<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v7i1e12269</article-id>
    <article-id pub-id-type="pmid">30622092</article-id>
    <article-id pub-id-type="doi">10.2196/12269</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Investigating the Adoption of Mobile Health Services by Elderly Users: Trust Transfer Model and Survey Study</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Zhang</surname>
          <given-names>Xiaofei</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Guo</surname>
          <given-names>Feng</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Leightley</surname>
          <given-names>Daniel</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" equal-contrib="yes">
        <name name-style="western">
          <surname>Meng</surname>
          <given-names>Fanbo</given-names>
        </name>
        <degrees>MSc, PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-4992-3802</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib2" corresp="yes" equal-contrib="yes">
      <name name-style="western">
        <surname>Guo</surname>
        <given-names>Xitong</given-names>
      </name>
      <degrees>PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>eHealth Research Institute</institution>
        <institution>School of Management</institution>
        <institution>Harbin Institute of Technology</institution>
        <addr-line>92 Xidazhi Street</addr-line>
        <addr-line>Nangang District</addr-line>
        <addr-line>Harbin,</addr-line>
        <country>China</country>
        <phone>86 451 86414022</phone>
        <email>xitongguo@hit.edu.cn</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-9569-0299</ext-link></contrib>
      <contrib contrib-type="author" id="contrib3" equal-contrib="yes">
        <name name-style="western">
          <surname>Peng</surname>
          <given-names>Zeyu</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff3" ref-type="aff">3</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-3091-1537</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4" equal-contrib="yes">
        <name name-style="western">
          <surname>Lai</surname>
          <given-names>Kee-Hung</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9296-0882</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib5" equal-contrib="yes">
        <name name-style="western">
          <surname>Zhao</surname>
          <given-names>Xinli</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-7634-6724</ext-link>
      </contrib>
    </contrib-group>
    <aff id="aff1">
    <label>1</label>
    <institution>eHealth Research Institute</institution>
    <institution>School of Management</institution>  
    <institution>Harbin Institute of Technology</institution>  
    <addr-line>Harbin</addr-line>
    <country>China</country></aff>
    <aff id="aff2">
    <label>2</label>
    <institution>Logistics and Maritime Studies</institution>
    <institution>Faculty of Business</institution>  
    <institution>Hong Kong Polytechnic University</institution>  
    <addr-line>Hong Kong</addr-line>
    <country>China (Hong Kong)</country></aff>
    <aff id="aff3">
    <label>3</label>
    <institution>Department of Information Systems</institution>
    <institution>School of Business</institution>  
    <institution>East China University of Science and Technology</institution>  
    <addr-line>Shanghai</addr-line>
    <country>China</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Xitong Guo 
      <email>xitongguo@hit.edu.cn</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>01</month><year>2019</year></pub-date>
    <pub-date pub-type="epub">
      <day>08</day>
      <month>01</month>
      <year>2019</year>
    </pub-date>
    <volume>7</volume>
    <issue>1</issue>
    <elocation-id>e12269</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>20</day>
        <month>9</month>
        <year>2018</year>
      </date>
      <date date-type="rev-request">
        <day>11</day>
        <month>10</month>
        <year>2018</year>
      </date>
      <date date-type="rev-recd">
        <day>19</day>
        <month>11</month>
        <year>2018</year>
      </date>
      <date date-type="accepted">
        <day>9</day>
        <month>12</month>
        <year>2018</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Fanbo Meng, Xitong Guo, Zeyu Peng, Kee-Hung Lai, Xinli Zhao. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 08.01.2019.</copyright-statement>
    <copyright-year>2019</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://mhealth.jmir.org/2019/1/e12269/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>Although elderly users comprise a major user group in the field of mobile health (mHealth) services, their adoption rate of such services is relatively low compared with their use of traditional health services. Increasing the adoption rate of mHealth services among elderly users is beneficial to the aging process.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>This study aimed to examine the determinants of mHealth service use intentions using a trust transfer model among elderly users facing declining physiological conditions and lacking support from hospitals.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>A survey comprising 395 users aged 60 years and above was conducted in China to validate our research model and hypotheses.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>The results reveal that (1) trust in mHealth services positively influences use intentions, (2) trust in offline health services positively influences trust in mHealth services, (3) declining physiological conditions strengthen the effects of trust in offline health services regarding trust in mHealth services, (4) support from hospitals weakens the effects of trust in mHealth services on use intentions, and (5) the relationship between trust in offline health services and intention to use mHealth services is partially mediated by trust in mHealth services. The independent variables and moderators collectively explain a 48.3% variance in the use intention of mHealth services.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>We conclude that the trust transfer theory is useful in explaining the development of initial trust in mHealth services. In addition, declining physiological conditions and support from hospitals are important factors for investigating the adoption of mHealth services among elderly users.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>mobile health</kwd>
      <kwd>trust</kwd>
      <kwd>health services for the elderly</kwd>
      <kwd>adoption</kwd>
      <kwd>health behavior</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>With advances in health care assisting more people to live longer, the number of people aged over 60 years is projected to reach nearly 2.1 billion, representing 22% of the world’s total population [<xref ref-type="bibr" rid="ref1">1</xref>]. In China, the proportion of the population aged 60 years and above will increase from 12.4% (168 million) in 2010 to 28% (402 million) in 2040 [<xref ref-type="bibr" rid="ref2">2</xref>]. This demographic change further intensifies the conflict between the medical care demands of elders and the limited medical care resources. Indeed, mobile health (mHealth) has the potential to enable the elderly to experience longer and healthier lives by transforming health care services and clinical interventions for elderly users [<xref ref-type="bibr" rid="ref3">3</xref>]. mHealth services are believed to be beneficial for elderly people because they can bring about multiple positive outcomes, such as health care costs savings, individually tailored health information and services, and a more effective health service process [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>]. Therefore, mHealth is regarded as an important approach of extending the traditional (ie, offline) health services and satisfying the medical demands of an increasingly aging population.</p>
        <p>However, older people are often found to be less innovative toward mHealth services [<xref ref-type="bibr" rid="ref6">6</xref>]. There is limited usage of mHealth services to manage chronic diseases among the elderly [<xref ref-type="bibr" rid="ref7">7</xref>]. In China, the development of mHealth services continues to remain at the infancy stage, and the adoption rate of such services among older people remains low [<xref ref-type="bibr" rid="ref8">8</xref>]. The low adoption rate of mHealth services by the elderly has prompted the Chinese government to reconsider their developing strategies, to encompass the rapidly growing number of elderly users to alleviate the pressures of the aging population. In addition, although the elderly could obtain great potential benefits by using health information technology (HIT), previous research has not examined the relationship between HIT use among elderly users from their use of health services [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Due to their unique physical and psychological characteristics, elderly users may need to expend much more effort and time familiarizing themselves with information technology (IT) than the younger user groups [<xref ref-type="bibr" rid="ref11">11</xref>]. In addition, declining physiological conditions [<xref ref-type="bibr" rid="ref12">12</xref>] and limited social resources [<xref ref-type="bibr" rid="ref13">13</xref>] are hurdles for elderly individuals in making health-related decisions independently. To serve the elderly population through mHealth services, service providers need to understand the behavior of this special group and the antecedents that influence their acceptance and usage of mHealth.</p>
        <p>Building user trust is the key to promoting the adoption of mHealth services by elderly users. Trust could alleviate uncertainties and risks when users encounter new IT or services (eg, purchasing books on the Web and mobile payment services) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. In this context, trust transfer is a means of building customer trust in an unknown target through a trusted party [<xref ref-type="bibr" rid="ref16">16</xref>]. Customer trust can be developed through trust transference from offline health care services, which are trusted by the elderly, to mHealth services with which they are not familiar. Although trust plays an important role in mHealth adoption, very few previous studies have investigated the development of trust in mHealth services [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. Furthermore, as mHealth services are developed based on the traditional service in a new context, that is, a mobile context, users’ perceptions on mHealth may be influenced by the offline traditional services, such as trust. However, research on the trust transfer from an offline context to a mobile channel is also underexplored in both the information system (IS) and health care fields. In addition, although considerable research on trust transfer has been conducted in the IS domain, inadequate research has been undertaken on trust transfer in mHealth research.</p>
