<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i6e16721</article-id>
      <article-id pub-id-type="pmid">32348260</article-id>
      <article-id pub-id-type="doi">10.2196/16721</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>The Mediating Role of Organizational Reputation and Trust in the Intention to Use Wearable Health Devices: Cross-Country Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Pobiruchin</surname>
            <given-names>Monika</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Burns</surname>
            <given-names>Catherine</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Adebesin</surname>
            <given-names>Funmi</given-names>
          </name>
          <degrees>BSc, MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Informatics</institution>
            <institution>University of Pretoria</institution>
            <addr-line>Corner of Lynwood and Roper Street</addr-line>
            <addr-line>Hatfield</addr-line>
            <addr-line>Pretoria, 0083</addr-line>
            <country>South Africa</country>
            <phone>27 0124205667</phone>
            <email>funmi.adebesin@up.ac.za</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0512-016X</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Mwalugha</surname>
            <given-names>Revingstone</given-names>
          </name>
          <degrees>BCom, BCom (Hons)</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6875-0233</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Informatics</institution>
        <institution>University of Pretoria</institution>
        <addr-line>Pretoria</addr-line>
        <country>South Africa</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Funmi Adebesin <email>funmi.adebesin@up.ac.za</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>6</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>9</day>
        <month>6</month>
        <year>2020</year>
      </pub-date>
      <volume>8</volume>
      <issue>6</issue>
      <elocation-id>e16721</elocation-id>
      <history>
        <date date-type="received">
          <day>17</day>
          <month>10</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>2</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>7</day>
          <month>2</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>29</day>
          <month>2</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Funmi Adebesin, Revingstone Mwalugha. Originally published in JMIR mHealth and uHealth (http://mhealth.jmir.org), 09.06.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://mhealth.jmir.org/2020/6/e16721/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The use of consumer wearable health devices for fitness tracking has seen an upward trend across the globe. Previous studies have shown that trust is an important factor in the adoption and use of new technologies. However, little is known about the influence of organizational reputation and trust on the intention to use wearable health devices.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aimed to investigate the mediating role of organizational reputation and trust in the intention to use wearable health devices and to examine the extent to which the country of residence influenced the effect of organizational reputation on consumers’ trust in and intention to use wearable health devices.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We conducted a cross-country survey with participants from Kenya and South Africa using a Google Forms questionnaire derived from previously validated items. A series of mediation regression analyses were carried out using the PROCESS macro with the bootstrap CI procedure. A one-way, between-group multivariate analysis of variance (MANOVA) was also used to determine the key factors that distinguish Kenyans and South Africans in their intention to use wearable health devices.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>A total of 232 questionnaire responses were collected. The results revealed that organizational reputation significantly mediates the relationship between trust propensity and trust, with an indirect effect of 0.22 (95% CI 0.143-0.309). Organizational reputation also plays a significant direct role in the intention to use a wearable health device, with a direct effect of 0.32 (95% CI 0.175-0.483). This role is regardless of participants’ country of residence. Furthermore, there is a significant mediating effect of trust on the relationship between trust propensity and the intention to use a wearable health device, with an indirect effect of 0.26 (95% CI 0.172-0.349); between perceived security and the intention to use a wearable health device, with an indirect effect of 0.36 (95% CI 0.255-0.461); and between perceived privacy and the intention to use a wearable health device, with an indirect effect of 0.42 (95% CI 0.282-0.557). The MANOVA test shows statistically significant differences in all variables for both groups, with the exception of organizational reputation where there is no significant difference between the two cohorts.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Organizational reputation has a significant direct influence on participants’ trust in and the intention to use a wearable health device irrespective of their country of residence. Even in the presence of perceived security and perceived privacy, trust has a significant mediating effect on the intention to use a wearable health device.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>fitness trackers</kwd>
        <kwd>intention</kwd>
        <kwd>Kenya</kwd>
        <kwd>physical activity</kwd>
        <kwd>privacy</kwd>
        <kwd>South Africa</kwd>
        <kwd>trust</kwd>
        <kwd>regression analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Wearable health technologies continue to rank among the top 3 global fitness trends since 2016, maintaining the first position in 2016, 2017, and 2019 [<xref ref-type="bibr" rid="ref1">1</xref>]. There is growing evidence that increasing physical activity (PA) is beneficial to personal well-being [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. Several studies reported on the positive relationship between health consciousness and increase in PA [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. Wearable health devices that monitor PA can take the form of an accelerometer, a pedometer, a heart rate monitor, or a combination of these mechanisms [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref12">12</xref>]. As a result of their capability to seamlessly monitor and capture health data [<xref ref-type="bibr" rid="ref13">13</xref>], wearable health devices have become popular and valuable tools for monitoring and recording PA and other health-related data [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>].</p>
        <p>Consumer wearable health devices (CWHDs), such as Apple Watch, Fitbit, Garmin, and Huawei, typically come with a range of features that support real-time tracking of PA. These devices combine various behavioral change techniques, including goal setting, self-monitoring, feedback, and reward [<xref ref-type="bibr" rid="ref10">10</xref>], to promote positive health habits. In many instances, a wearable health device is linked to one or more compatible mobile phone apps. CWHDs have the potential to help users improve their PA and adopt healthy behavior [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Through features such as goal setting, performance monitoring, and personalized feedback, users can set up fitness goals that meet their needs, track activities against set goals, and adjust targets as required [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. The virtual fitness trainer feature in CWHDs and mobile fitness apps can mimic a personal fitness coach or trainer by showing users the correct body movements for a specific exercise [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. This feature is particularly beneficial in the Global South context (countries classified as low- and medium-income countries in Africa, Asia, Latin America, and the Caribbean), where many citizens do not have the financial means to use the services of a professional fitness trainer.</p>
        <p>Despite the potential benefits of CWHDs in supporting increased PA, there are legitimate concerns over privacy and the security of data collected by these devices [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. Data collected by CWHDs are often transmitted to cloud storage. These data are at risk of unauthorized access by people with malicious intent on the device itself, while the data are in transit and (or) on cloud storage [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>Several studies have been published on the use of CWHDs to track PA [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref26">26</xref>]. However, as acknowledged by Wiesner et al [<xref ref-type="bibr" rid="ref21">21</xref>], few studies have focused on the privacy issues that influence the adoption of these devices. Even rarer are studies by researchers from Global South countries focusing on the privacy and security of CWHDs. To address this gap, we investigated the mediating role of 2 variables (ie, organizational reputation and trust) in the following relationships:</p>
        <list list-type="bullet">
          <list-item>
            <p>The mediating role of organizational reputation in the relationship between trust propensity and trust.</p>
          </list-item>
          <list-item>
            <p>The mediating effect of trust in the relationship between trust propensity, perceived security, and perceived privacy in the intention to use wearable health devices.</p>
          </list-item>
          <list-item>
            <p>The mediating role of trust in the relationship between organizational reputation and the intention to use a wearable health device.</p>
          </list-item>
        </list>
        <p>The following research questions are addressed in the paper:</p>
        <list list-type="bullet">
          <list-item>
            <p>To what extent is the relationship between organizational reputation and the intention to use a wearable health device mediated by trust?</p>
          </list-item>
          <list-item>
            <p>To what extent are the relationships between the 3 factors (ie, trust propensity, perceived security, and perceived privacy) and the intention to use a wearable health device mediated by trust?</p>
          </list-item>
          <list-item>
            <p>What are the key factors that distinguish Kenyans and South Africans in their intention to use wearable health devices?</p>
          </list-item>
        </list>
        <p>Previous studies, such as Gao et al [<xref ref-type="bibr" rid="ref27">27</xref>], Gu et al [<xref ref-type="bibr" rid="ref28">28</xref>], and Meyer et al [<xref ref-type="bibr" rid="ref29">29</xref>], on the factors that influence the adoption and use of wearable health devices did not consider the mediating role of factors such as organizational reputation. Furthermore, studies such as Sillence et al [<xref ref-type="bibr" rid="ref30">30</xref>] that specifically investigated the influence of organizational reputation on women’s trust in a website were not from the perspective of mediation. Another unique feature of our study is the fact that it is a cross-country study, which allowed us to collect data from 2 developing countries that are culturally diverse, yet with stark similarities [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Hence, this paper contributes to the field of ubiquitous health (uHealth) as it presents empirical research findings on the effect of organizational reputation on consumers’ trust in wearable health devices and the intention to use wearable health devices. In the following subsections, we discuss the theoretical background upon which the constructs that were tested in the study are based.</p>
      </sec>
      <sec>
        <title>Trust Propensity and Trust</title>
        <p>Trust propensity relates to an individual’s natural predisposition to trust another person. This trust is without regard for the circumstances, even with little or no previous information about the other person (or thing) [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. A person (trustor) is said to be trusting of another party (trustee) when the trustor is prepared to be subjected to the consequences of the trustee’s actions. This willingness is based on the expectation that the trustee will behave as expected by the trustor regardless of whether the trustor has power to control the actions of the trustee [<xref ref-type="bibr" rid="ref33">33</xref>]. Trust consists of 4 components, namely (1) <italic>competence</italic>, which is the belief that the other party is capable of discharging their responsibility to the trustor; (2) <italic>benevolence</italic>, the belief that the trustee is willing to act in the best interest of the trustor; (3) <italic>integrity</italic>, the belief that the trustee will be truthful, abide by agreements, act ethically, and fulfill promises made; and (4) <italic>predictability</italic>, the belief that over time, the actions of the other party will be consistent and the trustor can predict the trustee’s action in any given situation [<xref ref-type="bibr" rid="ref35">35</xref>]. Trust propensity can influence the development of trust in a person or thing. Cultural background, developmental experiences, and personality types are thought to influence the willingness of an individual to trust other people or things [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
        <p>Earlier studies have shown that trust propensity can shape consumers’ trust in the use of new technologies. For example, Zhou [<xref ref-type="bibr" rid="ref36">36</xref>] found that trust propensity has a significant effect on initial trust in and the intention to use mobile banking apps. In her study on the role of trust in citizens’ adoption and use of electronic government (eGovernment), Colesca [<xref ref-type="bibr" rid="ref37">37</xref>] reported a positive relationship between trust propensity and trust in eGovernment, whereas Lee and Turban [<xref ref-type="bibr" rid="ref38">38</xref>] also reported that trust propensity has a positive influence on consumers’ trust in electronic commerce (eCommerce) websites. Similarly, Gu et al [<xref ref-type="bibr" rid="ref28">28</xref>] reported a positive link between trust propensity and initial trust in CWHDs.</p>
        <p>Although trust is an important factor in the adoption and use of technologies such as mobile banking and eCommerce websites, it is even more the case when it comes to CWHDs that collect and analyze health data on a continuous basis [<xref ref-type="bibr" rid="ref14">14</xref>]. Design issues such as accuracy, privacy, and security of health data can influence the level of trust and eventual intention to use technologies such as CWHDs [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>Although previous studies, such as those by Gu et al [<xref ref-type="bibr" rid="ref28">28</xref>], Zhou [<xref ref-type="bibr" rid="ref36">36</xref>], Colesca [<xref ref-type="bibr" rid="ref37">37</xref>], Lee and Turban [<xref ref-type="bibr" rid="ref38">38</xref>], and Ribadu and Rahman [<xref ref-type="bibr" rid="ref40">40</xref>], have shown the link between trust propensity and trust, little is known about the mediating role of organizational reputation in this relationship. To address this gap, we hypothesized the following:</p>
        <list list-type="bullet">
          <list-item>
