its correlation coefficients with other constructs. The correlation coefficients between any two variables are smaller than the square root of the corresponding average variance extracted, thereby indicating a high discriminant validity [<xref ref-type="bibr" rid="ref57">57</xref>]. <xref ref-type="table" rid="table3">Table 3</xref> shows the specific results.</p>
        <p>The fitting degree of a model is an evaluation of the research model. The commonly used goodness-of-fit indices are the ratio of χ<sup>2</sup> and degrees of freedom (df), Root Mean Square Error of Approximation (RMSEA), goodness of fit index (GFI), adjusted goodness of fit index (AGFI), comparative fit index (CFI), mormed fit index (NFI), and incremental fit index (IFI). The confirmatory factor analysis results are presented in <xref ref-type="table" rid="table2">Table 2</xref> and <xref ref-type="table" rid="table4">Table 4</xref> (χ<sup>2</sup><sub>388</sub>=840.0, χ<sup>2</sup>/df=2.165&#60;3, RMSEA=0.055&#60;0.08, and AGFI=0.863&#62;0.80). The values of GFI, CFI, NFI, and IFI are all greater than 0.90. All the fitting indices of the research model are above the normal average acceptance level, which shows that the research model agrees well with the acquisition data [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
      </sec>
      <sec>
        <title>Results of the Structural Model Testing</title>
        <p>We used a regression method to test structural equations. The proposed research model includes seven latent constructs and several control constructs. The seven latent constructs are the primary factors, including perceived usefulness, perceived ease of use, privacy risk, performance risk, legal concern, trust, and adoption intention, and they were analyzed in Model 1. The control constructs such as gender, age, education, and chronic diseases were added into Model 2 to test the control effects.</p>
        <p><xref ref-type="table" rid="table4">Table 4</xref> summarizes the results of multiple linear regression analysis. <xref ref-type="table" rid="table5">Table 5</xref>, <xref ref-type="table" rid="table6">Table 6</xref>, and <xref ref-type="table" rid="table7">Table 7</xref> show the specific results of the hypothesis testing. The results showed that trust, perceived usefulness, and perceived ease of use positively correlated with the adoption intention in the context of mHealth services. Meanwhile, privacy and performance risks negatively correlated with trust and adoption intention. We did not observe a significant correlation between legal concern and trust or adoption intention. For the control constructs, education and chronic diseases can be effective predictors for individual adoption intention toward mHealth services. The variations in age lead to different levels of trust toward mHealth services. However, gender has no significant effect either on trust or adoption behavior.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Confirmatory factor analysis results of the measurement model.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="170"/>
            <col width="150"/>
            <col width="360"/>
            <col width="170"/>
            <col width="120"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Constructs and items</td>
                <td>Standard loadings</td>
                <td>Average variance extracted of each latent variable</td>
                <td>Composite reliability</td>
                <td>Cronbach alpha</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3"><bold>Perceived usefulness</bold></td>
                <td>0.625</td>
                <td>0.833</td>
                <td>.747</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.76</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.78</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.83</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Perceived ease of use</bold></td>
                <td>0.585</td>
                <td>0.875</td>
                <td>.765</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.72</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.76</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.74</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>4</td>
                <td>0.77</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>6</td>
                <td>0.83</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Privacy risk</bold></td>
                <td>0.720</td>
                <td>0.911</td>
                <td>.909</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.81</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.86</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.91</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>4</td>
                <td>0.81</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Performance risk</bold></td>
                <td>0.584</td>
                <td>0.848</td>
                <td>.846</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.68</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.79</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.84</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>4</td>
                <td>0.74</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Legal concern</bold></td>
                <td>0.672</td>
                <td>0.857</td>
                <td>.843</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.63</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.89</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.91</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Trust</bold></td>
                <td>0.612</td>
                <td>0.887</td>
                <td>.877</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.75</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.80</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.81</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>4</td>
                <td>0.80</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>5</td>
                <td>0.75</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Adoption intention</bold></td>
                <td>0.657</td>
                <td>0.851</td>
                <td>.853</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>1</td>
                <td>0.85</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2</td>
                <td>0.80</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>3</td>
                <td>0.78</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Correlation coefficient matrix and square root of average variance extracted of latent variables.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="290"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="120"/>
            <col width="100"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td>Constructs</td>
                <td>Perceived usefulness</td>
                <td>Perceived ease of use</td>
                <td>Privacy risk</td>
                <td>Performance risk</td>
                <td>Legal concern</td>
                <td>Trust</td>
                <td>Adoption intention</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="bottom">
                <td>Perceived usefulness</td>
                <td>0.790<sup>a</sup></td>
                <td>—<sup>b</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td>Perceived ease of use</td>
                <td>0.401</td>
                <td>0.765<sup>a</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td>Privacy risk</td>
                <td>−0.121</td>
                <td>−0.058</td>
                <td>0.848<sup>a</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td>Performance risk</td>
                <td>−0.086</td>
                <td>−0.212</td>
                <td>0.155</td>
                <td>0.764<sup>a</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td>Legal concern</td>
                <td>−0.069</td>
                <td>−0.144</td>
                <td>0.316</td>
                <td>0.412</td>
                <td>0.819<sup>a</sup></td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td>Trust</td>
                <td>0.310</td>
                <td>0.321</td>
                <td>−0.288</td>
                <td>−0.227</td>
                <td>−0.245</td>
                <td>0.782<sup>a</sup></td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td>Adoption intention</td>
                <td>0.440</td>
                <td>0.233</td>
                <td>−0.247</td>
                <td>−0.185</td>
                <td>−0.119</td>
                <td>0.438</td>
                <td>0.810<sup>a</sup></td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>Square root of average variance extracted.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Fit index of the research model.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="290"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="100"/>
            <col width="120"/>
            <col width="100"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td>Fit</td>
                <td>χ<sup>2</sup>/df<sup>a</sup></td>