        <p>Our study aims to develop a trust transfer model to investigate the adoption of mHealth services by the elderly and to address the following research question: To what extent is trust transfer a means of establishing the initial trust of elderly users in their adoption of mHealth services? In this study, based on the trust transfer theory, we incorporate both declining physiological conditions and support from hospitals into our research model to explore their moderating effects on the trust transfer process. To validate the research model and proposed hypotheses, a survey comprising 395 elderly users in China was conducted to analyze the research model.</p>
      </sec>
      <sec>
        <title>Literature Review and Hypotheses</title>
        <sec>
          <title>Trust Transfer</title>
          <p>Trust can develop through a transference process, suggesting that trust can be transferred from a trusted object to an unfamiliar object [<xref ref-type="bibr" rid="ref19">19</xref>]. Channels of trust transfer include the intrachannel and interchannel transfers [<xref ref-type="bibr" rid="ref20">20</xref>]. An intrachannel trust transfer is one where trust can be transferred within the same channel that is deemed as trustworthy. For example, trust transfer can occur either from offline to offline contexts or from Web to Web contexts. Stewart illustrated that trust can be transferred from a trusted hypertext link to an unfamiliar one on a website [<xref ref-type="bibr" rid="ref16">16</xref>]. In fact, Stewart also suggested that trust transfer may work based on a cognitive process that is based on the mere knowledge of the relationship between the trusted target and trusted source.</p>
          <p>On the other hand, interchannel trust transfer refers to trust transfers from one context to another, mainly from the offline to the Web channels or from the Web to mobile channels. Turel et al indicated that in a transfer from an offline to a Web channel, the e-customer service provider can improve user trust and use intention by associating itself with a known human service representative [<xref ref-type="bibr" rid="ref21">21</xref>]. Belanche et al purported that trust in offline public administration recommendations can be transferred to trust in the online public e-service [<xref ref-type="bibr" rid="ref22">22</xref>]. From the perspective of transfer from a Web to a mobile channel, the level of trust in internet payment services is positively associated with the initial trust in mobile payment services offered by the same company [<xref ref-type="bibr" rid="ref23">23</xref>]. Similarly, in a study on brokerage services, trust in an online environment is positively related to initial trust in a mobile environment [<xref ref-type="bibr" rid="ref20">20</xref>]. On their part, Wang et al studied the mobile e-word of mouth (eWOM) services and found that trust in Web services has a positive effect on trust in mobile services, thus influencing the intention to use mobile eWOM services [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
          <p>Offline health services are the pivotal source of health services for the elderly. These users’ prior experiences and familiarity with offline health services have resulted in the development of their deeply ingrained belief that offline health services are trustworthy. Accordingly, in the interchannel trust transfer context, we anticipate that trust in well-established offline health services would affect trust in corresponding mHealth services.</p>
          <p>Thus, we hypothesize the following:</p>
            <disp-formula>Hypothesis 1: Trust in offline health services is positively associated with trust in mHealth services.</disp-formula>
        </sec>
        <sec>
          <title>Trust in Mobile Health Services</title>
          <p>Prior research demonstrates that the conceptualizations of trust are diverse, incomplete, and inconsistent [<xref ref-type="bibr" rid="ref25">25</xref>]. Integrating with the shared characteristics of trust across different disciplines, Mayer defined trust as “the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party” [<xref ref-type="bibr" rid="ref26">26</xref>]. According to prior research, beliefs in competence, integrity, and benevolence lead to a general belief in trust and behavioral intentions [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. All these 3 main trusting beliefs are the trustee’s internal trust-related characteristics observed by the trustor, and these trusting beliefs are formatted in the cognitive process of a trustee’s attributes.</p>
          <p>As trust can reduce risks and uncertainties, trust plays a significant role in the adoption of a new IT [<xref ref-type="bibr" rid="ref29">29</xref>]. Prior studies underscore that trust is a significant prerequisite of social behavior and positively associated with users’ use intentions of an internet store [<xref ref-type="bibr" rid="ref27">27</xref>], purchasing books on the internet [<xref ref-type="bibr" rid="ref14">14</xref>], e-government services [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>], e-commerce [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>], and mobile payment [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
          <p>From the perspective of mHealth services, Guo et al found that trust in mHealth service providers enables the reduction of individuals’ privacy concerns and an increase in adoption intentions [<xref ref-type="bibr" rid="ref18">18</xref>]. Zhao et al indicated that trust is positively associated with the behavioral intention to use mHealth services [<xref ref-type="bibr" rid="ref35">35</xref>]. Deng et al demonstrated that patients’ trust positively affects the adoption intention of mHealth services [<xref ref-type="bibr" rid="ref36">36</xref>]. On the basis of their findings of the post adoption stage, Akter et al theoretically conceptualized trustworthiness (trusting belief) in mHealth service research and indicated that trustworthiness positively influences consumer trust (trusting intentions), which directly affects consumers’ continuance intentions [<xref ref-type="bibr" rid="ref17">17</xref>]. In a later research, Akter et al demonstrated that perceived trust positively affects satisfaction with mHealth services and continuance intention [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
          <p>As the mHealth service is a credence product and personalized service, trust plays a significant role in predicting individuals’ adoption intentions. Elderly users, in particular, have less experience with the use of mHealth services and encounter more difficulties in using this emerging technology. As health is a sensitive subject, these users may pay more attention to health services assessed through mobile channels.</p>
          <p>Thus, we hypothesize the following:</p>
          <disp-formula>Hypothesis 2: Trust in mHealth services is positively associated with the intention to use mHealth services.</disp-formula>
        </sec>
        <sec>
          <title>Declining Physiological Conditions</title>
          <p>Individuals’ physiological conditions (such as hearing, vision, speech, locomotion, and memory capabilities) are known to decline in the aging process, thus influencing their physical and cognitive capabilities [<xref ref-type="bibr" rid="ref38">38</xref>]. Timmermann demonstrated that the declining physical and cognitive capabilities may cause elders to experience considerably greater difficulty in the use of computers, and these declining physiological conditions can serve as internal controls or inhibiting conditions that increase the effort expectancy associated with IT use [<xref ref-type="bibr" rid="ref39">39</xref>]. Mathur indicated that age-related decline in physiological conditions will increase the elderly’s need for family assistance in coping with these declines and revealed that family assistance had a positive effect on the adoption of IT [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
          <p>Phang et al introduced new constructs that are used in gerontology and IS literature, comprising preference for human contact, self-actualization, and resource savings as antecedents of perceived usefulness, whereas computer anxiety, computing support, and declining physiological conditions reflect perceived ease of use in the research of e-government service use intentions [<xref ref-type="bibr" rid="ref12">12</xref>]. Heart and Kalderon demonstrated that cognitive and physical impairments that increase with age are negatively associated with health-related IT use [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
          <p>Xue et al integrated aging-specific constructs including perceived use resources, technology anxiety, and bio-physical age (perceived physical conditions) with the technology acceptance model to reveal that perceived use resources and technology anxiety were antecedents for perceived usefulness, whereas perceived physical conditions significantly influenced perceived ease of use [<xref ref-type="bibr" rid="ref41">41</xref>]. Deng et al found that elderly users’ aging characteristics, including declining physiological conditions, technology anxiety, and self-actualization needs, positively influence their use intentions of an mHealth service [<xref ref-type="bibr" rid="ref8">8</xref>].</p>
          <p>Therefore, declining physiological conditions may cause elderly users to expend greater energy on evaluating the competence, reliability, and dependability of mHealth services. Hence, elderly users are more likely to develop trust in mHealth services based on trust in offline health services.</p>
          <p>Thus, we hypothesize the following:</p>
            <disp-formula>Hypothesis 3: The relationship between trust in offline health services and trust in mHealth services will be stronger in the case of declining physiological conditions.</disp-formula>
        </sec>
        <sec>
          <title>Support From Hospitals</title>
          <p>On the basis of the previous literature on IT acceptance and usage, the source of support is mainly an organization [<xref ref-type="bibr" rid="ref42">42</xref>] or an expert user [<xref ref-type="bibr" rid="ref43">43</xref>]. An organization can offer managerial interventions and support resources to encourage users to accept IS and improve performance outcomes [<xref ref-type="bibr" rid="ref44">44</xref>]. In their study of personal computer usage, Compeau and Higgins observed that an organization’s support for computer users influences individuals’ judgments of self-efficacy because support and assistance from an organization assisted users in increasing their ability [<xref ref-type="bibr" rid="ref45">45</xref>]. Hoque and Sorwar found that elderly users believe an organizational support or technical infrastructure support positively affect their behavioral intentions toward mHealth services [<xref ref-type="bibr" rid="ref46">46</xref>]. In the context of the adoption of mHealth services, with support from hospitals, elderly users are able to efficiently evaluate the competence of mHealth services and develop trust in mHealth services. This leads to an intention to use mHealth services. When elderly users receive support from hospitals, they are more likely to develop a high level of trust in mHealth services.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Research model. mHealth: mobile health.</p>