            <p><italic>H1:</italic> The relationship between trust propensity and trust is mediated by organizational reputation.</p>
          </list-item>
          <list-item>
            <p><italic>H2:</italic> The relationship between trust propensity and the intention to use a wearable health device is mediated by trust.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Organizational Reputation and Trust</title>
        <p>Organizational reputation can be viewed from 2 perspectives, namely institutional and economic. From an institutional perspective, organizational reputation relates to the extent to which an organization creates value for its stakeholders and differentiates itself from its competitors [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. From an economic perspective, organizational reputation is the ability of a company to produce quality goods and services [<xref ref-type="bibr" rid="ref42">42</xref>]. Positive organizational reputation is generally seen as an intangible asset that can enable a company to grow its market share, maximize its profit, and attract new customers, while retaining existing ones [<xref ref-type="bibr" rid="ref43">43</xref>-<xref ref-type="bibr" rid="ref45">45</xref>].</p>
        <p>Positive organizational reputation reflects the quality and performance of the products and (or) services being offered by an organization [<xref ref-type="bibr" rid="ref46">46</xref>]. There is a direct link between organizational reputation and consumers’ trust and continued loyalty [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref47">47</xref>-<xref ref-type="bibr" rid="ref52">52</xref>]. Although good organizational reputation is vital for building consumers’ trust in general, it is even more so in web-based services where customers are unable to feel or try out a product before making payments. Thus, customers may only have to rely on their <italic>gut feeling</italic> or the company’s reputation to inform the decision to interact with the web-based service [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <p>Studies by Haery et al [<xref ref-type="bibr" rid="ref47">47</xref>] and Jung and Seock [<xref ref-type="bibr" rid="ref50">50</xref>] showed that positive organizational reputation influenced customers’ intention and continued loyalty. Flavián et al [<xref ref-type="bibr" rid="ref52">52</xref>] also reported that organizational reputation has a significant effect on customers’ trust in web-based banking, compared with traditional banking methods. In a study that investigated the factors that influence women’s trust and mistrust in health websites, Sillence et al [<xref ref-type="bibr" rid="ref30">30</xref>] also found that the majority of study participants were more trusting of information on health websites that is managed by reputable organizations. Thus, we can extend this relationship to consumers’ intention to use wearable health devices through the following hypothesis:</p>
        <list list-type="bullet">
          <list-item>
            <p><italic>H3:</italic> The relationship between organizational reputation and the intention to use a wearable health device is mediated by trust.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Perceived Security and Trust</title>
        <p>Perceived security can be defined as the belief that one’s personal information will not be accessed, viewed, manipulated, or stored by unauthorized persons while in transit or on a storage device (location) [<xref ref-type="bibr" rid="ref53">53</xref>]. The mechanisms that can be used to ensure the security of customers’ information include digital signatures, encryption, authentication, and verification [<xref ref-type="bibr" rid="ref54">54</xref>-<xref ref-type="bibr" rid="ref57">57</xref>].</p>
        <p>The impact of perceived security on trust in new technologies has been studied by several researchers. For example, in their study on the adoption of internet banking, Patel and Patel [<xref ref-type="bibr" rid="ref58">58</xref>] found that perceived security has a strong influence on participants’ intention to use internet banking services. Similarly, Aboobucker and Bao [<xref ref-type="bibr" rid="ref59">59</xref>] found that security and privacy play a significant role in the adoption of internet banking. In another study on the acceptance of near-field communication (NFC)–based mobile payment by restaurant users, Khalilzadeh et al [<xref ref-type="bibr" rid="ref60">60</xref>] found that perceived security influences customers’ trust in NFC-based mobile payment systems. In another study, Sharma et al [<xref ref-type="bibr" rid="ref61">61</xref>] found that perceived security and perceived privacy have a significant influence on the trust in and subsequent use of social networks.</p>
        <p>Authors of previous studies have reported on privacy and security concerns related to uHealth data [<xref ref-type="bibr" rid="ref62">62</xref>-<xref ref-type="bibr" rid="ref64">64</xref>], which is arguably more personal than biographical data such as name, date of birth, or telephone number. However, little is known about the mediating role of trust in the relationship between perceived security and the intention to use a wearable health device. Data collected by wearable health devices are at risk of unauthorized access by people with malicious intent on the device itself, while the data are in transit and (or) on cloud storage [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]. To test the mediating role of trust in the relationship between perceived security and the intention to use a wearable health device, we formulated the following hypothesis:</p>
        <list list-type="bullet">
          <list-item>
            <p><italic>H4:</italic> The relationship between perceived security and the intention to use a wearable health device is mediated by trust.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Perceived Privacy and Trust</title>
        <p>Privacy can be defined as the right to determine or control what personal information is disclosed to other entities or third parties [<xref ref-type="bibr" rid="ref67">67</xref>]. Concerns over the privacy of personal information are growing due to the increasing capability of new technologies to collect, process, and distribute large amounts of data [<xref ref-type="bibr" rid="ref53">53</xref>]. Security measures provide technical assurance that, to keep personal data safe, best practices will be adhered to. Privacy, on the other hand, involves compliance with legal requirements and policies on how consumers’ personal data will be collected and used [<xref ref-type="bibr" rid="ref53">53</xref>]. When asked to provide personal information on electronic platforms, a user will typically do a quick risk-benefit analysis. When the benefits are perceived to outweigh the associated privacy risks, the user is more likely to provide the requested information [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
        <p>In their study on the acceptance of wearable technology in health care, Gao et al [<xref ref-type="bibr" rid="ref27">27</xref>] found that one of the factors that influence the intention to adopt wearable health device for fitness tracking is perceived privacy risk. A high level of perceived privacy risk can have a negative influence on the trust in and intention to use new technologies. Conversely, a low level of perceived privacy risk will have a positive influence on consumers’ trust in and intention to use new technologies [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. To determine the mediating role of trust in the relationship between perceived privacy and the intention to use a wearable health device, we proposed the following hypothesis:</p>
        <list list-type="bullet">
          <list-item>
            <p><italic>H5:</italic> The relationship between perceived privacy and the intention to use a wearable health device is mediated by trust.</p>
          </list-item>
        </list>
        <p>We collected data from participants residing in 2 different countries, Kenya and South Africa. We cannot assume that participants from these countries are homogeneous, and the factors discussed in the preceding subsections would be applicable to the participants in the same way. Even for participants in the same country, this kind of an assumption would not be plausible. To investigate the key factors that distinguish participants from the 2 countries in their intention to use wearable health devices, we hypothesized the following:</p>
        <list list-type="bullet">
          <list-item>
            <p><italic>H6:</italic> There is a significant difference between Kenyans and South Africans in their intention to use wearable health devices.</p>
          </list-item>
        </list>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Research Model and Measurements</title>
        <p>The conceptual model of the relationships between trust propensity, organizational reputation, trust, perceived security, perceived privacy, and intention to use wearable health devices is illustrated in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. The questionnaire used in the study was based on constructs that have been validated and tested for their reliability by researchers as reflected in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>. Items on the questionnaire were adapted to suit the purpose of our study through minor changes to their wordings. The items were measured using a 5-point Likert scale (1=strongly disagree to 5=strongly agree). The questionnaire went through a pretest process where 2 experts (one with experience in the field of electronic health and the other an expert in the design of quantitative studies) reviewed and made suggestions for its improvement. Following the modifications, a pilot study was conducted with 5 participants to test the usability of the questionnaire and determine if further modification is required. None of the pilot participants experienced problems understanding the statements on the questionnaire, thus no further changes were made before distributing the questionnaire.</p>
        <p>To ensure that the minor changes made to items on the questionnaire did not negatively affect their reliability, we performed a Cronbach alpha coefficient test using SPSS version 25 (IBM Corp) to assess internal consistency among the items. The Cronbach alpha values of the constructs were as follows: trust propensity (.85), perceived security (.79), perceived privacy (.87), organizational reputation (.79), trust (.84), and intention to use wearable health devices (.77). Thus, changes to the wordings of items on our questionnaire did not have any negative impact on their internal consistency as the items were based on previously validated scales.</p>
      </sec>
      <sec>
        <title>Study Design</title>
        <p>A cross-country electronic survey was conducted with participants from Kenya and South Africa. The questionnaire was implemented using Google Forms and distributed over a period of 4 weeks between September and October in 2018. To reduce the possibility of multiple responses by the same person, the Google Forms were set up to accept only one response per device. As potential participants were not offered any reward, there was little incentive for a participant to submit more than one response using multiple devices. The link to the Google Forms questionnaire was sent to a diverse group of undergraduate students pursuing Bachelor of Commerce, Engineering, Education, and Law degrees at 3 universities in Kenya (University of Nairobi, Kenyatta University, and Moi University) and 1 in South Africa (University of Pretoria) via email and WhatsApp, a social media platform. As acknowledged by Topolovec-Vranic and Natarajan [<xref ref-type="bibr" rid="ref68">68</xref>], social media platforms such as Facebook, WhatsApp, LinkedIn, and Instagram provide new opportunities to recruit study participants. For example, the recruitment of potential study participants on social media platforms offers many benefits, including global reach, snowballing effect, and fast distribution [<xref ref-type="bibr" rid="ref69">69</xref>]. To increase the participation rate, we requested participants to forward the link to the questionnaire to other potential participants. Responses to the questionnaire were automatically captured on the Google Forms.</p>
        <p>Ethical approval for the study was granted by the Research Ethics Committee at the School of Information Technology, University of Pretoria. Participation in the study was completely voluntary; no identifying data were collected; and participants’ responses were anonymous. All respondents gave consent to participate in the study.</p>
      </sec>
      <sec>
        <title>Statistical Analysis Method</title>
        <p>Data were analyzed using a mediation regression analysis and the between-group multivariate analysis of variance (MANOVA) test.</p>
        <p>The mediation hypothesis analysis can be performed using the Monte Carlo CI, the Bayesian credible interval, the bootstrapping CI, or the Sobel methods [<xref ref-type="bibr" rid="ref70">70</xref>]. However, the Monte Carlo CI, Bayesian credible interval, and bootstrapping CI tests have been shown to outperform the Sobel test [<xref ref-type="bibr" rid="ref71">71</xref>-<xref ref-type="bibr" rid="ref73">73</xref>].</p>
        <p>To test hypotheses 1 to 5, we conducted a series of mediation regression analyses through bootstrapped CI using the PROCESS macro by Hayes [<xref ref-type="bibr" rid="ref74">74</xref>]. PROCESS is a free, easy-to-use add-on for SPSS and statistical analysis system software. We used the PROCESS macro for SPSS to analyze our data. PROCESS comes with more than 70 predefined models [<xref ref-type="bibr" rid="ref74">74</xref>]. We analyzed each of the 5 mediation hypotheses using the default model 4 in PROCESS. One of the benefits of the bootstrapped CI method for testing mediation is that it does not impose the assumption of a normal sample distribution. The method is also more robust when the sample size precludes the use of methods such as structural equation modeling [<xref ref-type="bibr" rid="ref72">72</xref>].</p>
        <p>H1 to H5 were tested using 1000 bootstrapped samples at 95% CI. To test H1 (the relationship between trust propensity and trust is mediated by organizational reputation), we ran the PROCESS macro with trust propensity as the independent variable, trust as the dependent variable, and organizational reputation as the mediating variable. Similarly, H2 (the relationship between trust propensity and the intention to use a wearable health device is mediated by trust) was tested by loading trust propensity as the independent variable, intention to use a wearable health device as the dependent variable, and trust as the mediating variable.</p>
        <p>H3 (the relationship between organizational reputation and the intention to use a wearable health device is mediated by trust) was tested by loading organizational reputation as the independent variable, intention to use a wearable health device as the dependent variable, and trust as the mediating variable. We also tested H4 (the relationship between perceived security and the intention to use a wearable health device is mediated by trust) by loading perceived security as the independent variable, intention to use a wearable health device as the dependent variable, and trust as the mediating variable. Finally, H5 (the relationship between perceived privacy and the intention to use a wearable health device is mediated by trust) was tested by loading perceived privacy as the independent variable, intention to use a wearable health device as the dependent variable, and trust as the mediating variable.</p>