                <td>RMSEA<sup>b</sup></td>
                <td>GFI<sup>c</sup></td>
                <td>AGFI<sup>d</sup></td>
                <td>CFI<sup>e</sup></td>
                <td>NFI<sup>f</sup></td>
                <td>IFI<sup>g</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Recommended value</td>
                <td>&#60;3</td>
                <td>&#60;0.08</td>
                <td>&#62;0.90</td>
                <td>&#62;0.80</td>
                <td>&#62;0.90</td>
                <td>&#62;0.90</td>
                <td>&#62;0.90</td>
              </tr>
              <tr valign="top">
                <td>Research model</td>
                <td>2.165</td>
                <td>0.055</td>
                <td>0.909</td>
                <td>0.863</td>
                <td>0.925</td>
                <td>0.905</td>
                <td>0.935</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>χ<sup>2</sup>/df: chi-square divided by degrees of freedom.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>RMSEA: Root Mean Square Error of Approximation.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>GFI: goodness of fit index.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>AGFI: adjusted goodness of fit index.</p>
            </fn>
            <fn id="table4fn5">
              <p><sup>e</sup>CFI: comparative fit index.</p>
            </fn>
            <fn id="table4fn6">
              <p><sup>f</sup>NFI: normed fit index.</p>
            </fn>
            <fn id="table4fn7">
              <p><sup>g</sup>IFI: incremental fit index.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Results of multiple linear regression analysis for independent variable Trust. R<sup>2</sup>: coefficient of determination, ΔR<sup>2</sup>: change in the coefficient of determination, ΔF: change in the F-statistic. </p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="260"/>
            <col width="250"/>
            <col width="120"/>
            <col width="250"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Independent variable</td>
                <td colspan="4">Trust</td>
              </tr>
              <tr valign="top">
                <td colspan="2"><break/></td>
                <td>Model 1 (95% CI)</td>
                <td><italic>P</italic> value</td>
                <td>Model 2 (95% CI)</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="6"><bold>Independent variable</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Perceived usefulness</td>
                <td>0.046 (−0.085 to 0.178)</td>
                <td>.65</td>
                <td>0.042 (−0.090 to 0.174)</td>
                <td>.42</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Perceived ease of use</td>
                <td>0.027 (−0.116 to 0.170)</td>
                <td>.45</td>
                <td>0.026 (−0.117 to 0.169)</td>
                <td>.60</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Privacy risk</td>
                <td>−0.153 (−0.269 to −0.037)</td>
                <td>.005</td>
                <td>−0.148 (−0.267 to −0.032)</td>
                <td>.03</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Performance risk</td>
                <td>−0.147 (−0.264 to −0.030)</td>
                <td>.002</td>
                <td>−0.121 (−0.239 to −0.004)</td>
                <td>.01</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Legal concern</td>
                <td>−0.033 (−0.061 to 0.156)</td>
                <td>.52</td>
                <td>−0.033 (−0.096 to 0.121)</td>
                <td>.40</td>
              </tr>
              <tr valign="top">
                <td colspan="6"><bold>Control variables</bold></td>
              </tr>
              <tr valign="bottom">
                <td><break/></td>
                <td>Gender</td>
                <td>—<sup>a</sup></td>
                <td>—</td>
                <td>0.044 (−0.073 to 0.191)</td>
                <td>.38</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Age</td>
                <td>—</td>
                <td>—</td>
                <td>0.150 (0.084 to 0.216)</td>
                <td>.008</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Education</td>
                <td>—</td>
                <td>—</td>
                <td>0.092 (−0.002 to 0.152)</td>
                <td>.12</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Chronic diseases</td>
                <td>—</td>
                <td>—</td>
                <td>0.082 (−0.037 to 0.236)</td>
                <td>.81</td>
              </tr>
              <tr valign="bottom">
                <td colspan="2">R<sup>2</sup></td>
                <td>0.280</td>
                <td>—</td>
                <td>0.313</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td colspan="2">ΔR<sup>2</sup></td>
                <td>—</td>
                <td>—</td>
                <td>0.033</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td colspan="2">ΔF</td>
                <td>—</td>
                <td>—</td>
                <td>32.447</td>
                <td>0.03</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table5fn1">
              <p><sup>a</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Results of multiple linear regression analysis for dependent variable Adoption Intention.  R<sup>2</sup>: coefficient of determination, ΔR<sup>2</sup>: change in the coefficient of determination, ΔF: change in the F-statistic.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="260"/>
            <col width="250"/>
            <col width="120"/>
            <col width="250"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Dependent variable</td>
                <td colspan="4">Adoption intention</td>
              </tr>
              <tr valign="top">
                <td colspan="2"><break/></td>
                <td>Model 1 (95% CI)</td>
                <td><italic>P</italic> value</td>
                <td>Model 2 (95% CI)</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="6"><bold>Independent variables</bold></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Trust</td>
                <td>0.427 (0.327 to 0.527)</td>
                <td>&#60;.001</td>
                <td>0.371 (0.270 to 0.472)</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Perceived usefulness</td>
                <td>0.125 (0.05 to 0.20)</td>
                <td>.02</td>
                <td>0.120 (0.008 to 0.232)</td>
                <td>.02</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Perceived ease of use</td>
                <td>0.107 (0.035 to 0.179)</td>
                <td>.01</td>
                <td>0.107 (0.012 to 0.202)</td>
                <td>.02</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Privacy risk</td>
                <td>−0.134 (−0.24 to −0.028)</td>
                <td>.004</td>
                <td>−0.132 (−0.238 to −0.026)</td>
                <td>.002</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Performance risk</td>
                <td>−0.252 (−0.369 to −0.135)</td>
                <td>.003</td>
                <td>−0.221 (−0.339 to −0.103)</td>
                <td>.001</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Legal concern</td>
                <td>−0.033 (−0.061 to 0.156)</td>
                <td>.52</td>
                <td>−0.033 (−0.096 to 0.121)</td>
                <td>.40</td>
              </tr>
              <tr valign="top">
                <td colspan="6"><bold>Control variables</bold></td>
              </tr>
              <tr valign="bottom">
                <td><break/></td>
                <td>Gender</td>
                <td>—<sup>a</sup></td>
                <td>—</td>
                <td>0.066 (−0.066 to 0.197)</td>
                <td>.08</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Age</td>
                <td>—</td>
                <td>—</td>
                <td>0.027 (−0.039 to 0.093)</td>
                <td>.36</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Education</td>
                <td>—</td>
                <td>—</td>
                <td>0.104 (0.044 to 0.164)</td>
                <td>.04</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Chronic diseases</td>
                <td>—</td>
                <td>—</td>
                <td>0.112 (0.04 to 0.220)</td>
                <td>.05</td>
              </tr>
              <tr valign="bottom">
                <td colspan="2">R<sup>2</sup></td>
                <td>0.460</td>
                <td>—</td>
                <td>0.512</td>
                <td>—</td>
              </tr>
              <tr valign="bottom">
                <td colspan="2">ΔR<sup>2</sup></td>
                <td>—</td>
                <td>—</td>
                <td>0.052</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td colspan="2">ΔF</td>
                <td>—</td>
                <td>—</td>
                <td>27.593</td>
                <td>&#60;.001</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table6fn1">
              <p><sup>a</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>

        