            </caption>
            <graphic xlink:href="mhealth_v7i1e12269_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>Thus, we hypothesize the following:</p>
          <disp-quote>
            <p>Hypothesis 4: The relationship between trust in mHealth services and the intention to use mHealth services will be stronger when hospital support is provided.</p>
          </disp-quote>
          <p>In summary, this study proposed a trust transfer model to predict elderly users’ intentions to use mHealth services, as depicted in <xref ref-type="fig" rid="figure1">Figure 1</xref>. According to the trust transfer theory [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref47">47</xref>], trust in offline health care services positively influences trust in mHealth services. A declining physiological condition, as a salient variable of gerontology, influences the trust transfer process from an offline channel to a mobile channel. In addition, support from hospitals has a moderating effect on the relationship between trust in mHealth services and use intentions.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Development of the Study Questionnaire</title>
        <p>All the measures in the survey were adapted or adopted from existing prevalidated instruments. The measures of trust in offline health services and trust in mHealth services were adapted from the study by Gefen et al [<xref ref-type="bibr" rid="ref25">25</xref>]. The intention to use the mHealth service was measured using the items from the study by Deng et al [<xref ref-type="bibr" rid="ref8">8</xref>]. The measures of declining physiological conditions were adapted from the study by Phang et al [<xref ref-type="bibr" rid="ref12">12</xref>]. The measures of support from hospitals were adapted from the measures of vendor support in the study by Thong et al [<xref ref-type="bibr" rid="ref48">48</xref>]. In fact, Thong et al indicated that vendor support results in a higher level of IS effectiveness. In the context of our study, the hospital of our study launched an mHealth service to extend the traditional offline health services. The role of the hospital is very similar to the role of the vendor. Therefore, we modified the measurement items of vendor support according to our research context.</p>
        <p>To improve the content validity of the questionnaire, we revised the questions and deleted similarly phrased items based on feedback from 2 mHealth researchers and a pretest with 30 elderly users. All items included in the survey were measured on a 7-point Likert scale ranging from 1 to 7, with “1” representing strongly disagree and “7” representing strongly agree. The details of the constructs and measurements are presented in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>Data Collection</title>
        <p>We conducted our survey at Aerospace Center hospital in Beijing, the capital of China. At the end of 2016, this hospital had launched a health management platform aiming to provide reliable daily health care services for patients through mobile services. Therefore, this target hospital is an appropriate site for data collection. The mHealth services provided by this platform included a routine appointment out-patient clinic, follow-up visits, medicine reminders, medical records, and real-time positioning. Permission was obtained, and proper arrangements were made by the management board of the hospital for successful data collection. We followed 3 screening criteria to select the target participants: (1) patients coming to a physical examination center for medical examination, from which we could assume that they cared about their health; (2) patients who did not have a serious disease; and (3) patients aged 60 years or above. As these elderly participants could find it difficult to complete questionnaires unaided because of literacy problems, we accordingly employed 6 postgraduate students to assist the participants in completing the questionnaires. Furthermore, considering that most of the participants might be unfamiliar with mHealth services, a copy of an instruction manual of mHealth services was shown to the participants before they completed the questionnaire.</p>
        <p>In fact, 500 copies of the survey questionnaire were distributed, and 395 usable copies were obtained, accounting for a response rate of 79.0% (395/500). We excluded 105 participants because, owing to several reasons, they were not our target subjects. First, these participants were illiterate. Second, their declining abilities regarding reading, writing, and speaking hindered their use of mobile services. Third, these participants did not own mobile phones, which could support the use of mHealth services. Accordingly, we selected the remaining respondents as our target subjects to use in the data analysis. Among these participants, approximately 49.1% (194/395) were males and 50.9% (201/395) were females. In fact, 316 out of 395 participants (80.0%) were aged from 60 years to 70 years. In addition, 75.9% (300/395) of the participants had attended high school. All respondents were given ¥10 (US $1.5) supermarket coupons for their participation.</p>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>Partial least squares (PLS) was used to test the research model because of the several advantages of this technique. First, PLS can predict all loadings and weights of indicators and causal relationships among constructs in multistage models [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]. Second, compared with covariance-based (CB) structural equation modeling (SEM), PLS is the most suitable technique for models with formative constructs and is appropriate for relatively small samples [<xref ref-type="bibr" rid="ref51">51</xref>], which is the case in our study. In addition, PLS provides a good approximation of CB-SEM in terms of final estimates [<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]. Given these considerations, we adopted the PLS to analyze our research model.</p>
        <p>The data analysis was conducted in 2 stages. In the first stage, the measurement model (ie, based on the reliability, validity, common method bias, and multicollinearity of the constructs) was assessed to ensure its appropriateness. In the second stage, the structural model was examined and the stated hypotheses were tested [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Results of the Measurement Model Testing</title>
        <p>The internal reliability, convergent validity, and discriminant validity were examined to assess the measurement model [<xref ref-type="bibr" rid="ref53">53</xref>]. The reliability of the constructs was tested using Cronbach alpha, composite reliability (CR), and average variance extracted (AVE) [<xref ref-type="bibr" rid="ref54">54</xref>]. In our study, the threshold values of the CR and AVE were .70 and .50, respectively, which is consistent with the work by Chin [<xref ref-type="bibr" rid="ref55">55</xref>]. The value of Cronbach alpha, which was greater than the threshold .70, indicated adequate construct reliability [<xref ref-type="bibr" rid="ref56">56</xref>]. CRs for these constructs ranged from .906 to .957, and the AVE varied from .765 to .881. All the values of Cronbach alpha and CR were above the threshold values, indicating good construct reliability [<xref ref-type="bibr" rid="ref54">54</xref>]. All the item loadings of each construct were significant and above the suggested cut-off value (.700), indicating convergent validity [<xref ref-type="bibr" rid="ref55">55</xref>]. As shown in <xref ref-type="table" rid="table1">Table 1</xref>, the loadings of all items were much greater than the cross-loadings on other constructs, and the correlations of any 2 constructs were significantly smaller than the square root of the AVE of each construct, further indicating acceptable discriminant validity. In addition, we tested the potential issue of multicollinearity through the use of the variance inflation factor (VIF). As a rule of thumb, the threshold value of the VIF is less than or equal to 10, indicating no presence of multicollinearity. The results indicate that all VIFs are less than 7, thereby suggesting that there is no multicollinearity among or between the independent variables.</p>
        <p>Common method bias could be a potential concern as the data were collected from a self-reported survey [<xref ref-type="bibr" rid="ref57">57</xref>]. We first tested for common method bias according to Harman single-factor test [<xref ref-type="bibr" rid="ref58">58</xref>]. According to the results, we found that the factors accounted for 81.5% of the variance and the first factor only explained 25.1% of the variance, thus indicating that common method bias was not likely to have been an issue.</p>
      </sec>
      <sec>
        <title>Results of the Structural Model Testing</title>
        <p>The results of the structural model are recorded in <xref ref-type="fig" rid="figure2">Figure 2</xref>. They indicate that trust in mHealth services (beta=.556; <italic>t</italic><sub>394</sub>=11.174; <italic>P</italic>&#60;.001) had significant effects on the intention to use mHealth services. Hence, hypothesis 1 is supported. The results demonstrate that trust in offline health services has a significant effect on trust in mHealth services (beta=.583; <italic>t</italic><sub>394</sub>=14.528; <italic>P</italic>&#60;.001), thus supporting hypothesis 2.</p>
        <p>The moderating effects of declining physiological conditions and support from physicians were further tested. Declining physiological conditions were perceived to have a positive moderating effect on the relationship between trust in offline health services and trust in mHealth services (beta=.140; <italic>t</italic><sub>394</sub>=2.723; <italic>P</italic>=.003), thus lending support to hypothesis 3.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Correlations and discriminant validity.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="210"/>
            <col width="90"/>
            <col width="90"/>
            <col width="60"/>
            <col width="120"/>
            <col width="120"/>
            <col width="90"/>
            <col width="110"/>
            <col width="110"/>
            <thead>
              <tr valign="top">
                <td>Construct</td>
                <td>Cronbach alpha</td>
                <td>Composite reliability</td>
                <td>AVE<sup>a</sup></td>
                <td>Use intention</td>
                <td>Trust in offline health services</td>
                <td>Trust in mHealth<sup>b</sup> services</td>
                <td>Declining physiological conditions</td>
                <td>Support from hospitals</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Use intention</td>
