<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v12i1e48700</article-id>
      <article-id pub-id-type="pmid">38085914</article-id>
      <article-id pub-id-type="doi">10.2196/48700</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Investigating Citizens’ Acceptance of Contact Tracing Apps: Quantitative Study of the Role of Trust and Privacy</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Buis</surname>
            <given-names>Lorraine</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zrubka</surname>
            <given-names>Zsombor</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Shoji</surname>
            <given-names>Masahiro</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Fox</surname>
            <given-names>Grace</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1392-6833</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>van der Werff</surname>
            <given-names>Lisa</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4529-4690</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Rosati</surname>
            <given-names>Pierangelo</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6070-0426</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Lynn</surname>
            <given-names>Theo</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Irish Institute of Digital Business</institution>
            <institution>Dublin City University</institution>
            <addr-line>Collins Ave, Dublin9</addr-line>
            <addr-line>Dublin</addr-line>
            <country>Ireland</country>
            <phone>353 1 700 6873</phone>
            <email>theo.lynn@dcu.ie</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9284-7580</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Irish Institute of Digital Business</institution>
        <institution>Dublin City University</institution>
        <addr-line>Dublin</addr-line>
        <country>Ireland</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>J.E. Cairnes School of Business &#38; Economics</institution>
        <institution>University of Galway</institution>
        <addr-line>Galway</addr-line>
        <country>Ireland</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Theo Lynn <email>theo.lynn@dcu.ie</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>18</day>
        <month>1</month>
        <year>2024</year>
      </pub-date>
      <volume>12</volume>
      <elocation-id>e48700</elocation-id>
      <history>
        <date date-type="received">
          <day>10</day>
          <month>5</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>18</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>20</day>
          <month>10</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>6</day>
          <month>12</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Grace Fox, Lisa van der Werff, Pierangelo Rosati, Theo Lynn. Originally published in JMIR mHealth and uHealth (https://mhealth.jmir.org), 18.01.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on https://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://mhealth.jmir.org/2024/1/e48700" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The COVID-19 pandemic accelerated the need to understand citizen acceptance of health surveillance technologies such as contact tracing (CT) apps. Indeed, the success of these apps required widespread public acceptance and the alleviation of concerns about privacy, surveillance, and trust.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to examine the factors that foster a sense of trust and a perception of privacy in CT apps. Our study also investigates how trust and perceived privacy influence citizens’ willingness to adopt, disclose personal data, and continue to use these apps.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Drawing on privacy calculus and procedural fairness theories, we developed a model of the antecedents and behavioral intentions related to trust and privacy perceptions. We used structural equation modeling to test our hypotheses on a data set collected at 2 time points (before and after the launch of a national CT app). The sample consisted of 405 Irish residents.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Trust in CT apps was positively influenced by propensity to trust technology (β=.074; <italic>P</italic>=.006), perceived need for surveillance (β=<italic>.</italic>119; <italic>P</italic>&#60;.001), and perceptions of government motives (β=.671; <italic>P</italic>&#60;.001) and negatively influenced by perceived invasion (β=−.224; <italic>P</italic>&#60;.001). Perceived privacy was positively influenced by trust (β=.466; <italic>P</italic>&#60;.001) and perceived control (β=.451; <italic>P</italic>&#60;.001) and negatively influenced by perceived invasion (β=−.165; <italic>P</italic>&#60;.001). Prelaunch intentions toward adoption were influenced by trust (β=<italic>.</italic>590; <italic>P</italic>&#60;.001) and perceived privacy (β=<italic>.</italic>247; <italic>P</italic>&#60;.001). Prelaunch intentions to disclose personal data to the app were also influenced by trust (β=.215; <italic>P</italic>&#60;.001) and perceived privacy (β=.208; <italic>P</italic>&#60;.001) as well as adoption intentions before the launch (β=.550; <italic>P</italic>&#60;.001). However, postlaunch intentions to use the app were directly influenced by prelaunch intentions (β=.530; <italic>P</italic>&#60;.001), but trust and perceived privacy only had an indirect influence. Finally, with regard to intentions to disclose after the launch, use intentions after the launch (β=.665; <italic>P</italic>&#60;.001) and trust (β=.215; <italic>P</italic>&#60;.001) had a direct influence, but perceived privacy only had an indirect influence. The proposed model explained 74.4% of variance in trust, 91% of variance in perceived privacy, 66.6% of variance in prelaunch adoption intentions, 45.9% of variance in postlaunch use intentions, and 83.9% and 79.4% of variance in willingness to disclose before the launch and after the launch, respectively.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Positive perceptions of trust and privacy can be fostered through clear communication regarding the need and motives for CT apps, the level of control citizens maintain, and measures to limit invasive data practice. By engendering these positive beliefs before launch and reinforcing them after launch, citizens may be more likely to accept and use CT apps. These insights are important for the launch of future apps and technologies that require mass acceptance and information disclosure.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy</kwd>
        <kwd>trust</kwd>
        <kwd>public health surveillance</kwd>
        <kwd>contact tracing</kwd>
        <kwd>mobile apps</kwd>
        <kwd>adoption</kwd>
        <kwd>information disclosure</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The outbreak of COVID-19 and the ensuing global pandemic resulted in many governments undertaking digital government transformation [<xref ref-type="bibr" rid="ref1">1</xref>] through the introduction of public health surveillance technologies including contact tracing (CT) apps [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. As a result, and unlike previous health emergencies, governments had access to an unprecedented volume, variety, and velocity of location and health data [<xref ref-type="bibr" rid="ref4">4</xref>]. The use of such data for epidemiological surveillance can aid in decision support, accelerate case identification, interrupt community transmission, and enable public health communication [<xref ref-type="bibr" rid="ref5">5</xref>]. Notwithstanding these benefits, the pace at which these apps have been implemented and the level of surveillance they enable have raised ethical concerns [<xref ref-type="bibr" rid="ref6">6</xref>] and fears around privacy and public trust [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
        <p>The success of CT apps is dependent on uptake by large populations [<xref ref-type="bibr" rid="ref8">8</xref>], and privacy-related concerns have been positioned as a critical barrier facing government-introduced CT apps [<xref ref-type="bibr" rid="ref9">9</xref>]. Government-introduced CT apps differ from surveillance technologies and mobile health (mHealth) apps, as they combine both location-based data and electronic personal health information (ePHI). Both these contexts, in themselves, raise significant privacy concerns, particularly with respect to potential secondary use and government intrusion [<xref ref-type="bibr" rid="ref10">10</xref>]. Thus, the COVID-19 pandemic presents a unique empirical context to explore citizens’ perceptions of health surveillance using mobile apps that capture both location-based data and ePHI. Government-introduced CT apps constitute a new public health context. Although there is an established literature based on traditional CT, digital CT is an innovation that can only be fully explored during pandemics, and thus research opportunities are limited. Given the novel context for individuals and public health agencies, where the former engage with new or unfamiliar trust referents, it is particularly critical to explore how individuals marry competing beliefs about surveillance, trust, and government motives for introducing these technologies and how these beliefs influence their behavioral responses. Extant literature has demonstrated the importance of trust in the government in influencing CT adoption [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>] and perceptions of CT technologies [<xref ref-type="bibr" rid="ref13">13</xref>] and shown that privacy concerns represent a barrier to adoption [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
      </sec>
      <sec>
        <title>Prior Work</title>
        <p>This study builds upon important extant research focusing on the acceptance of CT apps to delve further into the role of privacy and trust and addresses 3 gaps in the literature. First, existing studies support the importance of trust in driving the acceptance of CT apps, but the approach to measuring trust and the trust referent under examination varies. For example, studies have found that high trust in the national government, the health care system, and science positively impacted willingness to use CT apps in Switzerland [<xref ref-type="bibr" rid="ref14">14</xref>]. A US-based study found that trust in COVID-19 information positively influenced citizens’ comfort with and acceptance of CT [<xref ref-type="bibr" rid="ref8">8</xref>]. In this study, our emphasis is on technology-related trust, as opposed to trust in an individual or organization. Specifically, we examined trust perceptions regarding a specific technology, namely a CT app. In addition, we investigated the perceptual factors that shape trust, namely perceptions of government motivations, need for surveillance, and propensity to trust technology (PTTT).</p>