        <table-wrap position="float" id="table7">
          <label>Table 7</label>
          <caption>
            <p>Results of the hypothesis testing.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="290"/>
            <col width="360"/>
            <col width="160"/>
            <col width="100"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td>Hypothesis</td>
                <td>Path</td>
                <td>Path coefficient</td>
                <td><italic>P</italic> value</td>
                <td>Supported</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>H1</td>
                <td>Trust → Adoption intention</td>
                <td>0.427</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H2a</td>
                <td>Perceived usefulness → Trust</td>
                <td>0.046</td>
                <td>.27</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H2b</td>
                <td>Perceived usefulness → Adoption intention</td>
                <td>0.125</td>
                <td>.04</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H3a</td>
                <td>Perceived ease of use → Trust</td>
                <td>0.027</td>
                <td>.07</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H3b</td>
                <td>Perceived ease of use → Adoption intention</td>
                <td>0.107</td>
                <td>.11</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H4a</td>
                <td>Privacy risk → Trust</td>
                <td>−0.153</td>
                <td>.004</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H4b</td>
                <td>Privacy risk → Adoption intention</td>
                <td>−0.134</td>
                <td>.002</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H5a</td>
                <td>Performance risk → Trust</td>
                <td>−0.147</td>
                <td>.003</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H5b</td>
                <td>Performance risk → Adoption intention</td>
                <td>−0.252</td>
                <td>.002</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H6a</td>
                <td>Legal concerns → Trust</td>
                <td>−0.033</td>
                <td>.54</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H6b</td>
                <td>Legal concerns → Adoption intention</td>
                <td>−0.065</td>
                <td>.08</td>
                <td>No</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>With the introduction of perceived risks in the classic TAM theory, this study aimed to explore the factors influencing an individual’s trust and adoption intention toward mHealth services. Furthermore, we analyzed the effects of gender, age, and chronic diseases as control variables. We proposed 11 hypotheses, of which 7 are supported. The primary findings are summarized as follows.</p>
        <p>First, trust, perceived usefulness, and perceived ease of use are strong predictors for the adoption intention toward mHealth services, whereas the influence of perceived usefulness and perceived ease of use on trust is not significant. Trust, perceived usefulness, and perceived ease of use are important positive and technical factors explaining a user’s adoption intention toward mHealth services. Among them, trust exerts the greatest influence, followed by perceived usefulness and perceived ease of use. In sum, this result is consistent with those of previous studies by Gu et al and Huang et al [<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]. It reveals that if individuals think that mHealth services are trustworthy, they are more willing to adopt them. For mHealth service operators, building trust is crucial. Corroborating the results of a study by Zhang et al [<xref ref-type="bibr" rid="ref60">60</xref>], we also validated that although perceived usefulness and perceived ease of use are still influential in explaining the adoption of mHealth services, their significance seems to decline. In our study, trust significantly correlated with mHealth adoption intention with a <italic>P</italic> value of &#60;.001, whereas perceived usefulness and perceived ease of use significantly correlated with mHealth adoption intention with a <italic>P</italic> value between .05 and .01. This may have been caused by the evolution of the technology itself [<xref ref-type="bibr" rid="ref61">61</xref>]. People are generally more technology savvier than their counterparts 10 years ago, and they can easily adjust with using modern mHealth services. However, for the mHealth service operators, strategies such as improving service quality and simplifying user process can still result in more individuals adopting the services.</p>
        <p>Second, the 3 dimensions of perceived risk, privacy risk, and performance risk negatively correlated with the trust and adoption intention, whereas legal concern showed no significant effect. When people perceive a potential risk associated with using mHealth services, for example, privacy or information leakage issues, they are less likely to trust and adopt these services. This result is similar to that of other studies. For example, Guo et al concluded that privacy concerns significantly influence a user’s trust toward mHealth [<xref ref-type="bibr" rid="ref13">13</xref>]. Zhang et al also found that privacy concern can affect adoption intention via attitude [<xref ref-type="bibr" rid="ref62">62</xref>]. Meanwhile, the influence of privacy risk and performance risk on trust and adoption intention differs. Compared with performance risk (−0.147), privacy risk (−0.153) has a more remarkable effect on trust. Compared with privacy risk (−0.134), performance risk (−0.252) has a more remarkable effect on adoption intention. This may be caused by the differentiations of specific risk. For example, performance risk features the perception of the possible risks of specific service functions and quality, and adoption intention centers on people’s willingness to use a certain service. According to previous studies, the function and quality of mHealth services are more likely to affect people’s willingness to adopt these services [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. Privacy risk concerns personal health-related information during the use of mHealth services. Privacy risk is not directly correlated with the functions of the mHealth services and is aroused by psychological factors. Hence, compared with performance risk, privacy risk may likely exert more effect on trust. For mHealth service operators, the major tasks include the following: (1) improving overall quality and (2) building a reliable information security system that protects a user’s privacy [<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]. These strategies will enhance the trust level of users and will ultimately encourage the adoption of the services. In addition, legal concern is seldom discussed because the primary function of mHealth services in China is Web-based health consultation, and patients still need to obtain medical treatment in hospitals. This may also help us understand the result showing no significant effect of legal concern on trust and adoption.</p>
        <p>Third, control variables, such as age and chronic diseases, correlated with trust and adoption intention toward mHealth services. In terms of age, older individuals are more likely to trust mHealth services compared with the young individuals. This result is in accordance with that of several studies. For example, Guo et al found that the influence of personalization and privacy concerns on trust toward mHealth was different between old and young individuals [<xref ref-type="bibr" rid="ref13">13</xref>]. Morris and Venkatesh also concluded that young individual’s attitudes had a greater influence on their decisions regarding the use of technology, whereas the individuals were more easily influenced by subjective norms and perceived adoption control [<xref ref-type="bibr" rid="ref65">65</xref>]. In terms of chronic diseases, patients with chronic disease were more likely to adopt mHealth services compared with those without them. A possible explanation is that chronic condition usually requires patients to monitor their health instantly, and mHealth services perform well in addressing this problem. This finding is also consistent with that of an earlier study, which showed that a respondent’s health status can moderate the relationship between trust and an individual’s intention of using mHealth [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
      </sec>
      <sec>
        <title>Implications and Limitations</title>