                <td>.888</td>
                <td>.930</td>
                <td>.816</td>
                <td>.903<sup>c</sup></td>
                <td>—<sup>d</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Trust in offline health services</td>
                <td>.932</td>
                <td>.957</td>
                <td>.881</td>
                <td>.531</td>
                <td>.938<sup>c</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Trust in mHealth services</td>
                <td>.914</td>
                <td>.945</td>
                <td>.853</td>
                <td>.683</td>
                <td>.582</td>
                <td>.923<sup>c</sup></td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Declining physiological conditions</td>
                <td>.915</td>
                <td>.906</td>
                <td>.765</td>
                <td>.033</td>
                <td>−.007</td>
                <td>.052</td>
                <td>.874<sup>c</sup></td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Support from hospitals</td>
                <td>.929</td>
                <td>.949</td>
                <td>.824</td>
                <td>.535</td>
                <td>.581</td>
                <td>.682</td>
                <td>.093</td>
                <td>.907<sup>c</sup></td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>AVE: average variance extracted.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>mHealth: mobile health.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>Square root of average variance extracted.</p>
            </fn>
            <fn id="table1fn4">
              <p><sup>d</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        
        
         <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Results of the research model. mHealth: mobile health. Asterisk indicates <italic>P</italic>&#60;.10; two asterisks <italic>P</italic>&#60;.01; three asterisks <italic>P</italic>&#60;.001.</p>
          </caption>
          <graphic xlink:href="mhealth_v7i1e12269_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
       
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Summary of the hypotheses testing.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="100"/>
            <col width="600"/>
            <col width="140"/>
            <col width="70"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td>Hypothesis</td>
                <td>Description</td>
                <td>Path coefficient</td>
                <td><italic>P</italic> value</td>
                <td>Supported</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1</td>
                <td>Trust in offline health services is positively associated with trust in mHealth<sup>a</sup> services.</td>
                <td>.583</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>2</td>
                <td>Trust in mHealth services is positively associated with intention to use mHealth services.</td>
                <td>.510</td>
                <td>&#60;.001</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>3</td>
                <td>The relationship between trust in offline health services and trust in mHealth services will be stronger in the case of declining physiological conditions.</td>
                <td>.140</td>
                <td>.003</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>4</td>
                <td>The relationship between trust in mHealth services and intention to use mHealth services will be stronger in the case of support from hospitals.</td>
                <td>−.084</td>
                <td>.04</td>
                <td>No</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>mHealth: mobile health.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        
        <p>Support from hospitals was seen to negatively moderate the relationship between trust in mHealth services and intention to use mHealth services (beta=−.084; <italic>t</italic><sub>394</sub>=1.725; <italic>P</italic>=.04). Hence, hypothesis 4 is not supported.</p>

        <p>In addition, the mediating effect of trust in mHealth services in the proposed model was tested according to the procedures provided by Baron and Kenny [<xref ref-type="bibr" rid="ref59">59</xref>]. First, the relationship between trust in offline health services and intention to use mHealth services was tested (beta=.532; <italic>t</italic><sub>394</sub>=10.252; <italic>P</italic>&#60;.001). Then, we tested the relationship between trust in mHealth services and trust in offline health services (beta=.582; <italic>t</italic><sub>394</sub>=13.191; <italic>P</italic>&#60;.001). Finally, We tested the relationship between trust in offline health services and intention to use mHealth services (beta=.202; <italic>t</italic><sub>394</sub>=3.420; <italic>P</italic>&#60;.001), and the relationship between trust in mHealth services and intention to use mHealth services (beta=.566; <italic>t</italic><sub>394</sub>=11.988; <italic>P</italic>&#60;.001). Therefore, the relationship between trust in offline health services and intention to use mHealth services is partially mediated by trust in mHealth services. The results of each hypothesis are summarized in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        
        
       
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This study yields several important findings. First, trust in mHealth services positively affects elderly users’ use intentions. This highlights the proposition that trust in mHealth services is of importance in predicting the adoption of mHealth services. Second, trust in offline health services has significant effects on trust in mHealth services, which indicates that trust in offline health services can be transferred to the mobile environment. This suggests that mHealth service providers may be able to swiftly build elderly users’ trust in mHealth services through leveraging their existing trust in offline health services, thus leading to a higher adoption rate of mHealth services. Third, declining physiological conditions are seen to strengthen the relationship between trust in offline health services and trust in mHealth services. As physiological capabilities decline with age, elderly users are less capable of using new IT apps. As elderly users with declining physiological conditions need to exert more effort to evaluate the competence and ability of mHealth services, they rather tend to rely more on their prior experience and knowledge of offline health services to cultivate trust in mHealth services. Fourth, support from hospitals is seen to weaken the association between trust in mHealth services and the intention to use mHealth services. Contrary to our hypotheses, support from hospitals decreases patients’ trust in mHealth services because they depend more on physicians’ support instead of expending extra effort on evaluating the competence and ability of mHealth services. There is possibly a mismatch between their perceptions and their physicians’ advice.</p>
      </sec>
      <sec>
        <title>Theoretical and Practical Implications</title>
        <p>This study can enrich and advance our theoretical understanding in several ways. First, it extended the trust transfer theory to the offline context in transition to mHealth services. Previous studies of the trust transfer theory have mainly focused on the perspectives of offline to online and online to mobile channels [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref60">60</xref>]. On our part, we explored the trust transfer process in the context of the new mHealth services from a cross-environment perspective. As the offline to mobile service transition has become a trend for most offline services, our research into this phenomenon provides a valuable reference. Our study can be seen as an attempt to fill this research gap by providing a cornerstone for further theoretical development.</p>
        <p>Second, to comprehensively understand the IT acceptance behavior of the elderly, this research introduced a variable from gerontology—declining physiological conditions. Previous IS research on the IT acceptance behavior of a specific group is rare, except for the studies by Phang et al [<xref ref-type="bibr" rid="ref12">12</xref>] and Deng et al [<xref ref-type="bibr" rid="ref8">8</xref>]. On our part, the moderating effect of declining physiological conditions was tested in the trust transfer from offline to mobile channels. Indeed, exploring the moderating role of declining physiological conditions on trust transfer will facilitate the understanding of which conditions are more effective and thus further extend our knowledge of the trust transfer theory.</p>
        <p>Third, support from hospitals was introduced in the context of research on mHealth services. Social support is positively associated with health behavior in the health care literature [<xref ref-type="bibr" rid="ref61">61</xref>-<xref ref-type="bibr" rid="ref63">63</xref>]. However, studies on the role of social support in moderating the associations between these 2 trust elements and intention to use have been limited. We suggest that future studies should take social support into account in an attempt to better understand how trust elements influence elderly users’ attitude changes and health behaviors.</p>
        <p>This study also reflects several practical implications. First, the important role of the relationship between offline health services and mHealth services suggests that offline trust can be used as an enabler that encourages a provider of mHealth services to expand from the offline to mobile channels. Accordingly, mHealth service providers are encouraged to increase their cooperation with hospitals that are trusted by patients when marketing their mHealth services to elderly users. This may lead to higher adoption rates than simply promoting mHealth services in isolation.</p>
        <p>Second, hospitals should undertake responsibility for ensuring that the elderly use mHealth services because they possess limited health literacy and limited experience with mHealth services. However, hospitals need to provide support to elderly users in a proper way to avoid them being overly dependent on hospitals. This is because elderly users who rely too much on support from hospitals are less likely to develop trust in mHealth services, which can weaken their intention to use mHealth services.</p>