        <p>Second, studies have investigated the influence of privacy on CT adoption, with many studies finding that privacy concerns reduce intentions toward adopt CT apps [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. Several studies conclude that privacy represents a barrier to the success of CT apps, with respondents in several countries citing privacy concerns as a reason for not installing apps [<xref ref-type="bibr" rid="ref9">9</xref>] or conversely, those with low privacy concerns are more likely to use CT apps [<xref ref-type="bibr" rid="ref12">12</xref>]. However, the influence of privacy concerns on CT adoption intentions was weak in another study [<xref ref-type="bibr" rid="ref15">15</xref>]. Although privacy concerns are the most common proxy for measuring privacy across many contexts, the negative connotation and failure to directly capture privacy suggest the need for more precise operationalization [<xref ref-type="bibr" rid="ref16">16</xref>]. Thus, we focus on perceived privacy defined as “an individual’s self-assessed state in which external agents have limited access to information about him or her” [<xref ref-type="bibr" rid="ref16">16</xref>]. In this study, perceived privacy refers to a citizen’s belief in the level of privacy afforded by the CT app. Perceived privacy influenced intentions toward CT apps in a recent Brazilian study, thus supporting its use [<xref ref-type="bibr" rid="ref17">17</xref>]. To further our understanding of perceived privacy, this study investigated the role of trust, perceived control, and perceived intrusion in shaping citizens’ perceptions of privacy.</p>
        <p>Third, many CT studies are cross-sectional in nature, with the exception of a small number of longitudinal studies [<xref ref-type="bibr" rid="ref12">12</xref>]. In addition, the literature focuses largely on whether citizens adopt CT apps or engage in behaviors recommended by CT apps such as staying at home [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. This study broadens our understanding of citizens’ acceptance of CT apps by examining 2 variables related to acceptance, namely intention to adopt or continue using the app and willingness to disclose personal information. These acceptance variables are measured before and after the app launch, thereby deepening our understanding of how privacy and trust influence intentions toward and use of CT apps.</p>
        <p>We argue that understanding the determinants of success of CT apps is critical not only for future digital CT but also for other contexts that require rapid digital technology adoption by the population [<xref ref-type="bibr" rid="ref19">19</xref>]. This paper proceeds with an overview of the hypothesized relationships and our research context. Our methodology, data analysis, and results are presented in the following sections. The <italic>Discussion</italic> section outlines the implications of this study. The paper concludes with the limitations and avenues for future research.</p>
      </sec>
      <sec>
        <title>Theory</title>
        <sec>
          <title>Overview</title>
          <p>Privacy Calculus Theory (PCT) posits that before engaging in a behavior such as adopting a new technology or disclosing personal information, individuals will conduct a cognitive comparison of the costs and benefits associated with this behavior [<xref ref-type="bibr" rid="ref20">20</xref>]. Individuals are likely to engage in the behavior for as long as the benefits outweigh the costs [<xref ref-type="bibr" rid="ref20">20</xref>]. Thus, PCT has direct comparisons with the concept of calculus-based trust, which underpins trust decisions when engaging with new or unfamiliar trust referents [<xref ref-type="bibr" rid="ref21">21</xref>]. PCT has been operationalized in many contexts using a variety of belief-based variables that can be grouped into confidence beliefs and risk or privacy beliefs. An extension of PCT that holds considerable promise for understanding privacy and trust in the context of CT apps is the inclusion of the procedural fairness theory. Procedural fairness refers to an individual’s perception that a particular activity is conducted fairly [<xref ref-type="bibr" rid="ref22">22</xref>]. In the context of information privacy, fairness refers to the perception that personal data are collected and used fairly. Culnan and Armstrong [<xref ref-type="bibr" rid="ref22">22</xref>] proposed that perceptions of procedural fairness can help citizens to “strike a balance between the competing forces of privacy and information use.” Individuals’ perceptions of the fairness of an organization’s data collection and use practices can influence their decision-making related to technology use and information disclosure [<xref ref-type="bibr" rid="ref23">23</xref>]. In this study, we investigated the drivers of trust and privacy through the procedural fairness lens, which suggests the importance of factors related to the legitimacy of data collection (ie, the need for government surveillance and perceptions of the government’s motive for the app), the costs to the citizen (ie, perceived intrusion), and the level of autonomy and input citizens are afforded (ie, perceived control). Furthermore, the wider literature on fairness and trust suggests that individual differences in citizens’ PTTT are likely to play an important role alongside procedural fairness perceptions in trust [<xref ref-type="bibr" rid="ref24">24</xref>], particularly given the unfamiliar referent of the CT app. In addition, the theory of reasoned action (TRA) allows us to consider the influence of these perceptions on behavioral outcomes. The TRA argues that individuals’ behaviors are determined by their beliefs, attitudes, and intentions [<xref ref-type="bibr" rid="ref25">25</xref>]. We propose that individuals will express positive intentions toward downloading the app and disclosing information if they believe that the app demonstrates fairness.</p>
        </sec>
        <sec>
          <title>Hypotheses</title>
          <p>Trust is an important factor in the success of CT apps as demonstrated in recent studies [<xref ref-type="bibr" rid="ref14">14</xref>]. Indeed, trust allows individuals to overcome concerns about uncertainty and fosters a willingness to engage in trust-related behaviors, such as disclosing information and engaging with technology [<xref ref-type="bibr" rid="ref26">26</xref>]. In this study, our emphasis is on technology-related trust, which refers to individuals’ beliefs that the technology in question will perform as expected [<xref ref-type="bibr" rid="ref27">27</xref>]. Trust perceptions refer to the extent to which the CT app will consistently deliver the proposed services and act in citizens’ best interest.</p>
          <p>A significant body of theoretical work suggests that variables related to trust propensity are important drivers of trust perceptions [<xref ref-type="bibr" rid="ref28">28</xref>], particularly in new and unfamiliar trust referents [<xref ref-type="bibr" rid="ref29">29</xref>]. PTTT refers to a general tendency that is not specific to one trustee or situation but focuses on individuals’ willingness to depend on technology across different contexts and technologies [<xref ref-type="bibr" rid="ref27">27</xref>]. We propose that, in the current context, PTTT will positively influence trust in CT apps.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 1a: PTTT will have a positive association with trust in the app.</italic>
              </p>
            </list-item>
          </list>
          <p>Surveillance programs are often introduced following large-scale events such as terrorist attacks [<xref ref-type="bibr" rid="ref30">30</xref>]. Given the public health emergency caused by the COVID-19 pandemic, the importance of surveillance technologies, such as CT apps, is clear. The link between surveillance and trust has long attracted discussion with Dutton et al [<xref ref-type="bibr" rid="ref31">31</xref>], highlighting the existence of <italic>trust tension</italic> between the government’s need to collect surveillance data and citizens’ concerns about the excessive use of this information. They assert that developing trust is imperative for resolving this tension. As CT apps require the surveillance of large groups of people [<xref ref-type="bibr" rid="ref32">32</xref>], citizens must understand the need for government surveillance in the general sense to build trust in a CT app. Need for government surveillance refers to individuals’ perceptions that the government requires authority to access personal information using web-based means [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 1b: need for surveillance will have a positive association with trust in the app.</italic>
              </p>
            </list-item>
          </list>
          <p>Procedural fairness theory suggests that if individuals believe that the government’s motivations to introduce the app are rooted in good intentions, such as reducing virus transmission, they will express higher trust in the app to perform consistently and with their best interests in mind. Indeed, a perception of benevolent motives is at the heart of theories regarding trustworthiness [<xref ref-type="bibr" rid="ref28">28</xref>], and perceptions of trustworthiness at the government level are likely to trickle down to influence trust in related referents [<xref ref-type="bibr" rid="ref34">34</xref>]. Accordingly, we posit that government motive will engender trust in the app.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 1c: government motive will have a positive association with trust in the app.</italic>
              </p>
            </list-item>
          </list>
          <p>Government surveillance technologies can garner negative opinions, which may lead individuals to alter their behaviors. Perceived intrusion is described as a “harmful incursion into the personal information space” [<xref ref-type="bibr" rid="ref35">35</xref>]. This relates to procedural justice and individuals’ perceptions of whether data are collected fairly in the CT app. Government surveillance technologies can be viewed as intrusive, but not all intrusions are considered harmful [<xref ref-type="bibr" rid="ref35">35</xref>]. For example, the CT app may be viewed as intrusive, but as data are collected to reduce virus transmission, some individuals may not view this as harmful. Thus, only if individuals believe that the intrusiveness of the app is harmful to them, then their trust in the app is likely to be reduced.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 1d: perceived intrusion will have a negative association with trust in the app.</italic>
              </p>
            </list-item>
          </list>