        <p>The mediation regression analyses were carried out in 2 stages: (1) by loading all data from the 2 countries and (2) by separating the data according to participants’ country of residence. Separating the data enabled us to determine the extent of the differences in the mediation variables between the 2 cohorts.</p>
        <p>To test H6 (there is a significant difference between Kenyans and South Africans in their intention to use wearable health devices), a one-way, between-group MANOVA test using SPSS was carried out to determine the factors that distinguish Kenyan and South African participants. The variables trust propensity, organizational reputation, trust, perceived security, perceived privacy, and intention to use a wearable health device were loaded as dependent variables, whereas country of residence was loaded as the independent variable.</p>
        <p>To ensure that there is no serious violation of the underlying assumptions of MANOVA test, we tested for normality, linearity, univariate and multivariate outliers, homogeneity of variance-covariance, and multicollinearity. None of the underlying assumptions were violated, with the exception of the Levene test of equality of variances, where the variable, intention to use a wearable health device, has a significant value of <italic>P</italic>=.03. This value is slightly lower than the recommended value of <italic>P</italic>=.05.</p>
        <p>We then used the Pillai trace to test for any statistically significant differences between the 2 groups. This is to ensure that the slight violation of equality of variance assumption did not influence the outcome of the MANOVA test. Pillai trace is known to be more robust than Wilks lambda when comparing groups in situations where there is some violation of the underlying assumptions of MANOVA [<xref ref-type="bibr" rid="ref75">75</xref>].</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Demographics of Study Participants</title>
        <p>A total of 232 responses were received. As shown in <xref ref-type="table" rid="table1">Table 1</xref>, there were 137 participants from Kenya and 95 from South Africa. A total of 58.2% (135/232) of participants were males, whereas 41.8% (97/232) were females. Within each country, 67.2% (92/137) of Kenyans were males, whereas 32.8% (45/137) were females. Gender distribution in South Africa was 45% (43/95) males and 55% (52/95) females.</p>
      </sec>
      <sec>
        <title>Correlation Between Research Constructs</title>
        <p>The results of the correlation between the constructs are presented in <xref ref-type="table" rid="table2">Table 2</xref>. The constructs have weak-to-strong positive relationships with each other at <italic>P</italic>&#60;.001. There is a weak positive relationship between trust propensity and the other 5 constructs (ie, perceived security, perceived privacy, organizational reputation, trust, and intention to use a wearable health device). The relationship between perceived security and the constructs perceived privacy, organizational reputation, trust, and intention to use a wearable health device is medium to strong, with the strongest relationship being between perceived security and perceived privacy (<italic>r</italic>=0.72; <italic>P</italic>&#60;.001). Perceived privacy also has a moderate-to-strong positive relationship with the constructs perceived security, organizational reputation, trust, and intention to use a wearable health device, with the strongest being between perceived privacy and trust (<italic>r</italic>=0.72; <italic>P</italic>&#60;.001). Between trust and the constructs trust propensity, perceived security, perceived privacy, organizational reputation, and intention to use a wearable health device, the strongest relationship is with organizational reputation (<italic>r</italic>=0.74; <italic>P</italic>&#60;.001). The correlation between intention to use a wearable health device and the other 5 constructs is weak to moderate, with the strongest occurring between intention to use a wearable health device and trust (<italic>r</italic>=0.67; <italic>P</italic>&#60;.001).</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Descriptive statistics of study participants.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="30"/>
            <col width="570"/>
            <col width="370"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Category and item</td>
                <td>Frequency</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Gender, n (% per total sample)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Male</td>
                <td>135 (58.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Female</td>
                <td>97 (41.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Gender per country, n (% within country)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="3">
                  <bold>Kenya</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td>92 (67.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td>45 (32.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="3">
                  <bold>South Africa</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td>43 (45)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td>52 (55)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Country of residence, n (% per total sample)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Kenya</td>
                <td>137 (59.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">South Africa</td>
                <td>95 (40.9)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Pearson correlation (r) matrix for trust propensity, perceived security, perceived privacy, organizational reputation, trust, and intention to use a wearable health device at <italic>P</italic>&#60;.001 (n=232).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="180"/>
            <col width="150"/>
            <col width="130"/>
            <col width="130"/>
            <col width="160"/>
            <col width="80"/>
            <col width="170"/>
            <thead>
              <tr valign="top">
                <td>Constructs</td>
                <td>Trust propensity</td>
                <td>Perceived security</td>
                <td>Perceived privacy</td>
                <td>Organizational reputation</td>
                <td>Trust</td>
                <td>Intention to use a wearable health device</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Trust propensity</td>
                <td>N/A<sup>a</sup></td>
                <td>0.398</td>
                <td>0.359</td>
                <td>0.325</td>
                <td>0.382</td>
                <td>0.258</td>
              </tr>
              <tr valign="top">
                <td>Perceived security</td>
                <td>0.398</td>
                <td>N/A</td>
                <td>0.720</td>
                <td>0.494</td>
                <td>0.598</td>
                <td>0.478</td>
              </tr>
              <tr valign="top">
                <td>Perceived privacy</td>
                <td>0.359</td>
                <td>0.720</td>
                <td>N/A</td>
                <td>0.620</td>
                <td>0.721</td>
                <td>0.542</td>
              </tr>
              <tr valign="top">
                <td>Organizational reputation</td>
                <td>0.325</td>
                <td>0.494</td>
                <td>0.620</td>
                <td>N/A</td>
                <td>0.742</td>
                <td>0.620</td>
              </tr>
              <tr valign="top">
                <td>Trust</td>
                <td>0.382</td>
                <td>0.598</td>
                <td>0.721</td>
                <td>0.742</td>
                <td>N/A</td>
                <td>0.671</td>
              </tr>
              <tr valign="top">
                <td>Intention to use a wearable health device</td>
                <td>0.258</td>
                <td>0.478</td>
                <td>0.542</td>
                <td>0.620</td>
                <td>0.671</td>
                <td>N/A</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Hypotheses Testing</title>
        <p>The results obtained from testing H1, using data from both groups, show that the direct effect of trust propensity on trust is statistically insignificant at 0.11 (95% CI 0.048-0.177), as the CI of this direct effect includes 0 (<xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>). In contrast, the indirect effect of organizational reputation is statistically significant at 0.22 (95% CI 0.143-0.309). We also split the data according to participants’ country of residence. This is to determine the differences in the mediating role of organizational reputation on the relationship between trust propensity and trust. The results show that organizational reputation has a statistically significant mediating role in the relationship between trust propensity and trust for both cohorts, albeit slightly lower in the case of the South African participants. These results support the hypothesis that the relationship between trust propensity and trust is mediated by organizational reputation.</p>
        <p>The result of the regression analysis to test H2 is shown in <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>. The analysis reveals that there is no significant direct relationship between trust propensity and the intention to use a wearable health device with a direct effect of 0.001 (95% CI −0.056 to 0.058). When the indirect effect of trust is considered, the relationship between trust propensity and the intention to use a wearable health device becomes statistically significant at 0.26 (95% CI 0.172-0.349). Data from both countries were also analyzed separately. The results show that although trust plays a statistically significant mediating role in the relationship between trust propensity and the intention to use a wearable health device for the Kenyan participants, this is not the case for the South African cohorts. Hence, based on the combined results and the ones for Kenyan participants, the hypothesis that the relationship between trust propensity and the intention to use a wearable health device is mediated by trust is accepted.</p>
        <p><xref ref-type="supplementary-material" rid="app5">Multimedia Appendix 5</xref> illustrates the results of the mediation regression analysis to test H3 (the relationship between organizational reputation and the intention to use a wearable health device is mediated by trust). As shown in <xref ref-type="supplementary-material" rid="app5">Multimedia Appendix 5</xref>, there is a statistically significant direct relationship between organizational reputation and the intention to use a wearable health device at 0.32 (95% CI 0.175-0.483). Although the mediating role of trust in the relationship between organizational reputation and the intention to use a wearable health device is also statistically significant at 0.35 (95% CI 0.218-0.494), this is not significantly different from the direct relationship between organizational reputation and the intention to use a wearable health device. A comparative analysis of data from both countries mirrors the combined result. Organizational reputation has a statistically significant direct relationship with the intention to use a wearable health device, with trust playing a slightly less indirect mediating role in the relationship for both cohorts. These results did not support H3. Thus, the hypothesis is rejected.</p>
        <p><xref ref-type="supplementary-material" rid="app6">Multimedia Appendix 6</xref> shows the results of the mediation regression analysis to test H4. The results show that there is no statistically significant relationship between perceived security and the intention to use a wearable health device with a direct effect of 0.07 (95% CI 0.000-0.147). This can be contrasted with the statistically significant indirect effect of trust at 0.36 (95% CI 0.255-0.461). A comparative analysis of data from both countries shows a similar pattern to the combined result. Thus, the results support our hypothesis that the relationship between perceived security and the intention to use a wearable health device is mediated by trust.</p>
        <p>The results of the mediation regression analysis to test H5 are shown in <xref ref-type="supplementary-material" rid="app7">Multimedia Appendix 7</xref>. Similar to the results of H4, there is no statistically significant relationship between perceived privacy and the intention to use a wearable health device with a direct effect of 0.07 (95% CI −0.009 to 0.150). The indirect effect of trust is however statistically significant at 0.42 (95% CI 0.282-0.557). The result of the comparative analysis of data from both countries is in line with the combined result. However, the result from Kenyan participants shows an indirect effect of 0.51 (95% CI 0.318-0.711). This is significantly higher than their South African counterparts where the indirect effect is 0.31 (95% CI 0.157-0.508). On the basis of the results, the hypothesis that the relationship between perceived privacy and the intention to use a wearable health device is mediated by trust is supported.</p>
        <p><xref ref-type="table" rid="table3">Table 3</xref> provides a summary of the research hypotheses, the direct and indirect effects of the dependent and mediating variables for both countries and an individual country, and the hypotheses that are supported.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Summary of research hypotheses findings.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="110"/>
            <col width="240"/>
            <col width="90"/>
            <col width="80"/>
            <col width="60"/>
            <col width="90"/>
            <col width="80"/>
            <col width="60"/>
            <col width="190"/>
            <thead>
              <tr valign="top">
                <td>Hypothesis</td>
                <td>Mediation path</td>
                <td colspan="3">Direct effect (C’)</td>
                <td colspan="3">Indirect effect (ab)</td>
                <td>Hypothesis supported</td>
              </tr>
              <tr valign="bottom">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>All data<sup>a</sup></td>
                <td>Kenya</td>
                <td>SA<sup>b</sup></td>
                <td>All data<sup>a</sup></td>
                <td>Kenya</td>
                <td>SA<sup>b</sup></td>
                <td>
                  <break/>
                </td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>H1</td>
                <td>Trust propensity - organizational reputation - trust</td>
                <td>0.11</td>
                <td>0.12</td>
                <td>0.08</td>
                <td>0.22</td>
                <td>0.23</td>
                <td>0.17</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H2</td>
                <td>Trust propensity - trust - intention to use a wearable health device</td>
                <td>0.001</td>
                <td>−0.04</td>
                <td>0.04</td>
                <td>0.26</td>
                <td>0.29</td>
                <td>0.26</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H3</td>
                <td>Organizational reputation - trust - intention to use a wearable health device</td>
                <td>0.32</td>
                <td>0.73</td>
                <td>0.31</td>
                <td>0.35</td>
                <td>0.36</td>
                <td>0.29</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>H4</td>
                <td>Perceived security - trust - intention to use a wearable health device</td>