        <p>On the basis of the TAM and perceived risks, we built an mHealth service adoption model and further tested the model via a cross-sectional study on patients from 3 large hospitals in China. This study has several implications. First, we empirically tested the effects of perceived usefulness, perceived ease of use, privacy risk, performance risk, and legal concern on trust and adoption intention toward mHealth services. The findings supported the effect of perceived risk, trust, and adoption intention on the use of mHealth services. Second, we added several control variables to the research model, which include gender, age, and chronic diseases, and results showed that age and chronic diseases affect an individual’s trust and adoption intention. Although the influence of age and gender on people’s technology adoption behavior has been extensively studied, only few studies have focused on the effects of chronic diseases. This study may serve as a valuable reference for future studies on the effect of chronic diseases on the adoption of mHealth services in China. Third, the empirical results highlight the significant effect of perceived usefulness and perceived ease of use on an individual’s adoption intention and the significant influence of privacy risk and performance risk on trust and adoption intention. These findings may offer practical suggestions for the developers of mHealth services as well as the enterprises working in the mHealth industry. For example, the flow of the mHealth services can be simplified or specific tutorials or videos can be provided. Regarding the risk concerns, the security issue is always the focus of reducing the potential risk perceived by the users.</p>
        <p>The study has its own limitations. First, this research was conducted in the context of China’s mHealth services. Thus, the results may not be generalized to other countries and regions. Second, the proposed research model was based on the TAM and perceived risk, and the variance rate explained in the model was 48.9%. Other important factors that are associated with the adoption intention toward mHealth may have been overlooked in this study. Future research can incorporate relevant variables to increase the explanatory power of the research model. Another limitation of this study is its small sample size. We might not have a representative sample of patients who intended to use mHealth services in China. Researchers should exercise caution when citing our results.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This study proposed an extended TAM research model using the concept of perceived risk to study the determinants of trust and adoption intention toward mHealth. The results corroborated that trust, perceived usefulness, and perceived ease of use positively correlated with adoption intention. Privacy and performance risks negatively correlated with trust and adoption intention toward mHealth services. In terms of the control variables, we confirmed that age has a significant influence on an individual’s trust and that chronic diseases can be an important predictor for mHealth service adoption. These findings are conducive to future research on mHealth service adoption.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Questionnaire: Measurement of the major constructs.</p>
        <media xlink:href="mhealth_v6i8e172_app1.pdf" xlink:title="PDF File (Adobe PDF File), 29KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AGFI</term>
          <def>
            <p>adjusted goodness of fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CFI</term>
          <def>
            <p>comparative fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">GFI</term>
          <def>
            <p>goodness of fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">IFI</term>
          <def>
            <p>incremental fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">NFI</term>
          <def>
            <p>normed incremental fit index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">RMSEA</term>
          <def>
            <p>Root Mean Square Error of Approximation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">TAM</term>
          <def>
            <p>technology acceptance model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">UTAUT</term>
          <def>
            <p>unified theory of acceptance and use of technology</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study was supported by the National Natural Science Foundation of China (No.71671073).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Iwaya</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Gomes</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Simplício</surname>
            <given-names>M A</given-names>
          </name>
          <name name-style="western">
            <surname>Carvalho</surname>
            <given-names>T C M B</given-names>
          </name>
          <name name-style="western">
            <surname>Dominicini</surname>
            <given-names>C K</given-names>
          </name>
          <name name-style="western">
            <surname>Sakuragui</surname>
            <given-names>R R M</given-names>
          </name>
          <name name-style="western">
            <surname>Rebelo</surname>
            <given-names>M S</given-names>
          </name>
          <name name-style="western">
            <surname>Gutierrez</surname>
            <given-names>M A</given-names>
          </name>
          <name name-style="western">
            <surname>Näslund</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Håkansson</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Mobile health in emerging countries: a survey of research initiatives in Brazil</article-title>
        <source>Int J Med Inform</source>  
        <year>2013</year>  
        <month>05</month>  
        <volume>82</volume>  
        <issue>5</issue>  
        <fpage>283</fpage>  
        <lpage>98</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2013.01.003</pub-id>
        <pub-id pub-id-type="medline">23410658</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(13)00014-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Akter</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>D'Ambra</surname>
            <given-names>JP</given-names>
          </name>
        </person-group>
        <article-title>Service quality of mHealth platforms: developmentvalidation of a hierarchical model using PLS</article-title>
        <source>Electronic Markets</source>  
        <year>2010</year>  
        <fpage>20</fpage>  
        <lpage>227</lpage>  
        <pub-id pub-id-type="doi">10.1007/s12525-010-0043-x</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Consulting</surname>
            <given-names>VW</given-names>
          </name>
        </person-group>
        <article-title>mHealth for development: the opportunity of mobile technology for healthcare in the developing world</article-title>
        <source>Washington DcBerkshire, UK</source>  
        <year>2009</year> </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Akter</surname>
            <given-names>SP</given-names>
          </name>
        </person-group>
        <article-title>mHealth-an ultimate platform to serve the unserved</article-title>
        <source>Yearbook of medical informatics</source>  
        <year>2010</year>  
        <fpage>94</fpage>  
        <lpage>100</lpage>  
        <pub-id pub-id-type="doi">10.1055/s-0038-1638697</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tachakra</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Istepanian</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Song</surname>
            <given-names>Y H</given-names>
          </name>
        </person-group>
        <article-title>Mobile e-health: the unwired evolution of telemedicine</article-title>
        <source>Telemed J E Health</source>  
        <year>2003</year>  
        <volume>9</volume>  
        <issue>3</issue>  
        <fpage>247</fpage>  
        <lpage>57</lpage>  
        <pub-id pub-id-type="doi">10.1089/153056203322502632</pub-id>
        <pub-id pub-id-type="medline">14611692</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Martino</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Ni</surname>
            <given-names>Q</given-names>
          </name>
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Multi-domain and privacy-aware role based access control in ehealth</article-title>
        <source>PervasiveHealthcare</source>  
        <year>2008</year>  
        <fpage>131</fpage>  
        <lpage>134</lpage> </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Brian</surname>
            <given-names>RD</given-names>
          </name>
          <name name-style="western">
            <surname>Ben-Zeev</surname>
            <given-names>Dror</given-names>
          </name>
        </person-group>
        <article-title>Mobile health (mHealth) for mental health in Asia: objectives, strategies, and limitations</article-title>
        <source>Asian J Psychiatr</source>  
        <year>2014</year>  
        <month>08</month>  
        <volume>10</volume>  
        <fpage>96</fpage>  
        <lpage>100</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ajp.2014.04.006</pub-id>
        <pub-id pub-id-type="medline">25042960</pub-id>
        <pub-id pub-id-type="pii">S1876-2018(14)00118-X</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kay</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Santos</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Takane</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>mHealth: New horizons for health through mobile technologies</article-title>