          <p>Studies have asserted that privacy concerns represent a barrier to the success of CT apps [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. However, there is a lack of research examining <italic>if</italic> citizens are likely to accept CT apps when they perceive that they provide some level of privacy. As perceived privacy refers to a perception that access to personal information by external agents is limited, the relevance of perceived intrusion as a privacy cost resulting from the use of an app is apparent. Indeed, the potential of CT apps to violate citizens’ privacy has been raised [<xref ref-type="bibr" rid="ref36">36</xref>]. Thus, if individuals believe that the app is intrusive in a harmful manner in their informational space, they are less likely to believe that the app affords them privacy.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 2a: perceived intrusion will have a negative association with perceived privacy.</italic>
              </p>
            </list-item>
          </list>
          <p>Perceived control is described as individuals’ perceptions of their ability to control their personal information [<xref ref-type="bibr" rid="ref37">37</xref>]. If individuals perceive that they maintain control over their information when transacting with a technology, they are more likely to feel comfortable that the technology will not act in a harmful manner [<xref ref-type="bibr" rid="ref37">37</xref>], strengthening their perception of privacy in that context. A recent study supports the positive association between perceived control and perceived privacy of CT apps in Brazil [<xref ref-type="bibr" rid="ref17">17</xref>]. We proposed that if individuals believe that they maintain control in the app, they will express higher levels of perceived privacy.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 2b: perceived control will have a positive association with perceived privacy.</italic>
              </p>
            </list-item>
          </list>
          <p>Finally, we argue that from a theoretical perspective, trust in the app will act as an uncertainty-reducing mechanism [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] and a heuristic that allows citizens to form privacy perceptions. Specifically, if citizens believe that the app will perform consistently and with their best interests in mind when using personal information, they will believe that the app provides some degree of privacy. This uncertainty reduction provides a foundation for facilitating other judgments of a technological artifact. Thus, trust in the app may influence perceptions of privacy.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>Hypothesis 2c: trust in the app will have a positive association with perceived privacy.</italic>
              </p>
            </list-item>
          </list>
          <p>The success of CT apps is largely dependent on a critical mass of people downloading [<xref ref-type="bibr" rid="ref40">40</xref>] and disclosing personal information. Thus, we draw on the TRA to consider 2 context-critical dependent variables: adoption intention and willingness to disclose personal information. Before the app launch, these variables were behavioral intentions. Adoption intention is described as an individual’s internal subjective judgment of the probability that they will perform the behavior in question [<xref ref-type="bibr" rid="ref25">25</xref>]. The willingness to disclose information is based on an individual’s willingness to provide personal information when using the app [<xref ref-type="bibr" rid="ref33">33</xref>]. Trust has repeatedly been identified as a driver of behavioral intentions across a range of contexts, including the acceptance of e-government technologies [<xref ref-type="bibr" rid="ref41">41</xref>] and surveillance [<xref ref-type="bibr" rid="ref30">30</xref>]. Indeed, behavioral operationalizations of trust often use behavioral intentions related to disclosure and reliance [<xref ref-type="bibr" rid="ref42">42</xref>]. Empirical evidence suggests that perceived privacy influences intentions toward the use and data disclosure in general CT apps [<xref ref-type="bibr" rid="ref17">17</xref>]. Although our study focuses on the privacy perception of a government-led CT app as opposed to general CT apps, we argue for similar effects. Finally, if individuals express high intentions toward downloading the app, we argue that they will be more willing to disclose personal information, as it is crucial to the app’s functionality.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>H3a-b: trust in the app before the launch (a) and perceived privacy (b) will have a positive association with adoption intentions before the launch.</italic>
              </p>
            </list-item>
            <list-item>
              <p>
                <italic>H4a-c: trust in the app before the launch (a), perceived privacy (b), and adoption intentions before the launch (c) will have a positive association with disclosure intentions before the launch.</italic>
              </p>
            </list-item>
          </list>
          <p>There have been calls for research to understand the perceptions of a technology before and after the launch [<xref ref-type="bibr" rid="ref43">43</xref>]. In the context of CT apps, it is important to explore how both perceptions of privacy and trust influence individuals’ behavioral intentions after launch. Thus, we examined both intentions after the launch. As some individuals may have already downloaded the app, adoption intentions are represented by future use intentions, which encompasses intentions to continue use among app users and intentions to adopt in the future among nonusers. TRA asserts that intentions will lead to behavior [<xref ref-type="bibr" rid="ref44">44</xref>]. In other words, individuals’ intentions to download the app before the launch will be positively related to their use intentions after the launch. We draw on the TRA to posit effects similar to those hypothesized for before the launch. We argue that trust perceptions regarding the app and perceived privacy will positively impact use intentions after the launch.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>H5a-b: trust in the app (a) and perceived privacy (b) will have a positive association with intentions to use after the launch.</italic>
              </p>
            </list-item>
            <list-item>
              <p>
                <italic>H5c: adoption intentions before the launch will have a positive association with intentions to use after the launch.</italic>
              </p>
            </list-item>
          </list>
          <p>The influence of trust and privacy on the willingness to disclose a specific surveillance technology after the launch has not been explored. Again, we leverage the TRA intention-behavior link and our hypotheses before the launch and argue that trust and perceived privacy will positively impact willingness to disclose personal information after the launch. Finally, as was the case before the launch, we argue that if individuals express high intentions toward using the app after the launch, they will be more willing to disclose personal information.</p>
          <list list-type="bullet">
            <list-item>
              <p>
                <italic>H6a-b: trust in the app (a) and perceived privacy (b) will have a positive association with disclosure intentions after the launch.</italic>
              </p>
            </list-item>
            <list-item>
              <p>
                <italic>H6c: intentions to use after the launch will have a positive association with disclosure intentions after the launch.</italic>
              </p>
            </list-item>
          </list>
          <p>The hypotheses are depicted in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Research model.</p>
            </caption>
            <graphic xlink:href="mhealth_v12i1e48700_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Context</title>
        <p>On July 6, 2020, the COVID Tracker app was launched in Ireland. COVID Tracker has 3 main features. CT uses Bluetooth and anonymous ID numbers to log phones within close contact for more than 15 minutes. It downloads the anonymous ID numbers of people who have tested positive and provides an alert if the user has been in close contact with those ID numbers. Check-in allows users to check for symptoms and seek health advice. The updates provide an overview of the daily COVID-19 figures. Within 48 hours of launch, 1 million people had downloaded the app [<xref ref-type="bibr" rid="ref45">45</xref>]. By November 2021, the COVID Tracker app had over 1.7 million active users, representing 67% to 76% of the total possible Irish users [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
      </sec>
      <sec>
        <title>Instrument Development</title>
        <p>We used existing scales when developing our instrument with minor wording amendments to adapt the items to the context. We provide the full list of items in Table S1 in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. The survey at T1 included general constructs related to PTTT, the need for government surveillance, and situationally framed constructs related to the proposed app, namely government motive for introducing the app, trust in the app, perceived surveillance in the app, perceived control in the app, and perceived privacy in the app. The dependent variables included intention to download the app on launch and willingness to disclose personal information to use the app. At T2, the emphasis was on future behavioral intentions, namely the use of the app and information disclosure. At T2, we asked participants if they had downloaded the app, and app users’ intentions to continue to use the app were examined and nonusers’ intentions to download the app in the future were examined. These intentions were combined as use intentions for analysis. Willingness to disclose personal information to the app was examined across both users and nonusers of the app. In addition, gender, age, and education were used as the control variables. Respondents were asked if they had any health condition that left them particularly susceptible to COVID-19. This was also a control variable. Both surveys were piloted and tested among a small panel of survey design experiments, and several wording amendments were made. Respondents were asked to answer demographic and health questions first, followed by general perceptual constructs and control variables, the order of which was randomized. In the third section, participants were presented with a neutrally framed description of the proposed national CT app at T1, and a description of the launched app was presented at T2. The final section examined perceptions of the app, behavioral intentions, and willingness to disclose personal data, the order of which was randomized.</p>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>Ethics approval was obtained from the university’s research ethics committee before the launch of the survey (DCUREC/2020/096).</p>
      </sec>
      <sec>