                <td>0.07</td>
                <td>0.04</td>
                <td>0.09</td>
                <td>0.36</td>
                <td>0.43</td>
                <td>0.25</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>H5</td>
                <td>Perceived privacy - trust - intention to use a wearable health device</td>
                <td>0.07</td>
                <td>0.04</td>
                <td>0.09</td>
                <td>0.42</td>
                <td>0.51</td>
                <td>0.31</td>
                <td>Yes</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>All data: combined results.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>SA: South Africa.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>As stated in the Methods section, we used the Pillai trace to test for any statistically significant difference between the Kenyan and South African cohorts because of the slight violation of the Levene test of equality of variances by the variable, intention to use a wearable health device. The MANOVA result suggests that there are statistically significant differences between Kenyans and South Africans in the combined dependent variables (<italic>F</italic><sub>6,225</sub>=4.18; <italic>P</italic>=.001; Pillai trace=0.1; partial eta squared=0.1). We also considered the results of each dependent variable separately using a Bonferroni-adjusted alpha value of .008. There are statistically significant differences in the variables for both groups (<xref ref-type="table" rid="table4">Table 4</xref>). The only exception is in the organizational reputation variable, where there is no significant difference between the 2 cohorts. The mean ratings of the variables, as illustrated in <xref ref-type="table" rid="table5">Table 5</xref>, show that Kenyan participants’ ratings of the 6 variables are slightly higher than their South African counterparts. <xref ref-type="table" rid="table5">Table 5</xref> also shows that despite the statistically significant differences between the 2 cohorts, the actual differences are less than 2 scales on average. The actual difference in the ratings for organizational reputation is less than 1 scale, which supports the results presented in <xref ref-type="table" rid="table4">Table 4</xref>.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Multivariate analysis of variance results showing differences in variables between groups.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="250"/>
            <col width="250"/>
            <col width="250"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Variable</td>
                <td><italic>F</italic> value (<italic>df</italic>=1)</td>
                <td><italic>P</italic> value</td>
                <td>Partial eta squared</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Trust propensity</td>
                <td>9.72</td>
                <td>.002<sup>a</sup></td>
                <td>0.41</td>
              </tr>
              <tr valign="top">
                <td>Perceived security</td>
                <td>20.41</td>
                <td>&#60;.001<sup>a</sup></td>
                <td>0.82</td>
              </tr>
              <tr valign="top">
                <td>Perceived privacy</td>
                <td>13.47</td>
                <td>&#60;.001<sup>a</sup></td>
                <td>0.55</td>
              </tr>
              <tr valign="top">
                <td>Trust</td>
                <td>12.25</td>
                <td>.001<sup>a</sup></td>
                <td>0.51</td>
              </tr>
              <tr valign="top">
                <td>Organizational reputation</td>
                <td>6.35</td>
                <td>.01<sup>b</sup></td>
                <td>0.27</td>
              </tr>
              <tr valign="top">
                <td>Intention to use a wearable health device</td>
                <td>11.98</td>
                <td>.001<sup>a</sup></td>
                <td>0.49</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>Statistically significant difference between groups.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>No significant difference between groups.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Participants’ mean score according to country of residence.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="310"/>
            <col width="180"/>
            <col width="150"/>
            <col width="330"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Variable and country of residence</td>
                <td>Mean</td>
                <td>SE</td>
                <td>95% CI</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="5">
                  <bold>Trust propensity</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kenya</td>
                <td>13.179</td>
                <td>0.415</td>
                <td>12.362-13.996</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>11.496</td>
                <td>0.345</td>
                <td>10.816-12.177</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Perceived security</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kenya</td>
                <td>12.653</td>
                <td>0.358</td>
                <td>11.947-13.358</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>10.547</td>
                <td>0.298</td>
                <td>9.960-11.135</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Perceived privacy</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kenya</td>
                <td>11.947</td>
                <td>0.388</td>
                <td>11.183-12.712</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>10.095</td>
                <td>0.323</td>
                <td>9.458-10.731</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Trust</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kenya</td>
                <td>8.779</td>
                <td>0.294</td>
                <td>8.199-9.359</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>7.438</td>
                <td>0.245</td>
                <td>6.955-7.921</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Organizational reputation</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kenya</td>
                <td>5.747</td>
                <td>0.181</td>
                <td>5.390-6.104</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>5.153</td>
                <td>0.151</td>
                <td>4.856-5.451</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Intention to use a wearable health device</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kenya</td>
                <td>5.716</td>
                <td>0.222</td>
                <td>5.278-6.154</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>4.715</td>
                <td>0.185</td>
                <td>4.351-5.080</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The results obtained from this study showed that organizational reputation has a significant direct influence on the trust in and intention to use a wearable health device. Study participants’ country of residence did not change the direct influence of organizational reputation on the trust in and intention to use a wearable health device. Similarly, trust has a significant mediating effect on the intention to use a wearable health device even in the presence of perceived security and perceived privacy. The results from this empirical study of 232 participants (Kenya, n=137; South Africa, n=97) using mediation regression analyses support hypotheses H1, H2, H4, and H5. The one-way, between-group MANOVA test also supports H6.</p>
        <p>As hypothesized, organizational reputation has a statistically significant mediating effect on the relationship between trust propensity and trust. This mediating effect was present when data from the 2 countries were analyzed together and when we analyzed the data according to the country of residence. Similarly, as predicted, trust has a statistically significant mediating effect on the relationship between trust propensity and intention to use a wearable health device. This is the case for the combined data and Kenyan participants’ data. However, trust did not have a significant mediating effect on the relationship between trust propensity and the intention to use a wearable health device for South African participants.</p>
        <p>Results from our study show that trust propensity on its own does not necessarily lead to the intention to use a wearable health device. Previous studies, such as those by Zhou [<xref ref-type="bibr" rid="ref36">36</xref>], Colesca [<xref ref-type="bibr" rid="ref37">37</xref>], and Lee and Turban [<xref ref-type="bibr" rid="ref38">38</xref>], found that people’s trust propensity influences their trust in and intention to adopt new technologies. Findings from our study are in line with previous studies in this regard. However, this study goes beyond previous studies by suggesting that organizational reputation significantly mediates the relationship between trust propensity and trust. Our research shows that people with high trust propensity will be more likely to trust a wearable health device when the device’s manufacturer has a good reputation.</p>
        <p>The hypothesis that trust plays a significant role in the relationship between organizational reputation and the intention to use a wearable health device is not supported by results from our study. Organizational reputation has a significant direct effect on the intention to use a wearable health device, with trust playing a lesser mediating role. Even when the country of residence is taken into account, organizational reputation on its own plays a significant direct role in the intention to use a wearable health device. Evidence from the literature suggests that good organizational reputation influences consumers’ trust and continued loyalty, irrespective of whether they live in a developed or developing country [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref52">52</xref>]. Thus, our study is in line with the ones from developed (eg, America and Spain [<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]) and developing (eg, Iran and Nigeria [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]) countries. Our study also confirms the value of good organizational reputation.</p>
        <p>Results from our study also show that perceived security and perceived privacy on their own do not significantly influence consumers’ intention to use wearable health devices, rather these factors are mediated by trust. Previous studies, such as those by Gu et al [<xref ref-type="bibr" rid="ref28">28</xref>], Arpaci [<xref ref-type="bibr" rid="ref76">76</xref>], and Damghanian et al [<xref ref-type="bibr" rid="ref77">77</xref>], investigated perceived security and perceived privacy in relation to trust, not the intention to use new technologies. Our study extends these studies by presenting empirical evidence that the presence of perceived security and perceived privacy on their own do not have a significant influence on consumers’ intention to use a wearable health device. Rather, trust plays a significant mediating role in the intention to use a wearable health device.</p>
        <p>Our assumption that there is a significant difference between Kenyans and South Africans in their overall intention to use wearable health devices is supported by the study results. There are statistically significant differences between the 2 groups on the variables trust propensity, perceived security, perceived privacy, trust, and intention to use a wearable health device. However, there is no significant difference between the 2 cohorts on the variable organizational reputation. The MANOVA results also confirm those from the mediation regression analyses, where organizational reputation is shown to have a significant direct influence on the intention to use a wearable health device for the 2 cohorts.</p>
        <p>Although we did not delve deeper into the reasons for the differences in the factors that influence Kenyans and South Africans in their intention to use wearable health devices, the results are in line with our expectation. For instance, Morawczynski and Miscione [<xref ref-type="bibr" rid="ref78">78</xref>] found that Kenyans are more trusting of the provider of M-PESA (mobile money) service (ie, the organization) due to its proven track record. They are, however, less trusting of individual agents that often act as intermediaries between customers and the service provider. Similarly, a study by the South African Human Sciences Research Council [<xref ref-type="bibr" rid="ref79">79</xref>] found that South Africans generally have low levels of trust. However, in spite of their low level of trust, South Africans tend to demonstrate an increased level of loyalty to brands with a good image [<xref ref-type="bibr" rid="ref80">80</xref>]. Hence, results from our study confirm what has been reported in the literature about the influence of positive organizational reputation on Kenyan and South African consumers.</p>
      </sec>
      <sec>
        <title>Study Contributions and Implications</title>
        <p>The findings of this study made theoretical and methodological contributions to the field of uHealth. First, from a theoretical point of view, studies on the factors that influence the intention to use or adopt health technologies [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>] did not consider the mediating effect of factors such as trust and organizational reputation. In contrast, we used a mediation regression analysis to provide deeper insight into the factors that mediate the relationship between a specific independent and dependent variable. Furthermore, our study is different from previous studies in that it is a cross-country study, whereas the previous studies are single-country studies. The cross-country nature of our study enriches the findings. Our study provides empirical evidence that organizational reputation has a significant mediating role in the relationship between trust propensity and trust. This study also confirms the fact that good organizational reputation has a positive influence on consumers’ trust in and intention to use wearable health technologies. Many of the studies on the relationship between organizational reputation and trust are predominantly about trust in web-based services [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. Given the significant growth in the adoption of wearable health devices for monitoring PA, it is important to understand the influence that corporate image and trust have on consumers’ choice of wearable health devices.</p>
        <p>Second, from a methodological point of view, our study uses an emerging approach for the mediation regression analysis, the PROCESS macro by Hayes (see the Methods section for some of the benefits of PROCESS) [<xref ref-type="bibr" rid="ref74">74</xref>]. Our study demonstrates the effectiveness of the PROCESS macro by Hayes [<xref ref-type="bibr" rid="ref74">74</xref>] and adds to the growing number of studies, such as those by Naidoo [<xref ref-type="bibr" rid="ref81">81</xref>], Zhang et al [<xref ref-type="bibr" rid="ref82">82</xref>], Huang et al [<xref ref-type="bibr" rid="ref83">83</xref>], Barboza and Siller [<xref ref-type="bibr" rid="ref84">84</xref>], Ahmed et al [<xref ref-type="bibr" rid="ref85">85</xref>], and Supakong and Jarunratanakul [<xref ref-type="bibr" rid="ref86">86</xref>], that uses the method.</p>