        <source>World Health Organization</source>  
        <year>2011</year>  
        <volume>64</volume>  
        <issue>7</issue>  
        <fpage>66</fpage>  
        <lpage>71</lpage> </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sugla</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Williams</surname>
            <given-names>AM</given-names>
          </name>
        </person-group>
        <article-title>Global markets for telemedicine technologies</article-title>
        <source>BCC Research</source>  
        <year>2012</year>  
        <volume>14</volume>  
        <fpage>1</fpage>  
        <lpage>5</lpage> </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Aitken</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Gauntlett</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>IMS Institute for Healthcare Informatics</source>  
        <year>2013</year>  
        <access-date>2018-08-16</access-date>
        <comment>Patient Apps for Improved Healthcare 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://moodle.univ-lille2.fr/pluginfile.php/215345/mod_resource/content/0/IIHI_Patient_Apps_Report.pdf">http://moodle.univ-lille2.fr/pluginfile.php/215345/mod_resource/content/0/IIHI_Patient_Apps_Report.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="71hxSsyXh"/></comment> </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Silva</surname>
            <given-names>BM</given-names>
          </name>
          <name name-style="western">
            <surname>Rodrigues</surname>
            <given-names>JJ</given-names>
          </name>
          <name name-style="western">
            <surname>de la Torre Díez</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>López-Coronado</surname>
            <given-names>Miguel</given-names>
          </name>
          <name name-style="western">
            <surname>Saleem</surname>
            <given-names>Kashif</given-names>
          </name>
        </person-group>
        <article-title>Mobile-health: A review of current state in 2015</article-title>
        <source>J Biomed Inform</source>  
        <year>2015</year>  
        <month>08</month>  
        <volume>56</volume>  
        <fpage>265</fpage>  
        <lpage>72</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(15)00113-6"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2015.06.003</pub-id>
        <pub-id pub-id-type="medline">26071682</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(15)00113-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Pathfinder-lights mobile health</article-title>
        <source>Health Daily</source>  
        <year>2014</year> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Guo</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>The privacy-personalization paradox in mHealth services acceptance of different age groups</article-title>
        <source>Electronic Commerce Research and Applications</source>  
        <year>2016</year>  
        <volume>16</volume>  
        <fpage>55</fpage>  
        <lpage>65</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.elerap.2015.11.001</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Marzano</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Bardill</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Fields</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>The application of mHealth to mental health: opportunities and challenges</article-title>
        <source>The lancet Psychiatry</source>  
        <year>2015</year>  
        <volume>2</volume>  
        <issue>10</issue>  
        <fpage>942</fpage>  
        <lpage>948</lpage>  
        <pub-id pub-id-type="doi">10.1016/S2215-0366(15)00268-0</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Liang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks</article-title>
        <source>Journal of Communications and Networks</source>  
        <year>2011</year>  
        <volume>13</volume>  
        <issue>2</issue>  
        <fpage>102</fpage>  
        <lpage>112</lpage>  
        <pub-id pub-id-type="doi">10.1109/JCN.2011.6157409</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lv</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Zhao</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Liang</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Dong</surname>
            <given-names>Hangming</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Laiyu</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>Dandan</given-names>
          </name>
          <name name-style="western">
            <surname>Cai</surname>
            <given-names>Shaoxi</given-names>
          </name>
        </person-group>
        <article-title>A mobile phone short message service improves perceived control of asthma: a randomized controlled trial</article-title>
        <source>Telemed J E Health</source>  
        <year>2012</year>  
        <volume>18</volume>  
        <issue>6</issue>  
        <fpage>420</fpage>  
        <lpage>6</lpage>  
        <pub-id pub-id-type="doi">10.1089/tmj.2011.0218</pub-id>
        <pub-id pub-id-type="medline">22667695</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Deng</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Mo</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Comparison of the middle-aged and older users' adoption of mobile health services in China</article-title>
        <source>Int J Med Inform</source>  
        <year>2014</year>  
        <month>03</month>  
        <volume>83</volume>  
        <issue>3</issue>  
        <fpage>210</fpage>  
        <lpage>224</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2013.12.002</pub-id>
        <pub-id pub-id-type="medline">24388129</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(13)00249-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lim</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Xue</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Yen</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>Leanne</given-names>
          </name>
          <name name-style="western">
            <surname>Chan</surname>
            <given-names>Hock Chuan</given-names>
          </name>
          <name name-style="western">
            <surname>Tai</surname>
            <given-names>Bee Choo</given-names>
          </name>
          <name name-style="western">
            <surname>Duh</surname>
            <given-names>Henry Been Lirn</given-names>
          </name>
          <name name-style="western">
            <surname>Choolani</surname>
            <given-names>Mahesh</given-names>
          </name>
        </person-group>
        <article-title>A study on Singaporean women's acceptance of using mobile phones to seek health information</article-title>
        <source>Int J Med Inform</source>  
        <year>2011</year>  
        <month>12</month>  
        <volume>80</volume>  
        <issue>12</issue>  
        <fpage>e189</fpage>  
        <lpage>202</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2011.08.007</pub-id>
        <pub-id pub-id-type="medline">21956003</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(11)00171-7</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Khatun</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Heywood</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Ray</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Hanifi</surname>
            <given-names>S M A</given-names>
          </name>
          <name name-style="western">
            <surname>Bhuiya</surname>
            <given-names>Abbas</given-names>
          </name>
          <name name-style="western">
            <surname>Liaw</surname>
            <given-names>Siaw-Teng</given-names>
          </name>
        </person-group>
        <article-title>Determinants of readiness to adopt mHealth in a rural community of Bangladesh</article-title>
        <source>Int J Med Inform</source>  
        <year>2015</year>  
        <month>10</month>  
        <volume>84</volume>  
        <issue>10</issue>  
        <fpage>847</fpage>  
        <lpage>56</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2015.06.008</pub-id>
        <pub-id pub-id-type="medline">26194141</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(15)30015-0</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wu</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>JY</given-names>
          </name>
          <name name-style="western">
            <surname>Fu</surname>
            <given-names>CY</given-names>
          </name>
        </person-group>
        <article-title>The adoption of mobile healthcare by hospital's professionals: An integrative perspective</article-title>
        <source>Decision support systems</source>  
        <year>2011</year>  
        <volume>51</volume>  
        <issue>3</issue>  
        <fpage>587</fpage>  