        <title>Recruitment</title>
        <p>Qualtrics (Qualtrics International Inc) was used to host and administer the survey using their panel services. An attention check was included to screen for unengaged responses. A total of 1109 complete responses were received at T1 and were recontacted at T2. After 2 follow-up invitations, 405 responses were received at T2, achieving a response rate of 36.5%. Responses at T1 and T2 were, on average, 77 days apart. Incomplete responses and responses failing the attention check were removed using Qualtrics. The sample characteristics are illustrated in <xref ref-type="table" rid="table1">Table 1</xref>, along with the population characteristics as per the latest census at the time of data collection. Overall, the sample demographics were similar to the population characteristics of Ireland, as reported in the last census, and included respondents from the 26 counties within the country. Of the 405 respondents in T2, 202 had downloaded the app and 203 had not yet downloaded the app.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Sample and population characteristics (N=405).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="300"/>
            <col width="320"/>
            <col width="350"/>
            <thead>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>Sample, n (%)</td>
                <td>Population (%)<sup>a,b</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Gender</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Man</td>
                <td>180 (44.4)</td>
                <td>49</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Woman</td>
                <td>225 (55.6)</td>
                <td>51</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Rather not say</td>
                <td>0 (0)</td>
                <td>N/A<sup>c</sup></td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Age group (years)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>18-24</td>
                <td>13 (3.2)</td>
                <td>11</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>25-44</td>
                <td>124 (30.6)</td>
                <td>39</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>45-64</td>
                <td>173 (42.7)</td>
                <td>32</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>≥65</td>
                <td>95 (23.5)</td>
                <td>18</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Employment</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Employed</td>
                <td>186 (45.9)</td>
                <td>45</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Self-employed</td>
                <td>26 (6.4)</td>
                <td>8</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Unemployed</td>
                <td>36 (8.9)</td>
                <td>6</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Student</td>
                <td>11 (2.7)</td>
                <td>11</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Unavailable for work</td>
                <td>42 (10.4)</td>
                <td>12</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Retired</td>
                <td>104 (25.7)</td>
                <td>15</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Education</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Secondary school</td>
                <td>157 (38.8)</td>
                <td>28</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Trade</td>
                <td>5 (1.2)</td>
                <td>7</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Diploma</td>
                <td>32 (7.9)</td>
                <td>12</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Bachelor degree</td>
                <td>133 (32.8)</td>
                <td>27</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Other qualification</td>
                <td>64 (15.8)</td>
                <td>14</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Doctorate degree</td>
                <td>14 (3.5)</td>
                <td>1</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>Population figures are based on data provided by the Irish Central Statistics Office in the latest population census at the time of data collection (ie, 2016).</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>Employment and education figures include all people aged ≥15 years living in Ireland in 2016, whereas our sample only includes people aged ≥18 years.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Reliability and Validity Testing</title>
        <p>Data analysis was performed using IBM AMOS (version 25.0). The proposed model comprising 11 constructs was examined using Confirmatory Factor Analysis with further detail provided in Table S2 in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. In total, 3 items were dropped from the PTTT because of their low loadings. The model indicated a good fit: c<sub>min</sub>/df=1.805, comparative fit index=0.980, root mean square error of approximation=0.045, and standardized root mean squared residual=0.034. A test of equal specific bias was conducted to examine potential common method bias among the data [<xref ref-type="bibr" rid="ref47">47</xref>]. This test demonstrated an unevenly distributed bias; thus, the specific bias construct was retained for causal analysis to control for any effects because of method [<xref ref-type="bibr" rid="ref48">48</xref>]. The validity and reliability of all the constructs were explored. Convergent validity was assessed by calculating the average variance extracted (AVE). As all the variables had AVE scores above 0.500, convergent validity was achieved [<xref ref-type="bibr" rid="ref49">49</xref>]. Discriminant validity was tested by comparing the square root of the AVE with the interconstruct correlations. As the square root of AVE was higher than the interconstruct correlations, discriminant validity was achieved, as shown by the italicized diagonal values in <xref ref-type="table" rid="table2">Table 2</xref>. Reliability was assessed by calculating composite reliability for each construct. With composite reliability scores above 0.700, all constructs were reliable [<xref ref-type="bibr" rid="ref50">50</xref>]. Further details on the validity testing are provided in the supplementary appendices available on the web.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Validity and reliability statistics.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="160"/>
            <col width="90"/>
            <col width="80"/>
            <col width="70"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <thead>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Composite reliability</td>
                <td>Average variance extracted</td>
                <td>1</td>
                <td>2</td>
                <td>3</td>
                <td>4</td>
                <td>5</td>
                <td>6</td>
                <td>7</td>
                <td>8</td>
                <td>9</td>
                <td>10</td>
                <td>11</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Need for Surveillance</td>
                <td>0.868</td>
                <td>0.526</td>
                <td>
                  <italic>0.725</italic>
                  <sup>a</sup>
                </td>
                <td>—<sup>b</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Propensity to trust technology</td>
                <td>0.870</td>
                <td>0.626</td>
                <td>0.183<sup>c</sup></td>
                <td>
                  <italic>0.791</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Perceived control</td>
                <td>0.967</td>
                <td>0.879</td>
                <td>0.329<sup>d</sup></td>
                <td>0.210<sup>d</sup></td>
                <td>
                  <italic>0.938</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Willingness to disclose information (T1)</td>
                <td>0.983</td>
                <td>0.966</td>
                <td>0.378<sup>d</sup></td>
                <td>0.271<sup>d</sup></td>
                <td>0.682<sup>d</sup></td>
                <td>
                  <italic>0.983</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Intention to adopt (T1)</td>
                <td>0.990</td>
                <td>0.970</td>
                <td>0.342<sup>d</sup></td>
                <td>0.270<sup>d</sup></td>
                <td>0.666<sup>d</sup></td>
                <td>0.872<sup>d</sup></td>
                <td>
                  <italic>0.985</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Perceived intrusion</td>
                <td>0.932</td>
                <td>0.820</td>
                <td>−0.181<sup>e</sup></td>
                <td>−0.109<sup>e</sup></td>
                <td>−0.471<sup>d</sup></td>
                <td>−0.508<sup>d</sup></td>
                <td>−0.397<sup>d</sup></td>
                <td>
                  <italic>0.906</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Trust in App</td>
                <td>0.916</td>
                <td>0.786</td>
                <td>0.365<sup>d</sup></td>
                <td>0.336<sup>d</sup></td>
                <td>0.702<sup>d</sup></td>
                <td>0.814<sup>d</sup></td>
                <td>0.784<sup>d</sup></td>
                <td>−0.491<sup>d</sup></td>
                <td>
                  <italic>0.886</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Perceived Privacy in App</td>
                <td>0.962</td>
                <td>0.895</td>
                <td>0.371<sup>d</sup></td>
                <td>0.259<sup>d</sup></td>
                <td>0.852<sup>d</sup></td>
                <td>0.801<sup>d</sup></td>
                <td>0.753<sup>d</sup></td>
                <td>−0.603<sup>d</sup></td>
                <td>0.852<sup>d</sup></td>
                <td>
                  <italic>0.946</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Intention to adopt or use (T2)</td>
                <td>0.991</td>
                <td>0.973</td>
                <td>0.234<sup>d</sup></td>
                <td>0.167<sup>e</sup></td>
                <td>0.500<sup>d</sup></td>
                <td>0.612<sup>d</sup></td>
                <td>0.658<sup>d</sup></td>
                <td>−0.347<sup>d</sup></td>
                <td>0.574<sup>d</sup></td>
                <td>0.548<sup>d</sup></td>
                <td>
                  <italic>0.986</italic>
                </td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Willingness to disclose information (T2)</td>
                <td>0.985</td>
                <td>0.970</td>
                <td>0.309<sup>d</sup></td>
                <td>0.241<sup>d</sup></td>
                <td>0.537<sup>d</sup></td>
                <td>0.678<sup>d</sup></td>
                <td>0.666<sup>d</sup></td>
                <td>−0.401<sup>d</sup></td>
                <td>0.686<sup>d</sup></td>