        <p>From a practical perspective, our study has implications for the manufacturers of wearable health devices. Results from the study demonstrate the significant influence of organizational reputation and trust on consumers’ intention to use wearable health devices. In the absence of trust and good organizational reputation, factors such as trust propensity, perceived security, and perceived privacy may not necessarily drive consumers to adopt wearable health devices. A good reputation is an organizational asset [<xref ref-type="bibr" rid="ref43">43</xref>-<xref ref-type="bibr" rid="ref45">45</xref>]. Manufacturers of wearable health devices should capitalize on this asset to attract more potential adopters of wearable health devices.</p>
      </sec>
      <sec>
        <title>Limitations and Future Research</title>
        <p>Although this study made theoretical, methodological, and practical contributions, it has limitations. For instance, we did not consider the moderating role of age on the factors that influence the intention to use wearable health devices. Furthermore, we did not explore the factors that could explain the differences in the 2 cohorts’ intention to use a wearable health device. Future studies can extend the research model by specifically investigating the roles of age and previous experience in the use of a wearable health device by using these variables as moderators to the factors that influence the intention to use a wearable health device. Such a study could also explore the potential effect of fitness tracker purchasing habits on the factors that influence the intention to use wearable health devices.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>In this study, we investigated the factors that influence consumers’ intention to use wearable health devices. More specifically, we considered the mediating roles of organizational reputation and trust in the intention to use a wearable health device. We collected data from 232 participants resident in Kenya and South Africa through a questionnaire implemented on Google Forms. A mediation regression analysis and MANOVA tests were used to analyze data. The study provides empirical evidence that organizational reputation has a significant mediating effect on the relationship between trust propensity and trust. In addition, we demonstrated that even when the country of residence is taken into account, organizational reputation on its own significantly influences consumers’ intention to use a wearable health device. Another important finding from the research is that perceived security and perceived privacy are not sufficient to motivate the use of wearable health devices. Trust is an important factor that drives this intention. The study provides deeper insight into the factors that influence the intention to use a wearable health device by investigating the factors that mediate this intention, as opposed to linear relationships between the factors. Without good organizational reputation and trust, factors such as trust propensity, perceived security, and perceived privacy have little influence on consumers’ intention to use a wearable health device.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Research model.</p>
        <media xlink:href="mhealth_v8i6e16721_app1.png" xlink:title="PNG File , 15 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Research instrument.</p>
        <media xlink:href="mhealth_v8i6e16721_app2.pdf" xlink:title="PDF File  (Adobe PDF File), 89 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Mediating role of organizational reputation in the relationship between trust propensity and trust, with regression coefficients, indirect effects, and bootstrapped CI.</p>
        <media xlink:href="mhealth_v8i6e16721_app3.png" xlink:title="PNG File , 19 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Mediating role of trust in the relationship between trust propensity and intention to use wearable health devices, with regression coefficients, indirect effects and bootstrapped CI.</p>
        <media xlink:href="mhealth_v8i6e16721_app4.png" xlink:title="PNG File , 19 KB"/>
      </supplementary-material>
      <supplementary-material id="app5">
        <label>Multimedia Appendix 5</label>
        <p>Mediating role of trust in the relationship between organization reputation and intention to use wearable health devices, with regression coefficients, indirect effects, and bootstrapped CI.</p>
        <media xlink:href="mhealth_v8i6e16721_app5.png" xlink:title="PNG File , 20 KB"/>
      </supplementary-material>
      <supplementary-material id="app6">
        <label>Multimedia Appendix 6</label>
        <p>Mediating role of trust in the relationship between perceived security and intention to use wearable health devices, with regression coefficients, indirect effects and bootstrapped CI.</p>
        <media xlink:href="mhealth_v8i6e16721_app6.png" xlink:title="PNG File , 20 KB"/>
      </supplementary-material>
      <supplementary-material id="app7">
        <label>Multimedia Appendix 7</label>
        <p>Mediating role of trust in the relationship between perceived privacy and intention to use wearable health devices, with regression coefficients, indirect effects and bootstrapped CI.</p>
        <media xlink:href="mhealth_v8i6e16721_app7.png" xlink:title="PNG File , 20 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CWHD</term>
          <def>
            <p>consumer wearable health device</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">eCommerce</term>
          <def>
            <p>electronic commerce</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">eGovernment</term>
          <def>
            <p>electronic government</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">MANOVA</term>
          <def>
            <p>multivariate analysis of variance</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">NFC</term>
          <def>
            <p>near-field communication</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PA</term>
          <def>
            <p>physical activity</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">uHealth</term>
          <def>
            <p>ubiquitous health</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The authors would like to thank the study participants. They also express their appreciation to Prof Rennie Naidoo, Prof Hanlie Smuts, and the reviewers for their constructive criticisms of the manuscript. They acknowledge the Department of Informatics and the University of Pretoria for providing the funding for the article processing fee.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>WR</given-names>
            </name>
          </person-group>
          <article-title>Worldwide survey of fitness trends for 2019</article-title>
          <source>ACSMs Health Fit J</source>
          <year>2018</year>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>10</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1249/fit.0000000000000438</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McKinney</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lithwick</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Morrison</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Nazzari</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Isserow</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Heilbron</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Krahn</surname>
              <given-names>AD</given-names>
            </name>
          </person-group>
          <article-title>The health benefits of physical activity and cardiorespiratory fitness</article-title>
          <source>B C Med J</source>
          <year>2016</year>
          <month>04</month>
          <volume>58</volume>
          <issue>3</issue>
          <fpage>131</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bcmj.org/sites/default/files/public/BCMJ_Vol58_No_3_cardiorespiratory_fitness.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reiner</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Niermann</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jekauc</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Woll</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Long-term health benefits of physical activity--a systematic review of longitudinal studies</article-title>
          <source>BMC Public Health</source>
          <year>2013</year>
          <month>09</month>
          <day>8</day>
          <volume>13</volume>
          <fpage>813</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcpublichealth.biomedcentral.com/articles/10.1186/1471-2458-13-813"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1471-2458-13-813</pub-id>
          <pub-id pub-id-type="medline">24010994</pub-id>
          <pub-id pub-id-type="pii">1471-2458-13-813</pub-id>
          <pub-id pub-id-type="pmcid">PMC3847225</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sallis</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Franklin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Joy</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ross</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sabgir</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Stone</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Strategies for promoting physical activity in clinical practice</article-title>
          <source>Prog Cardiovasc Dis</source>
          <year>2015</year>
          <volume>57</volume>
          <issue>4</issue>
          <fpage>375</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pcad.2014.10.003</pub-id>
          <pub-id pub-id-type="medline">25459975</pub-id>
          <pub-id pub-id-type="pii">S0033-0620(14)00165-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Warburton</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bredin</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Reflections on physical activity and health: what should we recommend?</article-title>
          <source>Can J Cardiol</source>
          <year>2016</year>
          <month>04</month>
          <volume>32</volume>
          <issue>4</issue>
          <fpage>495</fpage>
          <lpage>504</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cjca.2016.01.024</pub-id>
          <pub-id pub-id-type="medline">26995692</pub-id>
          <pub-id pub-id-type="pii">S0828-282X(16)00064-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Espinosa</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kadić-Maglajlić</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The mediating role of health consciousness in the relation between emotional intelligence and health behaviors</article-title>
          <source>Front Psychol</source>
          <year>2018</year>
          <volume>9</volume>
          <fpage>2161</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3389/fpsyg.2018.02161"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpsyg.2018.02161</pub-id>
          <pub-id pub-id-type="medline">30467488</pub-id>
          <pub-id pub-id-type="pmcid">PMC6237147</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kraft</surname>
              <given-names>FB</given-names>
            </name>
            <name name-style="western">
              <surname>Goodell</surname>
              <given-names>PW</given-names>
            </name>
          </person-group>
          <article-title>Identifying the health conscious consumer</article-title>
          <source>J Health Care Mark</source>
          <year>1993</year>
          <volume>13</volume>
          <issue>3</issue>
          <fpage>18</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="medline">10129812</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Niknian</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lefebvre</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Carleton</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Are people more health conscious? A longitudinal study of one community</article-title>
          <source>Am J Public Health</source>
          <year>1991</year>
          <month>02</month>
          <volume>81</volume>
          <issue>2</issue>
          <fpage>205</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.81.2.205</pub-id>
          <pub-id pub-id-type="medline">1990861</pub-id>
          <pub-id pub-id-type="pmcid">PMC1404947</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bassett</surname>
              <given-names>DR</given-names>
            </name>
            <name name-style="western">
              <surname>Mahar</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Rowe</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Morrow</surname>
              <given-names>JR</given-names>
            </name>
          </person-group>
          <article-title>Walking and measurement</article-title>
          <source>Med Sci Sports Exerc</source>
          <year>2008</year>
          <month>07</month>
          <volume>40</volume>
          <issue>7 Suppl</issue>
          <fpage>S529</fpage>
          <lpage>36</lpage>
          <pub-id pub-id-type="doi">10.1249/MSS.0b013e31817c699c</pub-id>
          <pub-id pub-id-type="medline">18562970</pub-id>
          <pub-id pub-id-type="pii">00005768-200807002-00004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mercer</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Giangregorio</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Burns</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Grindrod</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Behavior change techniques present in wearable activity trackers: a critical analysis</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2016</year>
          <month>04</month>
          <day>27</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>e40</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2016/2/e40/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.4461</pub-id>
          <pub-id pub-id-type="medline">27122452</pub-id>
          <pub-id pub-id-type="pii">v4i2e40</pub-id>
          <pub-id pub-id-type="pmcid">PMC4917727</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Butte</surname>
              <given-names>NF</given-names>
            </name>
            <name name-style="western">
              <surname>Ekelund</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Westerterp</surname>
              <given-names>KR</given-names>
            </name>
          </person-group>
          <article-title>Assessing physical activity using wearable monitors: measures of physical activity</article-title>
          <source>Med Sci Sports Exerc</source>
          <year>2012</year>
          <month>01</month>
          <volume>44</volume>
          <issue>1 Suppl 1</issue>
          <fpage>S5</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1249/MSS.0b013e3182399c0e</pub-id>
          <pub-id pub-id-type="medline">22157774</pub-id>
          <pub-id pub-id-type="pii">00005768-201201001-00002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nelson</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Kaminsky</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Dickin</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Montoye</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>Validity of consumer-based physical activity monitors for specific activity types</article-title>
          <source>Med Sci Sports Exerc</source>
          <year>2016</year>
          <month>08</month>
          <volume>48</volume>
          <issue>8</issue>
          <fpage>1619</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1249/MSS.0000000000000933</pub-id>