        <lpage>596</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2011.03.003</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Alaiad</surname>
            <given-names>AL</given-names>
          </name>
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>Lina</given-names>
          </name>
        </person-group>
        <article-title>The determinants of home healthcare robots adoption: an empirical investigation</article-title>
        <source>Int J Med Inform</source>  
        <year>2014</year>  
        <month>11</month>  
        <volume>83</volume>  
        <issue>11</issue>  
        <fpage>825</fpage>  
        <lpage>40</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2014.07.003</pub-id>
        <pub-id pub-id-type="medline">25132284</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(14)00138-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>FD</given-names>
          </name>
        </person-group>
        <article-title>Perceived usefulness, perceived ease of use, and user acceptance of information technology</article-title>
        <source>Mis Quarterly</source>  
        <year>1989</year>  
        <fpage>319</fpage>  
        <lpage>340</lpage>  
        <pub-id pub-id-type="doi">10.2307/249008</pub-id></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fishbein</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Ajzen</surname>
            <given-names>I</given-names>
          </name>
        </person-group>
        <source>Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research</source>  
        <year>1975</year>  
        <publisher-loc>Francisco</publisher-loc>
        <publisher-name>Addison Wesley</publisher-name></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Holden</surname>
            <given-names>RB</given-names>
          </name>
          <name name-style="western">
            <surname>Karsh</surname>
            <given-names>Ben-Tzion</given-names>
          </name>
        </person-group>
        <article-title>The technology acceptance model: its past and its future in health care</article-title>
        <source>J Biomed Inform</source>  
        <year>2010</year>  
        <month>02</month>  
        <volume>43</volume>  
        <issue>1</issue>  
        <fpage>159</fpage>  
        <lpage>72</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(09)00096-3"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2009.07.002</pub-id>
        <pub-id pub-id-type="medline">19615467</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(09)00096-3</pub-id>
        <pub-id pub-id-type="pmcid">PMC2814963</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>FD</given-names>
          </name>
        </person-group>
        <article-title>A theoretical extension of the technology acceptance model: Four longitudinal field studies</article-title>
        <source>Management science</source>  
        <year>2000</year>  
        <volume>46</volume>  
        <issue>2</issue>  
        <fpage>186</fpage>  
        <lpage>204</lpage>  
        <pub-id pub-id-type="doi">10.1287/mnsc.46.2.186.11926</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Morris</surname>
            <given-names>MG</given-names>
          </name>
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>GB</given-names>
          </name>
          <collab>et al</collab>
        </person-group>
        <article-title>User acceptance of information technology: Toward a unified view</article-title>
        <source>Mis Quarterly</source>  
        <year>2003</year>  
        <fpage>425</fpage>  
        <lpage>478</lpage>  
        <pub-id pub-id-type="doi">10.2307/30036540</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Association</surname>
            <given-names>AR</given-names>
          </name>
          <name name-style="western">
            <surname>Hancock</surname>
            <given-names>RS</given-names>
          </name>
        </person-group>
        <article-title>Dynamic marketing for a changing world</article-title>
        <source>American Marketing Association</source>  
        <year>1960</year> </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cunningham</surname>
            <given-names>SM</given-names>
          </name>
        </person-group>
        <article-title>The major dimensions of perceived risk Risk taking and information handling in consumer behavior</article-title>
        <source>Graduate School of Business Administration</source>  
        <year>1967</year> </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Peter</surname>
            <given-names>JP</given-names>
          </name>
          <name name-style="western">
            <surname>Ryan</surname>
            <given-names>MJ</given-names>
          </name>
        </person-group>
        <article-title>An investigation of perceived risk at the brand level</article-title>
        <source>Journal of marketing research</source>  
        <year>1976</year>  
        <fpage>184</fpage>  
        <lpage>188</lpage> </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mitchell</surname>
            <given-names>VW</given-names>
          </name>
        </person-group>
        <article-title>Consumer perceived risk: conceptualisations and models</article-title>
        <source>European Journal of marketing</source>  
        <year>1999</year>  
        <volume>33</volume>  
        <issue>1/2</issue>  
        <fpage>163</fpage>  
        <lpage>195</lpage>  
        <pub-id pub-id-type="doi">10.1108/03090569910249229</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jacoby</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Kaplan</surname>
            <given-names>LB</given-names>
          </name>
        </person-group>
        <article-title>The components of perceived risk</article-title>
        <source>ACR Special Volumes</source>  
        <year>1972</year> </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Stone</surname>
            <given-names>RN</given-names>
          </name>
          <name name-style="western">
            <surname>Grønhaug</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Perceived risk: Further considerations for the marketing discipline</article-title>
        <source>European Journal of marketing</source>  
        <year>1993</year>  
        <volume>27</volume>  
        <issue>3</issue>  
        <fpage>39</fpage>  
        <lpage>50</lpage>  
        <pub-id pub-id-type="doi">10.1108/03090569310026637</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>MC</given-names>
          </name>
        </person-group>
        <article-title>Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit</article-title>
        <source>Electronic Commerce Research and Applications</source>  
        <year>2009</year>  
        <volume>8</volume>  
        <issue>3</issue>  
        <fpage>130</fpage>  
        <lpage>141</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.elerap.2008.11.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>DJ</given-names>
          </name>
          <name name-style="western">
            <surname>Ferrin</surname>
            <given-names>DL</given-names>
          </name>
          <name name-style="western">
            <surname>Rao</surname>
            <given-names>HR</given-names>
          </name>
        </person-group>
        <article-title>A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents</article-title>
        <source>Decision support systems</source>  
        <year>2008</year>  
        <volume>44</volume>  
        <issue>2</issue>  
        <fpage>544</fpage>  
        <lpage>564</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2007.07.001</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Egea</surname>
            <given-names>JMO</given-names>
          </name>
          <name name-style="western">
            <surname>González</surname>
            <given-names>MVR</given-names>
          </name>
        </person-group>
        <article-title>Explaining physicians' acceptance of EHCR systems: an extension of TAM with trust and risk factors</article-title>
        <source>Computers in Human Behavior</source>  
        <year>2011</year>  
        <volume>27</volume>  
        <issue>1</issue>  
        <fpage>319</fpage>  
        <lpage>332</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.chb.2010.08.010</pub-id></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Yu</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Zo</surname>
            <given-names>H</given-names>
          </name>
          <collab>et al</collab>
        </person-group>
        <article-title>User acceptance of wearable devices: An extended perspective of perceived value</article-title>
        <source>Telematics and Informatics</source>  
        <year>2016</year>  
        <volume>33</volume>  
        <issue>2</issue>  
        <fpage>256</fpage>  
        <lpage>269</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.tele.2015.08.007</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Deng</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Hinz</surname>
            <given-names>O</given-names>