                <td>0.646<sup>d</sup></td>
                <td>0.844<sup>d</sup></td>
                <td>
                  <italic>0.985</italic>
                </td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Government motive</td>
                <td>0.971</td>
                <td>0.894</td>
                <td>0.246<sup>d</sup></td>
                <td>0.332<sup>d</sup></td>
                <td>0.550<sup>d</sup></td>
                <td>0.682<sup>d</sup></td>
                <td>0.654<sup>d</sup></td>
                <td>−0.378<sup>d</sup></td>
                <td>0.799<sup>d</sup></td>
                <td>0.658<sup>d</sup></td>
                <td>0.494<sup>d</sup></td>
                <td>0.575<sup>d</sup></td>
                <td>
                  <italic>0.946</italic>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>As the square root of AVE was higher than the interconstruct correlations, discriminant validity was achieved, as shown by the italicized values.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>Not available.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>Significance at 10% level.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>Significance at 1% level.</p>
            </fn>
            <fn id="table2fn5">
              <p><sup>e</sup>Significance at 5% level.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Hypotheses Testing</title>
        <p>The causal model was tested using Structural Equation Modeling in AMOS. The model indicated a good fit c<sub>min</sub>/df=2.835, comparative fit index=0.985, root mean square error of approximation=0.067, and standardized root mean squared residual=0.021. H1a-d focused on the antecedents of trust in the app. H1a proposed a positive relationship between PTTT and trust. The data revealed a positive, significant relationship supporting hypothesis 1a (β=.074; <italic>P</italic>=.006). Hypothesis 1b posited that the perceived need for government surveillance would positively influence trust. This was also supported (hypothesis 1b: β=.119; <italic>P</italic>&#60;.001). H1c posited that government motive would be positively related to trust. The data supported the hypothesis (hypothesis 1c: β=.671; <italic>P</italic>&#60;.001). The negative relationship between perceived intrusion and trust was supported (hypothesis 1d: β=−.224; <italic>P</italic>&#60;.001). The following set of hypotheses examined the antecedents of perceived privacy. Hypothesis 2a proposed a negative association between perceived intrusion and perceived privacy. These data supported hypothesis 2a (β=−.165; <italic>P</italic>&#60;.001). We hypothesized that perceived control and trust would be positively related to perceived privacy. Both relationships were supported (hypothesis 2b: β=.451; <italic>P</italic>&#60;.001; H2c: β=.466; <italic>P</italic>&#60;.001).</p>
        <p>In terms of T1 behavioral intentions, it was posited that perceived privacy and trust would positively influence the intention to adopt. Both relationships were supported (hypothesis 3a: β=.247; <italic>P</italic>&#60;.001; hypothesis 3b: β=.590; <italic>P</italic>&#60;.001). H4a-c proposed that trust, perceived privacy, and adoption intentions would positively influence willingness to disclose personal information. The data revealed that trust (β=.215; <italic>P</italic>&#60;.001), perceived privacy (β=.208; <italic>P</italic>&#60;.001), and adoption intentions (β=.550; <italic>P</italic>&#60;.001) each positively influenced willingness to disclose. In terms of T2 behavioral intentions, hypothesis 5a to 5c proposed that trust, perceived privacy, and adoption intentions (T1) would all influence use intentions (T2). Both trust (β=.124; <italic>P</italic>=.15) and perceived privacy (β=.042; <italic>P</italic>=.60) had a positive but nonsignificant influence on intentions. T1 adoption intentions significantly influenced use intentions supporting hypothesis 5c (β=.530; <italic>P</italic>&#60;.001). Finally, trust, perceived privacy, and use intentions at T2 were proposed to positively influence the willingness to disclose at T2. Perceived privacy (β=.042; <italic>P</italic>=.40) had a nonsignificant influence, whereas trust and use intentions had significant relationships supporting hypothesis 6a and hypothesis 6c (hypothesis 6a: β=.250; <italic>P</italic>&#60;.001; H6c: β=.655; <italic>P</italic>&#60;.001). In terms of control variables, COVID-19 vulnerable illness had a significant negative effect on individuals’ willingness to disclose at T1 (β=−.043; <italic>P</italic>=.009), and education had a positive effect on T2 use intentions (β=.075; <italic>P</italic>=.04).</p>
        <p>The model explains 74.4% of variance in trust, 91% of variance in perceived privacy, 66.6% of variance in T1 adoption intentions, 45.9% of variance in T2 adoption intentions, and 83.9% and 79.4% of variance in willingness to disclose at T1 and T2. Bootstrapping using 2000 samples and a confidence level of 90% was conducted in AMOS to explore the indirect effects. The findings revealed that perceived privacy had a significant influence on T2 adoption intentions (β=.131; <italic>P</italic>=.001) and willingness to disclose at T2 (β=.127; <italic>P</italic>=.04). Similarly, trust had a significant influence on intention to download (β=.394; <italic>P</italic>&#60;.001) and willingness to disclose at T2 (β=.386; <italic>P</italic>&#60;.001). Further detail is provided in Table S3 in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This study focuses on understanding how citizens’ beliefs shape their perceptions of privacy and trust to influence their acceptance of a CT app for COVID-19. Our study found that trust in the app was positively influenced by the PTTT, perceived government motive, and perceived need for government surveillance, whereas perceived intrusion had a negative influence. Perceived privacy was positively shaped by perceptions of control and trust and negatively shaped by perceived invasion. The study examined citizens’ acceptance of CT app at 2 time intervals. Before launch, the intention to adopt the app was positively influenced by trust and perceived privacy, and willingness to disclose personal information to the app was influenced by adoption intentions, trust, and perceived privacy. However, postlaunch use intentions were influenced only by prelaunch adoption intentions, whereas willingness to disclose personal information was influenced by trust and postlaunch use intentions but not by perceived privacy. Although the insignificant results may suggest that perceived privacy is only important before launch, and the influence of trust on use intentions diminishes over time, post hoc bootstrapping analysis revealed that both perceived privacy and trust had significant indirect relationships with use intentions and willingness to disclose information at T2. This suggests that both perceptions play a role in influencing behavioral intentions before and after the launch.</p>
      </sec>
      <sec>
        <title>Contributions</title>
        <p>Studies have shown that trust and privacy are important factors in the success of health surveillance technologies such as CT apps [<xref ref-type="bibr" rid="ref11">11</xref>]. Our study leverages the procedural fairness theory to understand how citizens’ perceptions of trust and privacy emerge in the context of a CT app. This context is interesting, as the technology in question was introduced by the national government and backed by several organizations with the app’s potential benefits extending to the public at large. Therefore, it is important to look beyond the role of a single organization in driving perceptions of fairness to consider a broader set of antecedents that drive perceptions of trust and privacy in this context. Indeed, as research has shown the importance of trust and privacy in the success of mHealth and health technologies introduced by health care organizations and indeed national health systems [<xref ref-type="bibr" rid="ref51">51</xref>], our study contributes to the broader health technology literature.</p>
        <p>The first contribution of our study is the deeper understanding of how trust is formed in this context. Lack of trust in the government has been identified as a barrier to CT app adoption [<xref ref-type="bibr" rid="ref18">18</xref>]. Thus, it is important to provide governments and public health organizations with insights into how trust in CT can be fostered [<xref ref-type="bibr" rid="ref8">8</xref>]. Our findings bolster assertions regarding the important role of fairness perceptions and suggest that citizens’ trust perceptions regarding the app are formed based on their beliefs about the legitimacy of data collection, perceived autonomy, and perceived costs. Legitimacy is represented by citizens’ perceptions of the need for government surveillance and perceptions of the government’s motive for introducing the app, autonomy is captured by perceptions of control over one’s information in the app, and perceived costs to the individual relate to perceptions of personal intrusion.</p>
        <p>The second contribution of our study is the investigation of how perceptions of privacy are formed. Many studies have highlighted the negative impact of privacy concerns on CT adoption [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref52">52</xref>-<xref ref-type="bibr" rid="ref54">54</xref>]. However, we argue that privacy can be seen as a factor driving adoption if citizens believe that apps can afford them with some level of privacy. Our findings demonstrate that citizens’ privacy perceptions are shaped by trust in the app, which encompasses legitimacy perceptions and their perception of control offered by the app, and are negatively influenced by perceptions of intrusion. By highlighting the importance of fairness perceptions and elucidating the role of several perceptual factors at the governmental level (need for surveillance and government motives) and the app level (perceived intrusion and perceived control), which have been sparingly studied to date, our study advances our understanding of how privacy perceptions are developed in this context.</p>
        <p>Understanding the factors driving CT app acceptance is paramount for future outbreaks [<xref ref-type="bibr" rid="ref8">8</xref>]. The third contribution relates to understanding how citizens form intentions toward CT apps at different stages of the implementation process. Our study provides support for the influence of perceived privacy on individuals’ intentions to adopt an app and willingness to disclose personal information before launch and support for an indirect influence over time on future use and willingness to disclose data. This finding supports many studies that found that privacy concerns negatively impacted adoption intentions toward mHealth [<xref ref-type="bibr" rid="ref51">51</xref>]. In the context of a national CT app, if individuals perceive that the app offers a sufficient state of privacy, they will express positive intentions toward adoption and information disclosure before and after the app launch. Put simply, perceived privacy can have a sustained positive influence on behavioral intentions.</p>