          <pub-id pub-id-type="medline">27015387</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bellekens</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Nieradzinska</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Bellekens</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Seeam</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hamilton</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Seeam</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A study on situational awareness security and privacy of wearable health monitoring devices</article-title>
          <source>Int J Cyber Situat Aware</source>
          <year>2016</year>
          <month>12</month>
          <day>7</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>74</fpage>
          <lpage>96</lpage>
          <pub-id pub-id-type="doi">10.22619/ijcsa.2016.100104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pfeiffer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>von</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Urbach</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Buchwald</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Quantify-Me: Consumer Acceptance of Wearable Self-Tracking Devices</article-title>
          <source>Proceedings of the 24th European Conference on Information Systems</source>
          <year>2016</year>
          <conf-name>ECIS'16</conf-name>
          <conf-date>June 12-15, 2016</conf-date>
          <conf-loc>Istanbul, Turkey</conf-loc>
          <publisher-name>AIS eLibrary</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aisel.aisnet.org/ecis2016_rp/99/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Shin</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Yoon</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information tailoring and framing in wearable health communication</article-title>
          <source>Inf Process Manag</source>
          <year>2017</year>
          <month>03</month>
          <volume>53</volume>
          <issue>2</issue>
          <fpage>351</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ipm.2016.11.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sullivan</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Lachman</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Behavior change with fitness technology in sedentary adults: a review of the evidence for increasing physical activity</article-title>
          <source>Front Public Health</source>
          <year>2016</year>
          <volume>4</volume>
          <fpage>289</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3389/fpubh.2016.00289"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpubh.2016.00289</pub-id>
          <pub-id pub-id-type="medline">28123997</pub-id>
          <pub-id pub-id-type="pmcid">PMC5225122</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Henriksen</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Mikalsen</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Woldaregay</surname>
              <given-names>AZ</given-names>
            </name>
            <name name-style="western">
              <surname>Muzny</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hartvigsen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hopstock</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Grimsgaard</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Using fitness trackers and smartwatches to measure physical activity in research: analysis of consumer wrist-worn wearables</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>03</month>
          <day>22</day>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>e110</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/3/e110/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9157</pub-id>
          <pub-id pub-id-type="medline">29567635</pub-id>
          <pub-id pub-id-type="pii">v20i3e110</pub-id>
          <pub-id pub-id-type="pmcid">PMC5887043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lowe</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>ÓLaighin</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The age of the virtual trainer</article-title>
          <source>Procedia Eng</source>
          <year>2012</year>
          <volume>34</volume>
          <fpage>242</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1016/j.proeng.2012.04.042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>FitCoach: Virtual Fitness Coach Empowered by Wearable Mobile Devices</article-title>
          <source>Proceedings of the Conference on Computer Communications</source>
          <year>2017</year>
          <conf-name>INFOCOM'17</conf-name>
          <conf-date>May 1-4, 2017</conf-date>
          <conf-loc>Atlanta, GA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/infocom.2017.8057208</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajana</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Ajana</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Communal self-tracking: data philanthropy, solidarity and privacy</article-title>
          <source>Self-Tracking: Empirical and Philosophical Investigations</source>
          <year>2018</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>Palgrave Macmillan</publisher-name>
          <fpage>125</fpage>
          <lpage>41</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wiesner</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zowalla</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Suleder</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Westers</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pobiruchin</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Technology adoption, motivational aspects, and privacy concerns of wearables in the German running community: field study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>12</month>
          <day>14</day>
          <volume>6</volume>
          <issue>12</issue>
          <fpage>e201</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/12/e201/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9623</pub-id>
          <pub-id pub-id-type="medline">30552085</pub-id>
          <pub-id pub-id-type="pii">v6i12e201</pub-id>
          <pub-id pub-id-type="pmcid">PMC6315235</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barcena</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wueest</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lau</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <source>Huihoo</source>
          <year>2014</year>
          <access-date>2019-02-22</access-date>
          <publisher-loc>USA</publisher-loc>
          <publisher-name>Symantech</publisher-name>
          <comment>How Safe is Your Quantified Self?<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://docs.huihoo.com/blackhat/europe-2014/eu-14-Wueest-Quantified-Self-A-Path-To-Self-Enlightenment-Or-Just-A-Security-Nightmare-wp.pdf">https://docs.huihoo.com/blackhat/europe-2014/eu-14-Wueest-Quantified-Self-A-Path-To-Self-Enlightenment-Or-Just-A-Security-Nightmare-wp.pdf</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Böhm</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Karwiese</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Böhm</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Oberhoffer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Effects of mobile health including wearable activity trackers to increase physical activity outcomes among healthy children and adolescents: systematic review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>04</month>
          <day>30</day>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>e8298</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/4/e8298/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.8298</pub-id>
          <pub-id pub-id-type="medline">31038460</pub-id>
          <pub-id pub-id-type="pii">v7i4e8298</pub-id>
          <pub-id pub-id-type="pmcid">PMC6658241</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pillay</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Kolbe-Alexander</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Proper</surname>
              <given-names>KI</given-names>
            </name>
            <name name-style="western">
              <surname>van Mechelen</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Lambert</surname>
              <given-names>EV</given-names>
            </name>
          </person-group>
          <article-title>Steps that count! The development of a pedometer-based health promotion intervention in an employed, health insured South African population</article-title>
          <source>BMC Public Health</source>
          <year>2012</year>
          <month>10</month>
          <day>17</day>
          <volume>12</volume>
          <fpage>880</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcpublichealth.biomedcentral.com/articles/10.1186/1471-2458-12-880"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1471-2458-12-880</pub-id>
          <pub-id pub-id-type="medline">23075000</pub-id>
          <pub-id pub-id-type="pii">1471-2458-12-880</pub-id>
          <pub-id pub-id-type="pmcid">PMC3536647</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reddy</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Pooni</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zaharieva</surname>
              <given-names>DP</given-names>
            </name>
            <name name-style="western">
              <surname>Senf</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>El Youssef</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dassau</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Doyle Iii</surname>
              <given-names>FJ</given-names>
            </name>
            <name name-style="western">
              <surname>Clements</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Rickels</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Patton</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Castle</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Riddell</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobs</surname>
              <given-names>PG</given-names>
            </name>
          </person-group>
          <article-title>Accuracy of wrist-worn activity monitors during common daily physical activities and types of structured exercise: evaluation study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>12</month>
          <day>10</day>
          <volume>6</volume>
          <issue>12</issue>
          <fpage>e10338</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/12/e10338/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10338</pub-id>
          <pub-id pub-id-type="medline">30530451</pub-id>
          <pub-id pub-id-type="pii">v6i12e10338</pub-id>
          <pub-id pub-id-type="pmcid">PMC6305876</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Strain</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wijndaele</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Brage</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Physical activity surveillance through smartphone apps and wearable trackers: examining the UK potential for nationally representative sampling</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>01</month>
          <day>29</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>e11898</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/1/e11898/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11898</pub-id>
          <pub-id pub-id-type="medline">30694198</pub-id>
          <pub-id pub-id-type="pii">v7i1e11898</pub-id>
          <pub-id pub-id-type="pmcid">PMC6371078</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>An empirical study of wearable technology acceptance in healthcare</article-title>
          <source>Indus Manag Data Syst</source>
          <year>2015</year>
          <month>10</month>
          <day>19</day>
          <volume>115</volume>
          <issue>9</issue>
          <fpage>1704</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1108/IMDS-03-2015-0087</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>An empirical study on factors influencing consumers' initial trust in wearable commerce</article-title>
          <source>J Comput Inf Syst</source>
          <year>2016</year>
          <volume>56</volume>
          <issue>1</issue>
          <fpage>79</fpage>
          <lpage>85</lpage>
          <pub-id pub-id-type="doi">10.1080/08874417.2015.11645804</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Fortmann</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wasmann</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Heuten</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>He</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tao</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hasan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Making lifelogging usable: design guidelines for activity trackers</article-title>
          <source>Multimedia Modeling</source>
          <year>2015</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>323</fpage>
          <lpage>34</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Briggs</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Fishwick</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Harris</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Trust and Mistrust of Online Health Sites</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2004</year>
          <conf-name>CHI'04</conf-name>
          <conf-date>April 24-29, 2004</conf-date>
          <conf-loc>New York, USA</conf-loc>
          <fpage>663</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1145/985692.985776</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Landau</surname>
              <given-names>LB</given-names>
            </name>
            <name name-style="western">
              <surname>Misago</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>Who to blame and what's to gain? reflections on space, state, and violence in Kenya and South Africa</article-title>
          <source>Africa Spectr</source>
          <year>2009</year>
          <month>04</month>
          <volume>44</volume>
          <issue>1</issue>
          <fpage>99</fpage>
          <lpage>100</lpage>
          <pub-id pub-id-type="doi">10.1177/000203970904400107</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Molyneux</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Goudge</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chuma</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gumede</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gilson</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Conducting health-related social science research in low income settings: ethical dilemmas faced in Kenya and South Africa</article-title>
          <source>J Int Dev</source>
          <year>2009</year>
          <month>03</month>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>309</fpage>
          <lpage>26</lpage>
          <pub-id pub-id-type="doi">10.1002/jid.1548</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mayer</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Schoorman</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>An integrative model of organizational trust</article-title>
          <source>Acad Manag Rev</source>
          <year>1995</year>
          <month>07</month>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>709</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jstor.org/stable/258792"/>
          </comment>
          <pub-id pub-id-type="doi">10.2307/258792</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heyns</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rothmann</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust</article-title>
          <source>S Afr J Indus Psychol</source>
          <year>2015</year>
          <month>02</month>
          <day>5</day>