        <p>Third, mHealth service providers need to understand the different behaviors among different groups of users of mHealth services. Service providers are urged to employ tailored strategies to promote their mHealth services to elderly users when they develop marketing campaigns targeting the building of trust in a mobile environment.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>As with all empirical research, this study has its limitations. First, the study did not include users of all age groups. Elderly users were taken as the sample in our study because this specific group accounts for a large portion of all users of mHealth services. Our results need to be interpreted with caution for applications in other population and age groups. Second, this study was conducted in China, and the results may be applicable only in cultural contexts similar to those of the Chinese mainland. We suggest a similar study in a Western context for comparing the results across different cultures. Third, although the explanatory power of the model is acceptable (48.3% for intention to use), we still advocate the potential to enhance our explanatory power through taking additional factors into consideration, in future research.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>In conclusion, we reiterate that mHealth services are regarded as an essential means to alleviate the conflicts between the medical demands of an increasingly aging population and limited medical care resources. However, the adoption rate of mHealth services among elderly users still remains low. Our research draws upon the trust transfer theory and builds a comprehensive framework by integrating declining physiological conditions and support from hospitals to investigate the initial trust-building mechanism of mHealth services. The results indicate that trust in offline health services has a significant effect on trust in mHealth services, thereby leading to an intention to use mHealth services. Declining physiological conditions is seen to positively moderate the association between trust in offline health services and trust in mHealth services; however, contrary to our hypotheses, support from hospitals weakens the association between trust in mHealth services and the intention to use mHealth services. The results provide a good explanatory power to predict the mHealth use intentions of elderly users. These findings have advanced the trust transfer theory and enriched the literature on mHealth services. Accordingly, mHealth services practitioners can better understand how to leverage the benefits of trust transfer and the characteristics of elderly users to promote their mHealth services.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Questionnaire: measurement of the major constructs.</p>
        <media xlink:href="mhealth_v7i1e12269_app1.pdf" xlink:title="PDF File (Adobe PDF File), 24KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CB</term>
          <def>
            <p>covariance-based</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CR</term>
          <def>
            <p>composite reliability</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">eWOM</term>
          <def>
            <p>e-word of mouth</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">HIT</term>
          <def>
            <p>health information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">IS</term>
          <def>
            <p>information system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">IT</term>
          <def>
            <p>information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">PLS</term>
          <def>
            <p>partial least squares</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">SEM</term>
          <def>
            <p>structural equation modeling</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">VIF</term>
          <def>
            <p>variance inflation factor</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study was partially funded by the National Natural Science Foundation of China (numbers 71531007, 71622002, 71471048, 71871074, 71871073). </p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
        <source>World Health Organization</source>  
        <year>2015</year>  
        <access-date>2018-11-02</access-date>
        <publisher-loc>Geneva</publisher-loc>
        <publisher-name>WHO</publisher-name>
        <comment>World report on ageing and health 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.who.int/ageing/publications/world-report-2015/en/">http://www.who.int/ageing/publications/world-report-2015/en/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="73dGRbRb8"/></comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
        <source>World Health Organization</source>  
        <year>2015</year>  
        <access-date>2018-11-02</access-date>
        <publisher-loc>Geneva</publisher-loc>
        <publisher-name>WHO</publisher-name>
        <comment>China country assessment report on ageing and health 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.who.int/ageing/publications/china-country-assessment/en/">http://www.who.int/ageing/publications/china-country-assessment/en/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="73dGigHrw"/></comment> </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chiarini</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Ray</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Akter</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Masella</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Ganz</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>mHealth technologies for chronic diseases and elders: a systematic review</article-title>
        <source>IEEE J Sel Areas Commun</source>  
        <year>2013</year>  
        <month>09</month>  
        <volume>31</volume>  
        <issue>9</issue>  
        <fpage>6</fpage>  
        <lpage>18</lpage>  
        <pub-id pub-id-type="doi">10.1109/JSAC.2013.SUP.0513001</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Angst</surname>
            <given-names>CM</given-names>
          </name>
          <name name-style="western">
            <surname>Agarwal</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion</article-title>
        <source>MIS Quarterly</source>  
        <year>2009</year>  
        <month>06</month>  
        <volume>33</volume>  
        <issue>2</issue>  
        <fpage>339</fpage>  
        <lpage>70</lpage>  
        <pub-id pub-id-type="doi">10.2307/20650295</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mishra</surname>
            <given-names>AN</given-names>
          </name>
          <name name-style="western">
            <surname>Anderson</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Angst</surname>
            <given-names>CM</given-names>
          </name>
          <name name-style="western">
            <surname>Agarwal</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Electronic health records assimilation and physician identity evolution: an identity theory perspective</article-title>
        <source>Info Syst Res</source>  
        <year>2012</year>  
        <month>09</month>  
        <volume>23</volume>  
        <issue>3-part-1</issue>  
        <fpage>738</fpage>  
        <lpage>60</lpage>  
        <pub-id pub-id-type="doi">10.1287/isre.1110.0407</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rai</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Pye</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Baird</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Understanding determinants of consumer mobile health usage intentions, assimilation, and channel preferences</article-title>
        <source>J Med Internet Res</source>  
        <year>2013</year>  
        <month>08</month>  
        <day>2</day>  
        <volume>15</volume>  
        <issue>8</issue>  
        <fpage>e149</fpage>  
        <pub-id pub-id-type="doi">10.2196/jmir.2635</pub-id>
        <pub-id pub-id-type="medline">23912839</pub-id>
        <pub-id pub-id-type="pii">v15i8e149</pub-id>
        <pub-id pub-id-type="pmcid">PMC3742412</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Matthew-Maich</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Harris</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Ploeg</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Markle-Reid</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Valaitis</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Ibrahim</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Gafni</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Isaacs</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Designing, implementing, and evaluating mobile health technologies for managing chronic conditions in older adults: a scoping review</article-title>
        <source>JMIR mHealth uHealth</source>  
        <year>2016</year>  
        <month>06</month>  
        <day>9</day>  
        <volume>4</volume>  
        <issue>2</issue>  
        <fpage>e29</fpage>  
        <pub-id pub-id-type="doi">10.2196/mhealth.5127</pub-id>
        <pub-id pub-id-type="medline">27282195</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Deng</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Mo</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Comparison of the middle-aged and older users' adoption of mobile health services in China</article-title>
        <source>Int J Med Inform</source>  
        <year>2014</year>  
        <month>03</month>  
        <volume>83</volume>  
        <issue>3</issue>  
        <fpage>210</fpage>  
        <lpage>24</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2013.12.002</pub-id>
        <pub-id pub-id-type="medline">24388129</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(13)00249-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>Relationship between health service use and health information technology use among older adults: analysis of the US National Health Interview Survey</article-title>
        <source>J Med Internet Res</source>  
        <year>2011</year>  
        <month>4</month>  
        <day>20</day>  
        <volume>13</volume>  
        <issue>2</issue>  
        <fpage>e33</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2011/2/e33/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1753</pub-id>
        <pub-id pub-id-type="medline">21752784</pub-id>
        <pub-id pub-id-type="pii">v13i2e33</pub-id>
        <pub-id pub-id-type="pmcid">PMC3221375</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gracia</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Herrero</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Internet use and self-rated health among older people: a national survey</article-title>
        <source>J Med Internet Res</source>  
        <year>2009</year>  
        <month>12</month>  
        <day>2</day>  
        <volume>11</volume>  
        <issue>4</issue>  
        <fpage>e49</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2009/4/e49/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1311</pub-id>
        <pub-id pub-id-type="medline">19955041</pub-id>
        <pub-id pub-id-type="pii">v11i4e49</pub-id>
        <pub-id pub-id-type="pmcid">PMC2802559</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Morris</surname>
            <given-names>MG</given-names>
          </name>
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>Age differences in technology adoption decisions: implications for a changing work force</article-title>
        <source>Pers Psychol</source>  
        <year>2000</year>  
        <month>06</month>  
        <volume>53</volume>  
        <issue>2</issue>  
        <fpage>375</fpage>  
        <lpage>403</lpage>  