        <p>Trust has been widely studied within the privacy and other domains to understand individuals’ intentions to disclose information [<xref ref-type="bibr" rid="ref42">42</xref>]. Trust in the app was found to influence individuals’ adoption and disclosure intentions before launch, indirectly influencing use intentions after launch and directly influencing disclosure intentions after launch. These findings suggest that the influence of initial trust perceptions prevails over time and may operate as a heuristic for interacting with the app on an ongoing basis. The stability of trust perceptions and their ongoing influence are a relatively nascent topic, although some theorists have suggested the possibility of trust as a heuristic [<xref ref-type="bibr" rid="ref55">55</xref>]. Our research provides empirical evidence for this phenomenon and offers further support for claims that initial trust perceptions might be relatively robust and long acting [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
      </sec>
      <sec>
        <title>Implications for Practice</title>
        <p>The findings of this study have several practical implications. First, the trust tension between public good and the intrusiveness of surveillance technologies has led researchers to emphasize the importance of effective trust-building strategies when introducing surveillance programs [<xref ref-type="bibr" rid="ref31">31</xref>]. Indeed, citizens in the United States and Germany have expressed concerns regarding possible surveillance stemming from CT apps [<xref ref-type="bibr" rid="ref9">9</xref>]. Our study shows that citizens’ perceptions of trust and privacy can be influenced by fairness perceptions based on their beliefs regarding the need for surveillance and the government’s motives for introducing surveillance technologies, the perceived control they are offered over their personal information and negatively influenced by their perceptions of the intrusiveness of these technologies. Thus, governments should focus on transparency in their public health surveillance efforts, including the involvement of data protection authorities and civil liberties advocates throughout the project life cycle, potentially through a privacy advisory committee [<xref ref-type="bibr" rid="ref57">57</xref>]. This transparency should be extended to communication with citizens on the need and purpose of a technology while stressing the control they have over their personal information. Our research suggests that early communications that shape first impressions are particularly important. Such practices not only comply with data protection laws, such as the EU (European Union) General Data Protection Regulation, but also foster a sense of trust and ultimately influence the use of technology.</p>
        <p>Second, our findings highlight the positive influence of privacy perceptions on adoption and disclosure. Thus, we argue that privacy should not be viewed as a barrier to new technologies, such as mHealth or CT apps, but rather as an important consideration throughout the design, implementation, and postlaunch stages. Designers should ensure compliance with the regulatory requirements for consent and control. Governments and other organizations charged with introducing new technologies should ensure that they clearly communicate their compliance with regulations and the considerations of individuals’ personal data. Given that CT apps provide data on the location, copresence, and potentially ePHI of not only the focal person but also others that they have been in contact with, the principles of both necessity and proportionality would appear to be key. As per Ienca and Vayena [<xref ref-type="bibr" rid="ref4">4</xref>], data collection must (1) be proportional to the seriousness of the public health threat, (2) be limited to what is necessary to achieve a specific public health objective, and (3) be scientifically justified. Policy makers and public health decision makers need to consider what communication and control mechanisms can be introduced to (1) build trust with the public and (2) repair trust, if necessary. This includes declaring what data will be collected and used while the app is live and by whom, confirming that data have been deleted, when no longer relevant (as is the case with COVID-19 data) or once the app is no longer required.</p>
        <p>Third, in the context of technologies that require mass acceptance and willingness to share personal data, the focus cannot be placed solely on the number of downloads but must account for actual use and disclosure behaviors. Individuals’ intentions to download CT apps influence their willingness to disclose personal information both before and after launch. Once they have downloaded the app, it is critical that decision makers encourage use and that the widespread use of the app is linked, through public communication, to successful intervention strategies so that the benefits to the individual and society are reinforced.</p>
      </sec>
      <sec>
        <title>Limitations and Directions for Future Research</title>
        <p>This study has several limitations. First, other factors may influence privacy and trust perceptions or moderate the relationships between trust and privacy and adoption. Although it is not possible to consider all potential antecedents and intervening variables, it would be interesting to explore the role of other prominent perceptions, such as perceived sensitivity, as these apps require users to disclose identifying information, health information, and location information, all of which are arguably sensitive. Second, although our study considers 2 important technology use outcomes, before and after the launch, this approach has limitations. First, the collection of data from the same respondents at multiple time points inevitably led to a drop in responses. Although we sent repeated invitations during the second phase of data collection, the final sample that completed both surveys was smaller. Although this is commonplace within this approach and our sample characteristics are similar to the broader population of Ireland, we acknowledge that a large sample would be ideal and stress the importance of considering the sample size when drawing inferences from our study. Second, our 2 time points did not allow us to take full advantage of the potential to model longitudinal change trajectories over time. Further work is needed to incorporate time more fully into our understanding of how privacy and trust influence adoption and use behaviors.</p>
        <p>Third, our study relies on individuals’ self-reported adoption and disclosure intentions. This approach is commonplace in the privacy and technology adoption literature streams, and it would not have been possible to study actual behaviors. However, we must acknowledge that intentions are not always matched with behaviors and that information disclosure is not always accurate or true. In other settings, it may be more feasible to collect more objective behavioral data, and we would encourage researchers to do so, particularly in settings where widespread adoption is required for success. In addition, studies may go beyond our focus to understand disclosure behaviors at a deeper level and examine privacy-protective behaviors, such as withholding information or falsifying information. These protective behaviors are potentially dangerous in contexts such as CT apps because of the reliance on accurate data to track virus transmission.</p>
        <p>Finally, our study explores a public health surveillance context where the focal person volunteers to participate and therefore has notice of the surveillance, control of their data and gives explicit consent. There are several conditions under which public health surveillance, including name reporting, may be undertaken without notice or explicit patient consent with well-established justifications in public health ethics, science, and law [<xref ref-type="bibr" rid="ref58">58</xref>]. Even in the context of COVID-19, digital CT has not always been voluntary. In China, there is evidence of digital CT without notice or consent [<xref ref-type="bibr" rid="ref59">59</xref>]. Furthermore, even when the focal person has notice and gives consent, contacts of the focal person have not given explicit consent. Although the primary focal person is subject to direct active surveillance, the secondary focal person is subject to passive indirect surveillance. In addition to the ethical issues that such practices raise, particularly where there is coordination and data exchange between private firms and the government [<xref ref-type="bibr" rid="ref60">60</xref>], testing the theoretical framework developed in this study in this new context may provide a fruitful avenue of research. Similarly, aggregated anonymous spatiotemporal data sourced from commercial providers have been used as proxies for human movement and social interaction and as indicators of the effectiveness of social distancing interventions [<xref ref-type="bibr" rid="ref61">61</xref>]. Although these data are currently anonymous, governments have already mandated access to identifiable data on the basis that the public interest overrides privacy rights [<xref ref-type="bibr" rid="ref62">62</xref>]. This context may provide interesting insights and further extend our understanding of the limits of consumer acceptance of governmental health surveillance.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The COVID-19 pandemic was the first time governments implemented large-scale digital CT. Its success as a public health intervention depended on rapid technology adoption by a significant proportion of the population. Here, surveillance is active, and the target of government surveillance through COVID-19 digital CT apps is an active participant in sharing data with the government on their personal health status, their location, and often their social network. The opportunity to study such an empirical context is not only rare but also the time frame for research is limited. Understanding the formation of individuals’ perceptions of trust and privacy in this context and how these perceptions influence their acceptance of digital CT apps is critical not only for informing the design of future digital CT initiatives but also for other situations that require rapid digital technology adoption by a significant proportion of society. If governments wish to leverage the power of digital technologies to control future public health threats, we recommend 3 principles to guide the design of both their surveillance initiatives and communications with the public—necessity, transparency, and proportionality—before and after the launch.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Survey items, validity, and reliability testing.</p>