          <volume>41</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.4102/sajip.v41i1.1263</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dimitriadis</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kyrezis</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Linking trust to use intention for technology-enabled bank channels: The role of trusting intentions</article-title>
          <source>Psychol Mark</source>
          <year>2010</year>
          <month>07</month>
          <day>6</day>
          <volume>27</volume>
          <issue>8</issue>
          <fpage>799</fpage>
          <lpage>820</lpage>
          <pub-id pub-id-type="doi">10.1002/mar.20358</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>An empirical examination of initial trust in mobile banking</article-title>
          <source>Internet Res</source>
          <year>2011</year>
          <month>08</month>
          <day>12</day>
          <volume>21</volume>
          <issue>5</issue>
          <fpage>527</fpage>
          <lpage>40</lpage>
          <pub-id pub-id-type="doi">10.1108/10662241111176353</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Colesca</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>Increasing e-trust: a solution to minimize risk in e-Government adoption</article-title>
          <source>J Appl Quant Methods</source>
          <year>2009</year>
          <volume>4</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <lpage>44</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.517.8969&#38;rep=rep1&#38;type=pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Turban</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>A trust model for consumer internet shopping</article-title>
          <source>Int J Electron Commer</source>
          <year>2001</year>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>91</lpage>
          <pub-id pub-id-type="doi">10.1080/10864415.2001.11044227</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rocker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Holzinger</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Medical Technology in Smart Homes: Exploring the User's Perspective on Privacy, Intimacy and Trust</article-title>
          <source>Proceedings of the 35th Annual Computer Software and Applications Conference Workshops</source>
          <year>2011</year>
          <conf-name>COMPSACW'11</conf-name>
          <conf-date>July 18-22, 2011</conf-date>
          <conf-loc>Munich, Germany</conf-loc>
          <pub-id pub-id-type="doi">10.1109/compsacw.2011.75</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ribadu</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>WB</given-names>
            </name>
          </person-group>
          <article-title>An integrated approach towards Sharia compliance E-commerce trust</article-title>
          <source>Appl Comput Inform</source>
          <year>2019</year>
          <month>01</month>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1016/j.aci.2017.09.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Keh</surname>
              <given-names>HT</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Corporate reputation and customer behavioral intentions: The roles of trust, identification and commitment</article-title>
          <source>Ind Mark Manag</source>
          <year>2009</year>
          <month>10</month>
          <volume>38</volume>
          <issue>7</issue>
          <fpage>732</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1016/j.indmarman.2008.02.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rindova</surname>
              <given-names>VP</given-names>
            </name>
            <name name-style="western">
              <surname>Williamson</surname>
              <given-names>IO</given-names>
            </name>
            <name name-style="western">
              <surname>Petkova</surname>
              <given-names>AP</given-names>
            </name>
            <name name-style="western">
              <surname>Sever</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Being good or being known: an empirical examination of the dimensions, antecedents, and consequences of organizational reputation</article-title>
          <source>Acad Manag J</source>
          <year>2005</year>
          <month>12</month>
          <volume>48</volume>
          <issue>6</issue>
          <fpage>1033</fpage>
          <lpage>49</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jstor.org/stable/20159728"/>
          </comment>
          <pub-id pub-id-type="doi">10.5465/amj.2005.19573108</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koufaris</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hampton-Sosa</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>The development of initial trust in an online company by new customers</article-title>
          <source>Inf Manag</source>
          <year>2004</year>
          <volume>41</volume>
          <issue>3</issue>
          <fpage>377</fpage>
          <lpage>97</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/iub.1366"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.im.2003.08.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wilczynski</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Melewar</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Measuring reputation in global markets—A comparison of reputation measures’ convergent and criterion validities</article-title>
          <source>J World Bus</source>
          <year>2013</year>
          <month>07</month>
          <volume>48</volume>
          <issue>3</issue>
          <fpage>329</fpage>
          <lpage>39</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jwb.2012.07.017</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wielki</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The social and ethical aspects connected with e-space development</article-title>
          <source>J Inf Com Ethics Soc</source>
          <year>2007</year>
          <month>11</month>
          <day>30</day>
          <volume>5</volume>
          <issue>4</issue>
          <fpage>321</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1108/14779960710846173</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Lo</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hui</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The antecedents of service quality and product quality and their influences on bank reputation: evidence from the banking industry in China</article-title>
          <source>Manag Serv Qual</source>
          <year>2003</year>
          <month>02</month>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>72</fpage>
          <lpage>83</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1108/09604520310456726"/>
          </comment>
          <pub-id pub-id-type="doi">10.1108/09604520310456726</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Haery</surname>
              <given-names>FA</given-names>
            </name>
            <name name-style="western">
              <surname>Ghorbani</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zamani</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Investigating the relationship between corporate reputation and customer behavioral intentions through roles of customer trust, customer commitment and customer recognition</article-title>
          <source>Int J Acad Res Bus Soc Sci</source>
          <year>2014</year>
          <month>04</month>
          <day>30</day>
          <volume>4</volume>
          <issue>4</issue>
          <fpage>470</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.6007/ijarbss/v4-i4/816</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jøsang</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ismail</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A survey of trust and reputation systems for online service provision</article-title>
          <source>Decis Support Syst</source>
          <year>2007</year>
          <month>03</month>
          <volume>43</volume>
          <issue>2</issue>
          <fpage>618</fpage>
          <lpage>44</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.dss.2005.05.019"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.dss.2005.05.019</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walsh</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Beatty</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Shiu</surname>
              <given-names>EM</given-names>
            </name>
          </person-group>
          <article-title>The customer-based corporate reputation scale: replication and short form</article-title>
          <source>J Bus Res</source>
          <year>2009</year>
          <month>10</month>
          <volume>62</volume>
          <issue>10</issue>
          <fpage>924</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.jbusres.2007.11.018"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2007.11.018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>NY</given-names>
            </name>
            <name name-style="western">
              <surname>Seock</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The impact of corporate reputation on brand attitude and purchase intention</article-title>
          <source>Fash Text</source>
          <year>2016</year>
          <month>10</month>
          <day>28</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>20</fpage>
          <pub-id pub-id-type="doi">10.1186/s40691-016-0072-y</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gorondutse</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Hilman</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Nasidi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Relationship between corporate reputation and customer loyalty on Nigerian food and beverages industry: PLS approach</article-title>
          <source>Int J Manag Bus Res</source>
          <year>2014</year>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>125</fpage>
          <lpage>36</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://iranjournals.nlai.ir/article_330649_6c27a5b4bd8eb121e5ddd6ae08bab4d5.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Flavián</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Guinalíu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Torres</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The influence of corporate image on consumer trust: A comparative analysis in traditional versus internet banking</article-title>
          <source>Internet Res</source>
          <year>2005</year>
          <month>09</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>447</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1108/10662240510615191</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Flavián</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Guinalíu</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site</article-title>
          <source>Ind Manage Data Syst</source>
          <year>2006</year>
          <month>06</month>
          <volume>106</volume>
          <issue>5</issue>
          <fpage>601</fpage>
          <lpage>20</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1108/02635570610666403"/>
          </comment>
          <pub-id pub-id-type="doi">10.1108/02635570610666403</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chellappa</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Pavlou</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>Perceived information security, financial liability and consumer trust in electronic commerce transactions</article-title>
          <source>Logist Inform Manag</source>
          <year>2002</year>
          <month>12</month>
          <volume>15</volume>
          <issue>5/6</issue>
          <fpage>358</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1108/09576050210447046</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Research on Cloud Computing Security Problem and Strategy</article-title>
          <source>Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks</source>
          <year>2012</year>
          <conf-name>CECNet'12</conf-name>
          <conf-date>April 21-23, 2012</conf-date>
          <conf-loc>Yichang, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/cecnet.2012.6202020</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zissis</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lekkas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Addressing cloud computing security issues</article-title>
          <source>Future Gener Comput Syst</source>
          <year>2012</year>
          <month>03</month>
          <volume>28</volume>
          <issue>3</issue>
          <fpage>583</fpage>
          <lpage>92</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.future.2010.12.006"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.future.2010.12.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doukas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Maglogiannis</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Koufi</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Malamateniou</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Vassilacopoulos</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Enabling Data Protection Through PKI Encryption in IoT m-Health Devices</article-title>
          <source>Proceedings of the 12th International Conference on Bioinformatics &#38; Bioengineering</source>
          <year>2012</year>
          <conf-name>BIBE'12</conf-name>
          <conf-date>November 11-13, 2012</conf-date>
          <conf-loc>Larnaca, Cyprus</conf-loc>
          <pub-id pub-id-type="doi">10.1109/bibe.2012.6399701</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>HJ</given-names>
            </name>
          </person-group>
          <article-title>Adoption of internet banking services in Gujarat: An extension of TAM with perceived security and social influence</article-title>
          <source>Int J Bank Mark</source>
          <year>2018</year>
          <month>02</month>
          <day>5</day>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>147</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1108/ijbm-08-2016-0104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aboobucker</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Bao</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>What obstruct customer acceptance of internet banking? Security and privacy, risk, trust and website usability and the role of moderators</article-title>
          <source>J High Technol Manag Res</source>
          <year>2018</year>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>109</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.hitech.2018.04.010"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.hitech.2018.04.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khalilzadeh</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ozturk</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Bilgihan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>05</month>
          <volume>70</volume>
          <fpage>460</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.01.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Menard</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mutchler</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Who to trust? applying trust to social commerce</article-title>
          <source>J Comput Inform Syst</source>
          <year>2019</year>
          <volume>59</volume>
          <issue>1</issue>