        <pub-id pub-id-type="doi">10.1111/j.1744-6570.2000.tb00206.x</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Phang</surname>
            <given-names>CW</given-names>
          </name>
          <name name-style="western">
            <surname>Sutanto</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Kankanhalli</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Tan</surname>
            <given-names>BC</given-names>
          </name>
          <name name-style="western">
            <surname>Teo</surname>
            <given-names>HH</given-names>
          </name>
        </person-group>
        <article-title>Senior citizens' acceptance of information systems: a study in the context of e-government services</article-title>
        <source>IEEE Trans Eng Manag</source>  
        <year>2006</year>  
        <month>11</month>  
        <volume>53</volume>  
        <issue>4</issue>  
        <fpage>555</fpage>  
        <lpage>69</lpage>  
        <pub-id pub-id-type="doi">10.1109/TEM.2006.883710</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mathur</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Adoption of technological innovations by the elderly: a consumer socialization perspective</article-title>
        <source>J Mark Manag</source>  
        <year>1999</year>  
        <volume>9</volume>  
        <issue>3</issue>  
        <fpage>21</fpage>  
        <lpage>35</lpage> </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gefen</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>E-commerce: the role of familiarity and trust</article-title>
        <source>Omega</source>  
        <year>2000</year>  
        <month>12</month>  
        <volume>28</volume>  
        <issue>6</issue>  
        <fpage>725</fpage>  
        <lpage>37</lpage>  
        <pub-id pub-id-type="doi">10.1016/S0305-0483(00)00021-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Tadisina</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>A model of customers' trust in e-businesses: micro-level inter-party trust formation</article-title>
        <source>J Comput Inform Syst</source>  
        <year>2007</year>  
        <volume>48</volume>  
        <issue>1</issue>  
        <fpage>88</fpage>  
        <lpage>104</lpage>  
        <pub-id pub-id-type="doi">10.1080/08874417.2007.11645998</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Stewart</surname>
            <given-names>KJ</given-names>
          </name>
        </person-group>
        <article-title>Trust transfer on the World Wide Web</article-title>
        <source>Organ Sci</source>  
        <year>2003</year>  
        <month>01</month>  
        <volume>14</volume>  
        <issue>1</issue>  
        <fpage>5</fpage>  
        <lpage>17</lpage>  
        <pub-id pub-id-type="doi">10.1287/orsc.14.1.5.12810</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Akter</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>D'Ambra</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Ray</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Trustworthiness in mHealth information services: an assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS)</article-title>
        <source>J Am Soc Inf Sci Technol</source>  
        <year>2011</year>  
        <month>01</month>  
        <volume>62</volume>  
        <issue>1</issue>  
        <fpage>100</fpage>  
        <lpage>16</lpage>  
        <pub-id pub-id-type="doi">10.1002/asi.21442</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Guo</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>The privacy–personalization paradox in mHealth services acceptance of different age groups</article-title>
        <source>Electron Commer Res Appl</source>  
        <year>2016</year>  
        <month>03</month>  
        <volume>16</volume>  
        <fpage>55</fpage>  
        <lpage>65</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.elerap.2015.11.001</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Doney</surname>
            <given-names>PM</given-names>
          </name>
          <name name-style="western">
            <surname>Cannon</surname>
            <given-names>JP</given-names>
          </name>
        </person-group>
        <article-title>An examination of the nature of trust in buyer-seller relationships</article-title>
        <source>J Mark</source>  
        <year>1997</year>  
        <month>04</month>  
        <volume>61</volume>  
        <issue>2</issue>  
        <fpage>35</fpage>  
        <lpage>51</lpage>  
        <pub-id pub-id-type="doi">10.2307/1251829</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Wei</surname>
            <given-names>KK</given-names>
          </name>
        </person-group>
        <article-title>The role of inter-channel trust transfer in establishing mobile commerce trust</article-title>
        <source>Electron Commer Res Appl</source>  
        <year>2011</year>  
        <month>11</month>  
        <volume>10</volume>  
        <issue>6</issue>  
        <fpage>615</fpage>  
        <lpage>25</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.elerap.2011.07.008</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Turel</surname>
            <given-names>O</given-names>
          </name>
          <name name-style="western">
            <surname>Yuan</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Connelly</surname>
            <given-names>CE</given-names>
          </name>
        </person-group>
        <article-title>In justice we trust: predicting user acceptance of e-customer services</article-title>
        <source>J Manag Inform Syst</source>  
        <year>2008</year>  
        <month>12</month>  
        <volume>24</volume>  
        <issue>4</issue>  
        <fpage>123</fpage>  
        <lpage>51</lpage>  
        <pub-id pub-id-type="doi">10.2753/MIS0742-1222240405</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Belanche</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Casaló</surname>
            <given-names>LV</given-names>
          </name>
          <name name-style="western">
            <surname>Flavián</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Schepers</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Trust transfer in the continued usage of public e-services</article-title>
        <source>Inform Manag</source>  
        <year>2014</year>  
        <month>09</month>  
        <volume>51</volume>  
        <issue>6</issue>  
        <fpage>627</fpage>  
        <lpage>40</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2014.05.016</pub-id></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Chau</surname>
            <given-names>PY</given-names>
          </name>
          <name name-style="western">
            <surname>Cao</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Dynamics between the trust transfer process and intention to use mobile payment services: a cross-environment perspective</article-title>
        <source>Inform manage</source>  
        <year>2011</year>  
        <month>12</month>  
        <volume>48</volume>  
        <issue>8</issue>  
        <fpage>393</fpage>  
        <lpage>403</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2011.09.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Shen</surname>
            <given-names>XL</given-names>
          </name>
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Transition of electronic word-of-mouth services from web to mobile context: a trust transfer perspective</article-title>
        <source>Decis Support Syst</source>  
        <year>2013</year>  
        <month>02</month>  
        <volume>54</volume>  
        <issue>3</issue>  
        <fpage>1394</fpage>  
        <lpage>1403</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2012.12.015</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gefen</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Karahanna</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Straub</surname>
            <given-names>DW</given-names>
          </name>
        </person-group>
        <article-title>Trust and TAM in online shopping: an integrated model</article-title>
        <source>MIS Quarterly</source>  
        <year>2003</year>  
        <month>03</month>  
        <volume>27</volume>  
        <issue>1</issue>  
        <fpage>51</fpage>  
        <lpage>90</lpage>  
        <pub-id pub-id-type="doi">10.2307/30036519</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mayer</surname>
            <given-names>RC</given-names>
          </name>
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>JH</given-names>
          </name>
          <name name-style="western">
            <surname>Schoorman</surname>
            <given-names>FD</given-names>
          </name>
        </person-group>
        <article-title>An integrative model of organizational trust</article-title>
        <source>Acad Manag Rev</source>  
        <year>1995</year>  
        <month>07</month>  
        <volume>20</volume>  
        <issue>3</issue>  
        <fpage>709</fpage>  
        <lpage>34</lpage>  
        <pub-id pub-id-type="doi">10.2307/258792</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jarvenpaa</surname>
            <given-names>SL</given-names>
          </name>
          <name name-style="western">
            <surname>Tractinsky</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Saarinen</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Consumer trust in an internet store: a cross cultural validation</article-title>
        <source>J Comput Mediat Commun</source>  
        <year>1999</year>  
        <month>12</month>  
        <volume>5</volume>  
        <issue>2</issue>  
        <pub-id pub-id-type="doi">10.1111/j.1083-6101.1999.tb00337.x</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McKnight</surname>
            <given-names>DH</given-names>
          </name>
          <name name-style="western">
            <surname>Choudhury</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Kacmar</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Developing and validating trust measures for e-Commerce: an integrative typology</article-title>
        <source>Inf Syst Res</source>  
        <year>2002</year>  
        <month>09</month>  
        <volume>13</volume>  
        <issue>3</issue>  
        <fpage>334</fpage>  
        <lpage>59</lpage>  
        <pub-id pub-id-type="doi">10.1287/isre.13.3.334.81</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>KK</given-names>
          </name>
          <name name-style="western">
            <surname>Prabhakar</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Initial trust and the adoption of B2C e-commerce: the case of internet banking</article-title>
        <source>ACM sigmis database</source>  
        <year>2004</year>  
        <volume>35</volume>  
        <issue>2</issue>  
        <fpage>50</fpage>  
        <lpage>64</lpage>  
        <pub-id pub-id-type="doi">10.1145/1007965.1007970</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Carter</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Bélanger</surname>
            <given-names>F</given-names>