        <media xlink:href="mhealth_v12i1e48700_app1.pdf" xlink:title="PDF File  (Adobe PDF File), 172 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CT</term>
          <def>
            <p>contact tracing</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">ePHI</term>
          <def>
            <p>electronic personal health information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">EU</term>
          <def>
            <p>European Union</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PCT</term>
          <def>
            <p>Privacy Calculus Theory</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">PTTT</term>
          <def>
            <p>propensity to trust technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">TRA</term>
          <def>
            <p>theory of reasoned action</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eom</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Digital government transformation in turbulent times: responses, challenges, and future direction</article-title>
          <source>Gov Inf Q</source>
          <year>2022</year>
          <month>04</month>
          <volume>39</volume>
          <issue>2</issue>
          <fpage>101690</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35291492"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.giq.2022.101690</pub-id>
          <pub-id pub-id-type="medline">35291492</pub-id>
          <pub-id pub-id-type="pii">S0740-624X(22)00023-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC8914696</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Trenz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Weiger</surname>
              <given-names>WH</given-names>
            </name>
            <name name-style="western">
              <surname>Tarafdar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps</article-title>
          <source>Eur J Inf Syst</source>
          <year>2020</year>
          <month>07</month>
          <day>27</day>
          <volume>29</volume>
          <issue>4</issue>
          <fpage>415</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2020.1784046</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kolasa</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mazzi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Leszczuk-Czubkowska</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zrubka</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Péntek</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>State of the art in adoption of contact tracing apps and recommendations regarding privacy protection and public health: systematic review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2021</year>
          <month>06</month>
          <day>10</day>
          <volume>9</volume>
          <issue>6</issue>
          <fpage>e23250</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2021/6/e23250/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/23250</pub-id>
          <pub-id pub-id-type="medline">34033581</pub-id>
          <pub-id pub-id-type="pii">v9i6e23250</pub-id>
          <pub-id pub-id-type="pmcid">PMC8195202</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ienca</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>On the responsible use of digital data to tackle the COVID-19 pandemic</article-title>
          <source>Nat Med</source>
          <year>2020</year>
          <month>04</month>
          <day>27</day>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>463</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32284619"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41591-020-0832-5</pub-id>
          <pub-id pub-id-type="medline">32284619</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-020-0832-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC7100462</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Budd</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>BS</given-names>
            </name>
            <name name-style="western">
              <surname>Manning</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Lampos</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Edelstein</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rees</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Emery</surname>
              <given-names>VC</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Keegan</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Short</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Pillay</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Manley</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Cox</surname>
              <given-names>IJ</given-names>
            </name>
            <name name-style="western">
              <surname>Heymann</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>McKendry</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Digital technologies in the public-health response to COVID-19</article-title>
          <source>Nat Med</source>
          <year>2020</year>
          <month>08</month>
          <day>07</day>
          <volume>26</volume>
          <issue>8</issue>
          <fpage>1183</fpage>
          <lpage>92</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://hdl.handle.net/10044/1/81253"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41591-020-1011-4</pub-id>
          <pub-id pub-id-type="medline">32770165</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-020-1011-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marabelli</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vaast</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>JL</given-names>
            </name>
          </person-group>
          <article-title>Preventing the digital scars of COVID-19</article-title>
          <source>Eur J Inf Syst</source>
          <year>2021</year>
          <month>01</month>
          <day>19</day>
          <volume>30</volume>
          <issue>2</issue>
          <fpage>176</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2020.1863752</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mora</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kummitha</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Esposito</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Not everything is as it seems: digital technology affordance, pandemic control, and the mediating role of sociomaterial arrangements</article-title>
          <source>Gov Inf Q</source>
          <year>2021</year>
          <month>10</month>
          <volume>38</volume>
          <issue>4</issue>
          <fpage>101599</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/36570778"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.giq.2021.101599</pub-id>
          <pub-id pub-id-type="medline">36570778</pub-id>
          <pub-id pub-id-type="pii">S0740-624X(21)00035-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC9758786</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Van Fossen</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Ropp</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Darcy</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hamm</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>Comfort with and willingness to participate in COVID-19 contact tracing: the role of risk perceptions, trust, and political ideology</article-title>
          <source>Soc Sci Med</source>
          <year>2022</year>
          <month>08</month>
          <volume>306</volume>
          <fpage>115174</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35777171"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2022.115174</pub-id>
          <pub-id pub-id-type="medline">35777171</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(22)00480-4</pub-id>
          <pub-id pub-id-type="pmcid">PMC9233989</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Altmann</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Milsom</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zillessen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Blasone</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gerdon</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Bach</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kreuter</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Nosenzo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Toussaert</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Abeler</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Acceptability of app-based contact tracing for COVID-19: cross-country survey study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>08</month>
          <day>28</day>
          <volume>8</volume>
          <issue>8</issue>
          <fpage>e19857</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/8/e19857/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/19857</pub-id>
          <pub-id pub-id-type="medline">32759102</pub-id>
          <pub-id pub-id-type="pii">v8i8e19857</pub-id>
          <pub-id pub-id-type="pmcid">PMC7458659</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moon</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Factors influencing health data sharing preferences of consumers: a critical review</article-title>
          <source>Health Policy Technol</source>
          <year>2017</year>
          <month>06</month>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>169</fpage>
          <lpage>87</lpage>
          <pub-id pub-id-type="doi">10.1016/j.hlpt.2017.01.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns and digital government: exploring citizen willingness to adopt the COVIDSafe app</article-title>
          <source>Eur J Inf Syst</source>
          <year>2021</year>
          <month>05</month>
          <day>05</day>
          <volume>30</volume>
          <issue>4</issue>
          <fpage>389</fpage>
          <lpage>402</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2021.1920857</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Munzert</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Selb</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gohdes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stoetzer</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Lowe</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Tracking and promoting the usage of a COVID-19 contact tracing app</article-title>
          <source>Nat Hum Behav</source>
          <year>2021</year>
          <month>02</month>
          <day>21</day>
          <volume>5</volume>
          <issue>2</issue>
          <fpage>247</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1038/s41562-020-01044-x</pub-id>
          <pub-id pub-id-type="medline">33479505</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41562-020-01044-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nunes</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Adamo</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ribeiro</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>R Gouveia</surname>