          <fpage>32</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1080/08874417.2017.1289356</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kargl</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lawrence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Fischer</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lim</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems</article-title>
          <source>Proceedings of the 7th International Conference on Mobile Business</source>
          <year>2008</year>
          <conf-name>ICMB'08</conf-name>
          <conf-date>July 7-8, 2008</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icmb.2008.31</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meingast</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Roosta</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sastry</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Security and Privacy Issues with Health Care Information Technology</article-title>
          <source>Proceedings of the International Conference of the IEEE Engineering in Medicine and Biology Society</source>
          <year>2006</year>
          <conf-name>IEMBS'06</conf-name>
          <conf-date>August 30-September 3, 2006</conf-date>
          <conf-loc>New York, NY, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/iembs.2006.260060</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ng</surname>
              <given-names>HS</given-names>
            </name>
            <name name-style="western">
              <surname>Sim</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Security issues of wireless sensor networks in healthcare applications</article-title>
          <source>BT Technol J</source>
          <year>2006</year>
          <month>04</month>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>138</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1007/s10550-006-0051-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Löhr</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sadeghi</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Winandy</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Securing the e-health cloud</article-title>
          <source>Proceedings of the 1st ACM International Health Informatics Symposium</source>
          <year>2010</year>
          <conf-name>IHI'10</conf-name>
          <conf-date>November 11-12, 2010</conf-date>
          <conf-loc>Arlington, Virginia, USA</conf-loc>
          <fpage>220</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1145/1882992.1883024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Plachkinova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Alluhaidan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chatterjee</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Health records on the Cloud: a security framework</article-title>
          <source>Proceedings of the 8th International Conference on Health Informatics and Medical Systems</source>
          <year>2015</year>
          <conf-name>HIMS'15</conf-name>
          <conf-date>January 12-15, 2015</conf-date>
          <conf-loc>Lisbon</conf-loc>
          <fpage>152</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pdfs.semanticscholar.org/be68/7bd6728c82e1208951305c6fb38fe292e5e5.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bouguettaya</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Eltoweissy</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy on the web: facts, challenges, and solutions</article-title>
          <source>IEEE Secur Priv</source>
          <year>2003</year>
          <month>11</month>
          <volume>1</volume>
          <issue>6</issue>
          <fpage>40</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1109/msecp.2003.1253567</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Topolovec-Vranic</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Natarajan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The use of social media in recruitment for medical research studies: a scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2016</year>
          <month>11</month>
          <day>7</day>
          <volume>18</volume>
          <issue>11</issue>
          <fpage>e286</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2016/11/e286/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.5698</pub-id>
          <pub-id pub-id-type="medline">27821383</pub-id>
          <pub-id pub-id-type="pii">v18i11e286</pub-id>
          <pub-id pub-id-type="pmcid">PMC5118584</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McRobert</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hill</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Smale</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hay</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>van der Windt</surname>
              <given-names>DA</given-names>
            </name>
          </person-group>
          <article-title>A multi-modal recruitment strategy using social media and internet-mediated methods to recruit a multidisciplinary, international sample of clinicians to an online research study</article-title>
          <source>PLoS One</source>
          <year>2018</year>
          <volume>13</volume>
          <issue>7</issue>
          <fpage>e0200184</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0200184"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0200184</pub-id>
          <pub-id pub-id-type="medline">29979769</pub-id>
          <pub-id pub-id-type="pii">PONE-D-17-07250</pub-id>
          <pub-id pub-id-type="pmcid">PMC6034855</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rockwood</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Regression-based statistical mediation and moderation analysis in clinical research: Observations, recommendations, and implementation</article-title>
          <source>Behav Res Ther</source>
          <year>2017</year>
          <month>11</month>
          <volume>98</volume>
          <fpage>39</fpage>
          <lpage>57</lpage>
          <pub-id pub-id-type="doi">10.1016/j.brat.2016.11.001</pub-id>
          <pub-id pub-id-type="medline">27865431</pub-id>
          <pub-id pub-id-type="pii">S0005-7967(16)30188-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fritz</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Mackinnon</surname>
              <given-names>DP</given-names>
            </name>
          </person-group>
          <article-title>Explanation of two anomalous results in statistical mediation analysis</article-title>
          <source>Multivariate Behav Res</source>
          <year>2012</year>
          <volume>47</volume>
          <issue>1</issue>
          <fpage>61</fpage>
          <lpage>87</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24049213"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/00273171.2012.640596</pub-id>
          <pub-id pub-id-type="medline">24049213</pub-id>
          <pub-id pub-id-type="pmcid">PMC3773882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Preacher</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>AF</given-names>
            </name>
          </person-group>
          <article-title>Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models</article-title>
          <source>Behav Res Methods</source>
          <year>2008</year>
          <month>08</month>
          <volume>40</volume>
          <issue>3</issue>
          <fpage>879</fpage>
          <lpage>91</lpage>
          <pub-id pub-id-type="doi">10.3758/brm.40.3.879</pub-id>
          <pub-id pub-id-type="medline">18697684</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>AF</given-names>
            </name>
            <name name-style="western">
              <surname>Scharkow</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The relative trustworthiness of inferential tests of the indirect effect in statistical mediation analysis: does method really matter?</article-title>
          <source>Psychol Sci</source>
          <year>2013</year>
          <month>10</month>
          <volume>24</volume>
          <issue>10</issue>
          <fpage>1918</fpage>
          <lpage>27</lpage>
          <pub-id pub-id-type="doi">10.1177/0956797613480187</pub-id>
          <pub-id pub-id-type="medline">23955356</pub-id>
          <pub-id pub-id-type="pii">0956797613480187</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>AF</given-names>
            </name>
          </person-group>
          <source>Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach. Second Edition</source>
          <year>2018</year>
          <publisher-loc>New Yourk</publisher-loc>
          <publisher-name>The Guilford Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tabachnick</surname>
              <given-names>BG</given-names>
            </name>
            <name name-style="western">
              <surname>Fidell</surname>
              <given-names>LS</given-names>
            </name>
          </person-group>
          <source>Using Multivariate Statistics</source>
          <year>2007</year>
          <publisher-loc>New York, USA</publisher-loc>
          <publisher-name>Pearson</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arpaci</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Understanding and predicting students' intention to use mobile cloud storage services</article-title>
          <source>Comput Hum Behav</source>
          <year>2016</year>
          <month>05</month>
          <volume>58</volume>
          <fpage>150</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.12.067</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Damghanian</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zarei</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kojuri</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Impact of perceived security on trust, perceived risk, and acceptance of online banking in Iran</article-title>
          <source>J Internet Commer</source>
          <year>2016</year>
          <month>09</month>
          <day>27</day>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>214</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1080/15332861.2016.1191052</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morawczynski</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Miscione</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Examining Trust in Mobile Banking Transactions: The Case of M-PESA in Kenya</article-title>
          <source>Proceedings of the International Conference on Human Choice and Computers</source>
          <year>2008</year>
          <conf-name>HCC'08</conf-name>
          <conf-date>September 25-26, 2008</conf-date>
          <conf-loc>Pretoria, South Africa</conf-loc>
          <fpage>287</fpage>
          <lpage>98</lpage>
          <pub-id pub-id-type="doi">10.1007/978-0-387-84822-8_19</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mmotlane</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Struwig</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Roberts</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The glue that binds or divides: social trust in South Africa</article-title>
          <source>HSRC Rev</source>
          <year>2010</year>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>4</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://repository.hsrc.ac.za/handle/20.500.11910/4106"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chinomona</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Brand communication, brand image and brand trust as antecedents of brand loyalty in Gauteng Province of South Africa</article-title>
          <source>African J Econ Manag Stud</source>
          <year>2016</year>
          <month>03</month>
          <day>14</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>124</fpage>
          <lpage>39</lpage>
          <pub-id pub-id-type="doi">10.1108/ajems-03-2013-0031</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naidoo</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Role stress and turnover intentions among information technology personnel in South Africa: The role of supervisor support</article-title>
          <source>S Afr J Hum Resour Manag</source>
          <year>2018</year>
          <volume>16</volume>
          <fpage>a936</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.4102/sajhrm.v16i0.936"/>
          </comment>
          <pub-id pub-id-type="doi">10.4102/sajhrm.v16i0.936</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>The role of cynicism and personal traits in the organizational political climate and sustainable creativity</article-title>
          <source>Sustainability</source>
          <year>2019</year>
          <month>01</month>
          <day>7</day>
          <volume>11</volume>
          <issue>1</issue>
          <fpage>257</fpage>
          <pub-id pub-id-type="doi">10.3390/su11010257</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Fan</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Niu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Tian</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Maternal exercise during pregnancy reduces the risk of preterm birth through the mediating role of placenta</article-title>
          <source>J Matern Fetal Neonatal Med</source>
          <year>2019</year>
          <month>01</month>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>109</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1080/14767058.2017.1372415</pub-id>
          <pub-id pub-id-type="medline">28847193</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barboza</surname>
              <given-names>GE</given-names>
            </name>
            <name name-style="western">
              <surname>Siller</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Child maltreatment, school bonds, and adult violence: a serial mediation model</article-title>
          <source>J Interpers Violence</source>
          <year>2018</year>
          <month>11</month>
          <day>05</day>
          <fpage>886260518805763</fpage>
          <comment>[Online ahead of print]</comment>
          <pub-id pub-id-type="doi">10.1177/0886260518805763</pub-id>
          <pub-id pub-id-type="medline">30392439</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>RR</given-names>
            </name>
            <name name-style="western">
              <surname>Channar</surname>
              <given-names>ZA</given-names>
            </name>
            <name name-style="western">
              <surname>Soomro</surname>
              <given-names>RH</given-names>
            </name>
            <name name-style="western">
              <surname>Vveinhardt</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Streimikiene</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Parmar</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Antecedents of symmetry in physicians’ prescription behavior: evidence from SEM-based multivariate approach</article-title>
          <source>Symmetry</source>
          <year>2018</year>
          <volume>10</volume>
          <issue>12</issue>
          <fpage>721</fpage>
          <pub-id pub-id-type="doi">10.3390/sym10120721</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Supakong</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Jarunratanakul</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>University initiation and the formation of group cohesion among students: a mediating role of social identification</article-title>
          <source>J Multidiscip Soc Sci</source>
          <year>2019</year>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>64</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pdfs.semanticscholar.org/4e45/55847d1ea41c67fac3b2d57638d1561b8a02.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