          </name>
        </person-group>
        <article-title>The utilization of e-government services: citizen trust, innovation and acceptance factors</article-title>
        <source>Inf Syst J</source>  
        <year>2005</year>  
        <month>01</month>  
        <volume>15</volume>  
        <issue>1</issue>  
        <fpage>5</fpage>  
        <lpage>25</lpage>  
        <pub-id pub-id-type="doi">10.1111/j.1365-2575.2005.00183.x</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lim</surname>
            <given-names>ET</given-names>
          </name>
          <name name-style="western">
            <surname>Tan</surname>
            <given-names>CW</given-names>
          </name>
          <name name-style="western">
            <surname>Cyr</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Pan</surname>
            <given-names>SL</given-names>
          </name>
          <name name-style="western">
            <surname>Xiao</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Advancing public trust relationships in electronic government: the Singapore e-filing journey</article-title>
        <source>Inf Syst Res</source>  
        <year>2012</year>  
        <month>12</month>  
        <volume>23</volume>  
        <issue>4</issue>  
        <fpage>1110</fpage>  
        <lpage>30</lpage>  
        <pub-id pub-id-type="doi">10.1287/isre.1110.0386</pub-id></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pavlou</surname>
            <given-names>PA</given-names>
          </name>
        </person-group>
        <article-title>Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model</article-title>
        <source>Int J Electron Commer Re</source>  
        <year>2003</year>  
        <volume>7</volume>  
        <issue>3</issue>  
        <fpage>101</fpage>  
        <lpage>34</lpage>  
        <pub-id pub-id-type="doi">10.1080/10864415.2003.11044275</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Palvia</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>The role of trust in e-commerce relational exchange: a unified model</article-title>
        <source>Inform Manage</source>  
        <year>2009</year>  
        <month>5</month>  
        <volume>46</volume>  
        <issue>4</issue>  
        <fpage>213</fpage>  
        <lpage>20</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2009.02.003</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gao</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Waechter</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation</article-title>
        <source>Inform Syst Front</source>  
        <year>2017</year>  
        <month>06</month>  
        <volume>19</volume>  
        <issue>3</issue>  
        <fpage>525</fpage>  
        <lpage>48</lpage>  
        <pub-id pub-id-type="doi">10.1007/s10796-015-9611-0</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhao</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Ni</surname>
            <given-names>Q</given-names>
          </name>
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>What factors influence the mobile health service adoption? a meta-analysis and the moderating role of age</article-title>
        <source>Int J Inf Manag</source>  
        <year>2018</year>  
        <month>12</month>  
        <volume>43</volume>  
        <fpage>342</fpage>  
        <lpage>50</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2017.08.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Deng</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Hong</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Ren</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Xiang</surname>
            <given-names>F</given-names>
          </name>
        </person-group>
        <article-title>What predicts patients? adoption intention toward mhealth services in china: empirical study</article-title>
        <source>JMIR Mhealth Uhealth</source>  
        <year>2018</year>  
        <month>08</month>  
        <day>29</day>  
        <volume>6</volume>  
        <issue>8</issue>  
        <fpage>e172</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2018/8/e172/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/mhealth.9316</pub-id>
        <pub-id pub-id-type="medline">30158101</pub-id>
        <pub-id pub-id-type="pii">v6i8e172</pub-id>
        <pub-id pub-id-type="pmcid">PMC6135967</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Akter</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Ray</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>D’Ambra</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Continuance of mHealth services at the bottom of the pyramid: the roles of service quality and trust</article-title>
        <source>Electron Mark</source>  
        <year>2012</year>  
        <month>03</month>  
        <volume>23</volume>  
        <issue>1</issue>  
        <fpage>29</fpage>  
        <lpage>47</lpage>  
        <pub-id pub-id-type="doi">10.1007/s12525-012-0091-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Grundy</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <source>Disability in Great Britain: Results From the 1996/97 Disability Follow-Up to the Family Resources survey</source>  
        <year>1999</year>  
        <month>07</month>  
        <day>31</day>  
        <publisher-loc>Great Britain</publisher-loc>
        <publisher-name>Department of Social Security</publisher-name>
        <fpage>94</fpage> </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Timmermann</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>The role of information technology in older adult learning</article-title>
        <source>New Dir Adult Cont Educ</source>  
        <year>1998</year>  
        <volume>77</volume>  
        <fpage>61</fpage>  
        <lpage>71</lpage>  
        <pub-id pub-id-type="doi">10.1002/ace.7706</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Heart</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Kalderon</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Older adults: are they ready to adopt health-related ICT?</article-title>
        <source>Int J Med Inform</source>  
        <year>2013</year>  
        <month>11</month>  
        <volume>82</volume>  
        <issue>11</issue>  
        <fpage>e209</fpage>  
        <lpage>31</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2011.03.002</pub-id>
        <pub-id pub-id-type="medline">21481631</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(11)00068-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Xue</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Yen</surname>
            <given-names>CC</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Chan</surname>
            <given-names>HC</given-names>
          </name>
          <name name-style="western">
            <surname>Tai</surname>
            <given-names>BC</given-names>
          </name>
          <name name-style="western">
            <surname>Tan</surname>
            <given-names>SB</given-names>
          </name>
          <name name-style="western">
            <surname>Duh</surname>
            <given-names>HB</given-names>
          </name>
          <name name-style="western">
            <surname>Choolani</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>An exploratory study of ageing women's perception on access to health informatics via a mobile phone-based intervention</article-title>
        <source>Int J Med Inform</source>  
        <year>2012</year>  
        <month>09</month>  
        <volume>81</volume>  
        <issue>9</issue>  
        <fpage>637</fpage>  
        <lpage>48</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2012.04.008</pub-id>
        <pub-id pub-id-type="medline">22658778</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(12)00075-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Leithelser</surname>
            <given-names>RL</given-names>
          </name>
          <name name-style="western">
            <surname>Wetherbe</surname>
            <given-names>JC</given-names>
          </name>
        </person-group>
        <article-title>Service support levels: an organized approach to end-user computing</article-title>
        <source>MIS Quarterly</source>  
        <year>1986</year>  
        <month>12</month>  
        <volume>10</volume>  
        <issue>4</issue>  
        <fpage>337</fpage>  
        <lpage>49</lpage>  
        <pub-id pub-id-type="doi">10.2307/249187</pub-id></nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>DM</given-names>
          </name>
        </person-group>
        <article-title>Usage pattern and sources of assistance for personal computer users</article-title>
        <source>MIS Quarterly</source>  
        <year>1986</year>  
        <month>12</month>  
        <volume>10</volume>  
        <issue>4</issue>  
        <fpage>313</fpage>  
        <lpage>25</lpage>  
        <pub-id pub-id-type="doi">10.2307/249183</pub-id></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gallivan</surname>
            <given-names>MJ</given-names>
          </name>
          <name name-style="western">
            <surname>Spitler</surname>
            <given-names>VK</given-names>
          </name>
          <name name-style="western">
            <surname>Koufaris</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Does information technology training really matter? a social information processing analysis of coworkers' influence on IT usage in the workplace</article-title>
        <source>J Manag Inf Syst</source>  
        <year>2005</year>  
        <volume>22</volume>  
        <issue>1</issue>  
        <fpage>153</fpage>  
        <lpage>92</lpage>  
        <pub-id pub-id-type="doi">10.1080/07421222.2003.11045830</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Compeau</surname>
            <given-names>DR</given-names>
          </name>
          <name name-style="western">
            <surname>Higgins</surname>
            <given-names>CA</given-names>
          </name>
        </person-group>
        <article-title>Computer self-efficacy: development of a measure and initial test</article-title>
        <source>MIS Quarterly</source>  
        <year>1995</year>  
        <month>06</month>  
        <volume>19</volume>  
        <issue>2</issue>  
        <fpage>189</fpage>  
        <lpage>211</lpage>  
        <pub-id pub-id-type="doi">10.2307/249688</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hoque</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Sorwar</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Understanding factors influencing the adoption of mHealth by the elderly: an extension of the UTAUT model</article-title>
        <source>Int J Med Inform</source>  
        <year>2017</year>  
        <month>12</month>  
        <volume>101</volume>  
        <fpage>75</fpage>  
        <lpage>84</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2017.02.002</pub-id>