          </name>
        </person-group>
        <article-title>The health information seeking and usage behavior intention of Chinese consumers through mobile phones</article-title>
        <source>Information Technology &#38; People</source>  
        <year>2015</year>  
        <volume>28</volume>  
        <issue>2</issue>  
        <fpage>405</fpage>  
        <lpage>423</lpage>  
        <pub-id pub-id-type="doi">10.1108/ITP-03-2014-0053</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Doney</surname>
            <given-names>PM</given-names>
          </name>
          <name name-style="western">
            <surname>Cannon</surname>
            <given-names>JP</given-names>
          </name>
          <name name-style="western">
            <surname>Mullen</surname>
            <given-names>MR</given-names>
          </name>
        </person-group>
        <article-title>Understanding the influence of national culture on the development of trust</article-title>
        <source>Academy of management review</source>  
        <year>1998</year>  
        <volume>23</volume>  
        <issue>3</issue>  
        <fpage>601</fpage>  
        <lpage>620</lpage>  
        <pub-id pub-id-type="doi">10.5465/amr.1998.926629</pub-id></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>Q</given-names>
          </name>
          <name name-style="western">
            <surname>Pang</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>L</given-names>
          </name>
          <collab>et al</collab>
        </person-group>
        <article-title>Exploring consumer perceived risk and trust for online payments: An empirical study in China's younger generation</article-title>
        <source>Computers in Human Behavior</source>  
        <year>2015</year>  
        <volume>50</volume>  
        <fpage>9</fpage>  
        <lpage>24</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.chb.2015.03.058</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mayer</surname>
            <given-names>RC</given-names>
          </name>
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>JH</given-names>
          </name>
          <name name-style="western">
            <surname>Schoorman</surname>
            <given-names>FD</given-names>
          </name>
        </person-group>
        <article-title>An integrative model of organizational trust</article-title>
        <source>Academy of management review</source>  
        <year>1995</year>  
        <volume>20</volume>  
        <issue>3</issue>  
        <fpage>709</fpage>  
        <lpage>734</lpage>  
        <pub-id pub-id-type="doi">10.5465/amr.1995.9508080335</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chaudhry</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Wu</surname>
            <given-names>S</given-names>
          </name>
          <collab>et al</collab>
        </person-group>
        <article-title>Systematic review: impact of health information technology on quality, efficiency, and costs of medical care</article-title>
        <source>Annals of internal medicine</source>  
        <year>2006</year>  
        <volume>144</volume>  
        <issue>10</issue>  
        <fpage>742</fpage>  
        <lpage>752</lpage> </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>FD</given-names>
          </name>
          <name name-style="western">
            <surname>Bagozzi</surname>
            <given-names>RPWarshaw PR</given-names>
          </name>
        </person-group>
        <article-title>User acceptance of computer technology: a comparison of two theoretical models</article-title>
        <source>Management science</source>  
        <year>1989</year>  
        <volume>35</volume>  
        <issue>8</issue>  
        <fpage>982</fpage>  
        <lpage>1003</lpage>  
        <pub-id pub-id-type="doi">10.1287/mnsc.35.8.982</pub-id></nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Patrick</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Information technology and the future of preventive medicine: potential, pitfalls, and policy</article-title>
        <source>American Journal of Preventive Medicine</source>  
        <year>2000</year>  
        <volume>19</volume>  
        <issue>2</issue>  
        <fpage>132</fpage>  
        <lpage>135</lpage> </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gu</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>SC</given-names>
          </name>
          <name name-style="western">
            <surname>Suh</surname>
            <given-names>YH</given-names>
          </name>
        </person-group>
        <article-title>Determinants of behavioral intention to mobile banking</article-title>
        <source>Expert Systems with Applications</source>  
        <year>2009</year>  
        <volume>36</volume>  
        <issue>9</issue>  
        <fpage>11605</fpage>  
        <lpage>11616</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.eswa.2009.03.024</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Luo</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services</article-title>
        <source>Decision support systems</source>  
        <year>2010</year>  
        <volume>49</volume>  
        <issue>2</issue>  
        <fpage>222</fpage>  
        <lpage>234</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2010.02.008</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lim</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>Consumers' perceived riskources versus consequences</article-title>
        <source>Electronic Commerce Research and Applications</source>  
        <year>2003</year>  
        <volume>2</volume>  
        <issue>3</issue>  
        <fpage>216</fpage>  
        <lpage>228</lpage>  
        <pub-id pub-id-type="doi">10.1016/S1567-4223(03)00025-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Deng</surname>
            <given-names>Zhaohua</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Shan</given-names>
          </name>
        </person-group>
        <article-title>Understanding consumer health information-seeking behavior from the perspective of the risk perception attitude framework and social support in mobile social media websites</article-title>
        <source>Int J Med Inform</source>  
        <year>2017</year>  
        <month>12</month>  
        <volume>105</volume>  
        <fpage>98</fpage>  
        <lpage>109</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2017.05.014</pub-id>
        <pub-id pub-id-type="medline">28750916</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(17)30163-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Burton-Jones</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Hubona</surname>
            <given-names>GS</given-names>
          </name>
        </person-group>
        <article-title>The mediation of external variables in the technology acceptance model</article-title>
        <source>Information &#38; Management</source>  
        <year>2006</year>  
        <month>08</month>  
        <volume>43</volume>  
        <issue>6</issue>  
        <fpage>706</fpage>  
        <lpage>717</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2006.03.007</pub-id></nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mun</surname>
            <given-names>YY</given-names>
          </name>
          <name name-style="western">
            <surname>Hwang</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Predicting the use of web-based information systemslf-efficacy, enjoyment, learning goal orientation, and the technology acceptance model</article-title>
        <source>International journal of human-computer studies</source>  
        <year>2003</year>  
        <volume>59</volume>  
        <issue>4</issue>  
        <fpage>431</fpage>  
        <lpage>449</lpage>  
        <pub-id pub-id-type="doi">10.1016/S1071-5819(03)00114-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Parkes</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>The effect of task-individual-technology fit on user attitude and performance: An experimental investigation</article-title>
        <source>Decision support systems</source>  
        <year>2013</year>  
        <volume>54</volume>  
        <issue>2</issue>  
        <fpage>997</fpage>  
        <lpage>1009</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2012.10.025</pub-id></nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Featherman</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Pavlou</surname>
            <given-names>PA</given-names>
          </name>
        </person-group>
        <article-title>Predicting e-services adoption: a perceived risk facets perspective</article-title>
        <source>International journal of human-computer studies</source>  
        <year>2003</year>  
        <volume>59</volume>  
        <issue>4</issue>  
        <fpage>451</fpage>  
        <lpage>474</lpage>  
        <pub-id pub-id-type="doi">10.1016/S1071-5819(03)00111-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nepomuceno</surname>
            <given-names>MV</given-names>
          </name>