        <pub-id pub-id-type="medline">28347450</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(17)30033-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sirdeshmukh</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Singh</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Sabol</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Consumer trust, value, and loyalty in relational exchanges</article-title>
        <source>J Mark</source>  
        <year>2002</year>  
        <month>01</month>  
        <volume>66</volume>  
        <issue>1</issue>  
        <fpage>15</fpage>  
        <lpage>37</lpage>  
        <pub-id pub-id-type="doi">10.1509/jmkg.66.1.15.18449</pub-id></nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Thong</surname>
            <given-names>JY</given-names>
          </name>
          <name name-style="western">
            <surname>Yap</surname>
            <given-names>CS</given-names>
          </name>
          <name name-style="western">
            <surname>Raman</surname>
            <given-names>KS</given-names>
          </name>
        </person-group>
        <article-title>Engagement of external expertise in information systems implementation</article-title>
        <source>J Manag Inf Syst</source>  
        <year>1994</year>  
        <volume>11</volume>  
        <issue>2</issue>  
        <fpage>209</fpage>  
        <lpage>31</lpage>  
        <pub-id pub-id-type="doi">10.1080/07421222.1994.11518046</pub-id></nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fornell</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Bookstein</surname>
            <given-names>FL</given-names>
          </name>
        </person-group>
        <article-title>Two structural equation models: LISREL and PLS applied to consumer exit-voice theory</article-title>
        <source>J Mark Res</source>  
        <year>1982</year>  
        <month>11</month>  
        <volume>19</volume>  
        <issue>4</issue>  
        <fpage>440</fpage>  
        <lpage>52</lpage>  
        <pub-id pub-id-type="doi">10.2307/3151718</pub-id></nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gefen</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Straub</surname>
            <given-names>DW</given-names>
          </name>
          <name name-style="western">
            <surname>Rigdon</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>An update and extension to SEM guidelines for administrative and social science research</article-title>
        <source>MIS Quarterly</source>  
        <year>2011</year>  
        <volume>35</volume>  
        <issue>2</issue>  
        <fpage>iii</fpage>  
        <lpage>xiv</lpage>  
        <pub-id pub-id-type="doi">10.2307/23044042</pub-id></nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hair</surname>
            <given-names>JF</given-names>
          </name>
          <name name-style="western">
            <surname>Ringle</surname>
            <given-names>CM</given-names>
          </name>
          <name name-style="western">
            <surname>Sarstedt</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>PLS-SEM: indeed a silver bullet</article-title>
        <source>J Market Theor Pract</source>  
        <year>2011</year>  
        <volume>19</volume>  
        <issue>2</issue>  
        <fpage>139</fpage>  
        <lpage>52</lpage>  
        <pub-id pub-id-type="doi">10.2753/MTP1069-6679190202</pub-id></nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hair</surname>
            <given-names>JF</given-names>
          </name>
          <name name-style="western">
            <surname>Anderson</surname>
            <given-names>RE</given-names>
          </name>
          <name name-style="western">
            <surname>Tatham</surname>
            <given-names>RL</given-names>
          </name>
          <name name-style="western">
            <surname>Black</surname>
            <given-names>WC</given-names>
          </name>
        </person-group>
        <source>Multivariate Data Analysis. Fifth edition</source>  
        <year>1998</year>  
        <month>03</month>  
        <day>23</day>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Prentice Hall</publisher-name>
        <fpage>768</fpage> </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hair</surname>
            <given-names>JJ</given-names>
          </name>
          <name name-style="western">
            <surname>Hult</surname>
            <given-names>GT</given-names>
          </name>
          <name name-style="western">
            <surname>Ringle</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Sarstedt</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>A primer on partial least squares structural equation modeling (PLS-SEM)</source>  
        <year>2016</year>  
        <publisher-loc>Great Britain</publisher-loc>
        <publisher-name>Sage Publications</publisher-name></nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fornell</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Larcker</surname>
            <given-names>DF</given-names>
          </name>
        </person-group>
        <article-title>Evaluating structural equation models with unobservable variables and measurement error</article-title>
        <source>J Mark Res</source>  
        <year>1981</year>  
        <month>02</month>  
        <volume>18</volume>  
        <issue>1</issue>  
        <fpage>39</fpage>  
        <lpage>50</lpage>  
        <pub-id pub-id-type="doi">10.2307/3151312</pub-id></nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chin</surname>
            <given-names>WW</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Marcoulides</surname>
            <given-names>GA</given-names>
          </name>
        </person-group>
        <article-title>The partial least squares approach to structural equation modeling</article-title>
        <source>Modern Methods for Business Research</source>  
        <year>1998</year>  
        <month>01</month>  
        <publisher-loc>Hove, East Sussex</publisher-loc>
        <publisher-name>Psychology Press</publisher-name>
        <fpage>295</fpage>  
        <lpage>336</lpage> </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nunnally</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Bernstein</surname>
            <given-names>IH</given-names>
          </name>
        </person-group>
        <source>Psychometric theory</source>  
        <year>1978</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>McGraw-Hill</publisher-name>
        <fpage>736</fpage> </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Podsakoff</surname>
            <given-names>PM</given-names>
          </name>
          <name name-style="western">
            <surname>MacKenzie</surname>
            <given-names>SB</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>JY</given-names>
          </name>
          <name name-style="western">
            <surname>Podsakoff</surname>
            <given-names>NP</given-names>
          </name>
        </person-group>
        <article-title>Common method biases in behavioral research: a critical review of the literature and recommended remedies</article-title>
        <source>J Appl Psychol</source>  
        <year>2003</year>  
        <month>10</month>  
        <volume>88</volume>  
        <issue>5</issue>  
        <fpage>879</fpage>  
        <lpage>903</lpage>  
        <pub-id pub-id-type="doi">10.1037/0021-9010.88.5.879</pub-id>
        <pub-id pub-id-type="medline">14516251</pub-id>
        <pub-id pub-id-type="pii">2003-08045-010</pub-id></nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Harman</surname>
            <given-names>HH</given-names>
          </name>
        </person-group>
        <source>Modern factor analysis</source>  
        <year>1976</year>  
        <month>04</month>  
        <day>1</day>  
        <publisher-loc>Chicago</publisher-loc>
        <publisher-name>University of Chicago Press</publisher-name>
        <fpage>508</fpage> </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Baron</surname>
            <given-names>RM</given-names>
          </name>
          <name name-style="western">
            <surname>Kenny</surname>
            <given-names>DA</given-names>
          </name>
        </person-group>
        <article-title>The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations</article-title>
        <source>J Pers Soc Psychol</source>  
        <year>1986</year>  
        <month>12</month>  
        <volume>51</volume>  
        <issue>6</issue>  
        <fpage>1173</fpage>  
        <lpage>82</lpage>  
        <pub-id pub-id-type="medline">3806354</pub-id></nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kuan</surname>
            <given-names>HH</given-names>
          </name>
          <name name-style="western">
            <surname>Bock</surname>
            <given-names>GW</given-names>
          </name>
        </person-group>
        <article-title>Trust transference in brick and click retailers: an investigation of the before-online-visit phase</article-title>
        <source>Inform Manage</source>  
        <year>2007</year>  
        <month>03</month>  
        <volume>44</volume>  
        <issue>2</issue>  
        <fpage>175</fpage>  
        <lpage>87</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.im.2006.12.002</pub-id></nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Helgeson</surname>
            <given-names>VS</given-names>
          </name>
          <name name-style="western">
            <surname>Cohen</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Social support and adjustment to cancer: reconciling descriptive, correlational, and intervention research</article-title>
        <source>Health Psychol</source>  
        <year>1996</year>  
        <month>03</month>  
        <volume>15</volume>  
        <issue>2</issue>  
        <fpage>135</fpage>  
        <lpage>48</lpage>  
        <pub-id pub-id-type="medline">8681922</pub-id></nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McKinley</surname>
            <given-names>CJ</given-names>
          </name>
        </person-group>
        <article-title>Investigating the influence of threat appraisals and social support on healthy eating behavior and drive for thinness</article-title>
        <source>Health Commun</source>  
        <year>2009</year>  
        <month>12</month>  
        <volume>24</volume>  
        <issue>8</issue>  
        <fpage>735</fpage>  
        <lpage>45</lpage>  
        <pub-id pub-id-type="doi">10.1080/10410230903264303</pub-id>
        <pub-id pub-id-type="medline">20183382</pub-id>
        <pub-id pub-id-type="pii">917664551</pub-id></nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yan</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Tan</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Feeling blue? go online: an empirical study of social support among patients</article-title>
        <source>Inf Syst Res</source>  
        <year>2014</year>  
        <month>12</month>  
        <volume>25</volume>  
        <issue>4</issue>  
        <fpage>667</fpage>  
        <lpage>891</lpage>  
        <pub-id pub-id-type="doi">10.1287/isre.2014.0538</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