          <name name-style="western">
            <surname>Laroche</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Richard</surname>
            <given-names>MO</given-names>
          </name>
        </person-group>
        <article-title>How to reduce perceived risk when buying online: The interactions between intangibility, product knowledge, brand familiarity, privacy and security concerns</article-title>
        <source>Journal of Retailing and Consumer Services</source>  
        <year>2014</year>  
        <volume>21</volume>  
        <issue>4</issue>  
        <fpage>619</fpage>  
        <lpage>629</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.jretconser.2013.11.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Martin</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Mortimer</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Andrews</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Re-examining online customer experience to include purchase frequency and perceived risk</article-title>
        <source>Journal of Retailing and Consumer Services</source>  
        <year>2015</year>  
        <volume>25</volume>  
        <fpage>81</fpage>  
        <lpage>95</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.jretconser.2015.03.008</pub-id></nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mun</surname>
            <given-names>YY</given-names>
          </name>
          <name name-style="western">
            <surname>Yoon</surname>
            <given-names>JJ</given-names>
          </name>
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>JM</given-names>
          </name>
        </person-group>
        <article-title>Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk</article-title>
        <source>Decision support systems</source>  
        <year>2013</year>  
        <volume>55</volume>  
        <issue>1</issue>  
        <fpage>284</fpage>  
        <lpage>295</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2013.01.029</pub-id></nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wu</surname>
            <given-names>JH</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>SC</given-names>
          </name>
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>LM</given-names>
          </name>
        </person-group>
        <article-title>Mobile computing acceptance factors in the healthcare industry: A structural equation model</article-title>
        <source>International journal of medical informatics</source>  
        <year>2007</year>  
        <volume>76</volume>  
        <issue>1</issue>  
        <fpage>66</fpage>  
        <lpage>77</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2006.06.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Anderson</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Gerbing</surname>
            <given-names>DW</given-names>
          </name>
        </person-group>
        <article-title>Structural equation modeling in practice: A review and recommended two-step approach</article-title>
        <source>Psychological bulletin</source>  
        <year>1988</year>  
        <volume>103</volume>  
        <issue>3</issue>  
        <fpage>411</fpage> </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>How the user liaison's understanding of development processes moderates the effects of user-related and project management risks on IT project performance</article-title>
        <source>Information &#38; Management</source>  
        <year>2016</year>  
        <volume>53</volume>  
        <issue>1</issue>  
        <fpage>122</fpage>  
        <lpage>134</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2015.09.004</pub-id></nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yan</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Knowledge sharing in online health communities: A social exchange theory perspective</article-title>
        <source>Information &#38; Management</source>  
        <year>2016</year>  
        <volume>53</volume>  
        <issue>5</issue>  
        <fpage>643</fpage>  
        <lpage>653</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2016.02.001</pub-id></nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Huang</surname>
            <given-names>TCK</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>CC</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>DC</given-names>
          </name>
        </person-group>
        <article-title>An empirical investigation of factors influencing the adoption of data mining tools</article-title>
        <source>International Journal of Information Management</source>  
        <year>2012</year>  
        <volume>32</volume>  
        <issue>3</issue>  
        <fpage>257</fpage>  
        <lpage>270</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2011.11.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Han</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Dang</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Meng</surname>
            <given-names>Fanbo</given-names>
          </name>
          <name name-style="western">
            <surname>Guo</surname>
            <given-names>Xitong</given-names>
          </name>
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>Jiayue</given-names>
          </name>
        </person-group>
        <article-title>User acceptance of mobile health services from users' perspectives: The role of self-efficacy and response-efficacy in technology acceptance</article-title>
        <source>Inform Health Soc Care</source>  
        <year>2017</year>  
        <month>03</month>  
        <volume>42</volume>  
        <issue>2</issue>  
        <fpage>194</fpage>  
        <lpage>206</lpage>  
        <pub-id pub-id-type="doi">10.1080/17538157.2016.1200053</pub-id>
        <pub-id pub-id-type="medline">27564428</pub-id></nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hu</surname>
            <given-names>PJ</given-names>
          </name>
          <name name-style="western">
            <surname>Chau</surname>
            <given-names>PY</given-names>
          </name>
          <name name-style="western">
            <surname>Sheng</surname>
            <given-names>ORL</given-names>
          </name>
          <collab>et al</collab>
        </person-group>
        <article-title>Examining the technology acceptance model using physician acceptance of telemedicine technology</article-title>
        <source>Journal of management information systems</source>  
        <year>1999</year>  
        <volume>16</volume>  
        <issue>2</issue>  
        <fpage>91</fpage>  
        <lpage>112</lpage>  
        <pub-id pub-id-type="doi">10.1080/07421222.1999.11518247</pub-id></nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Guo</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Guo</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Lai</surname>
            <given-names>Kee-Hung</given-names>
          </name>
        </person-group>
        <article-title>Nonlinearities in personalization-privacy paradox in mHealth adoption: the mediating role of perceived usefulness and attitude</article-title>
        <source>Technol Health Care</source>  
        <year>2014</year>  
        <volume>22</volume>  
        <issue>4</issue>  
        <fpage>515</fpage>  
        <lpage>29</lpage>  
        <pub-id pub-id-type="doi">10.3233/THC-140811</pub-id>
        <pub-id pub-id-type="medline">24763205</pub-id>
        <pub-id pub-id-type="pii">9575640435747086</pub-id></nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Han</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Determinants of adoption of mobile health services</article-title>
        <source>Online Information Review</source>  
        <year>2015</year>  
        <volume>39</volume>  
        <issue>4</issue>  
        <fpage>556</fpage>  
        <lpage>573</lpage>  
        <pub-id pub-id-type="doi">10.1108/OIR-01-2015-0007</pub-id></nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nisha</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Iqbal</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Rifat</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Mobile Health Services: A New Paradigm for Health Care Systems</article-title>
        <source>International Journal of Asian Business and Information Management (IJABIM)</source>  
        <year>2015</year>  
        <volume>6</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <lpage>17</lpage>  
        <pub-id pub-id-type="doi">10.4018/IJABIM.2015010101</pub-id></nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Morris</surname>
            <given-names>MG</given-names>
          </name>
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>Age differences in technology adoption decisions: Implications for a changing work force</article-title>
        <source>Personnel psychology</source>  
        <year>2000</year>  
        <volume>53</volume>  
        <issue>2</issue>  
        <fpage>375</fpage>  
        <lpage>403</lpage> </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