              <given-names>BR</given-names>
            </name>
            <name name-style="western">
              <surname>Rubio Gouveia</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Teixeira</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Nisi</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Modeling adoption, security, and privacy of COVID-19 apps: findings and recommendations from an empirical study using the unified theory of acceptance and use of technology</article-title>
          <source>JMIR Hum Factors</source>
          <year>2022</year>
          <month>09</month>
          <day>14</day>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>e35434</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://humanfactors.jmir.org/2022/3/e35434/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/35434</pub-id>
          <pub-id pub-id-type="medline">35862671</pub-id>
          <pub-id pub-id-type="pii">v9i3e35434</pub-id>
          <pub-id pub-id-type="pmcid">PMC9484482</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>von Wyl</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Höglinger</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sieber</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kaufmann</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Moser</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Serra-Burriel</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ballouz</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Menges</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Frei</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Puhan</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Drivers of acceptance of COVID-19 proximity tracing apps in Switzerland: panel survey analysis</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2021</year>
          <month>01</month>
          <day>06</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>e25701</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2021/1/e25701/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/25701</pub-id>
          <pub-id pub-id-type="medline">33326411</pub-id>
          <pub-id pub-id-type="pii">v7i1e25701</pub-id>
          <pub-id pub-id-type="pmcid">PMC7790736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Clohessy</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>van der Werff</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Rosati</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lynn</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Exploring the competing influences of privacy concerns and positive beliefs on citizen acceptance of contact tracing mobile applications</article-title>
          <source>Comput Hum Behav</source>
          <year>2021</year>
          <month>08</month>
          <volume>121</volume>
          <fpage>106806</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.106806</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts</article-title>
          <source>Eur J Inf Syst</source>
          <year>2017</year>
          <month>12</month>
          <day>19</day>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>295</fpage>
          <lpage>316</lpage>
          <pub-id pub-id-type="doi">10.1057/ejis.2012.23</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>van der Werff</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Rosati</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Takako Endo</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lynn</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: an extended privacy calculus perspective</article-title>
          <source>J Assoc Inf Sci Technol</source>
          <year>2021</year>
          <month>11</month>
          <day>10</day>
          <volume>73</volume>
          <issue>7</issue>
          <fpage>944</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.24602</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shoji</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ito</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cato</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Iida</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Ishida</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Katsumata</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>McElwain</surname>
              <given-names>KM</given-names>
            </name>
          </person-group>
          <article-title>Prosociality and the uptake of COVID-19 contact tracing apps: survey analysis of intergenerational differences in Japan</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2021</year>
          <month>08</month>
          <day>19</day>
          <volume>9</volume>
          <issue>8</issue>
          <fpage>e29923</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2021/8/e29923/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/29923</pub-id>
          <pub-id pub-id-type="medline">34313601</pub-id>
          <pub-id pub-id-type="pii">v9i8e29923</pub-id>
          <pub-id pub-id-type="pmcid">PMC8396313</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hassandoust</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Akhlaghpour</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>AC</given-names>
            </name>
          </person-group>
          <article-title>Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: a situational privacy calculus perspective</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2021</year>
          <month>03</month>
          <day>01</day>
          <volume>28</volume>
          <issue>3</issue>
          <fpage>463</fpage>
          <lpage>71</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33164077"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocaa240</pub-id>
          <pub-id pub-id-type="medline">33164077</pub-id>
          <pub-id pub-id-type="pii">5961440</pub-id>
          <pub-id pub-id-type="pmcid">PMC7936517</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laufer</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Wolfe</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy as a concept and a social issue: a multidimensional developmental theory</article-title>
          <source>J Soc Issues</source>
          <year>2010</year>
          <month>04</month>
          <day>14</day>
          <volume>33</volume>
          <issue>3</issue>
          <fpage>22</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1540-4560.1977.tb01880.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lewicki</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Bunker</surname>
              <given-names>BB</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kramer</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Tyler</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Developing and maintaining trust in work relationships</article-title>
          <source>Trust in Organizations: Frontiers of Theory and Research</source>
          <year>1996</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>SAGE Publications, Inc</publisher-name>
          <fpage>114</fpage>
          <lpage>39</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Culnan</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>PK</given-names>
            </name>
          </person-group>
          <article-title>Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation</article-title>
          <source>Org Sci</source>
          <year>1999</year>
          <month>02</month>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>104</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.10.1.104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Teo</surname>
              <given-names>HH</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>BC</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The role of push-pull technology in privacy calculus: the case of location-based services</article-title>
          <source>J Manage Inf Syst</source>
          <year>2014</year>
          <month>12</month>
          <day>08</day>
          <volume>26</volume>
          <issue>3</issue>
          <fpage>135</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.2753/mis0742-1222260305</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Searle</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Den Hartog</surname>
              <given-names>DN</given-names>
            </name>
            <name name-style="western">
              <surname>Weibel</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gillespie</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Six</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Hatzakis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Skinner</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Trust in the employer: the role of high-involvement work practices and procedural justice in European organizations</article-title>
          <source>Int J Hum Resour Manage</source>
          <year>2011</year>
          <month>03</month>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>1069</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1080/09585192.2011.556782</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fishbein</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <source>Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research</source>
          <year>1976</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>Longman Higher Education</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McKnight</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Kacmar</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Developing and validating trust measures for e-commerce: an integrative typology</article-title>
          <source>Inf Syst Res</source>
          <year>2002</year>
          <month>09</month>
          <volume>13</volume>
          <issue>3</issue>
          <fpage>334</fpage>
          <lpage>59</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.13.3.334.81</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mcknight</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Clay</surname>
              <given-names>PF</given-names>
            </name>
          </person-group>
          <article-title>Trust in a specific technology: an investigation of its components and measures</article-title>
          <source>ACM Trans Manage Inf Syst</source>
          <year>2011</year>
          <month>07</month>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1145/1985347.1985353</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mayer</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Schoorman</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>An integrative model of organizational trust</article-title>
          <source>Acad Manage Rev</source>
          <year>1995</year>
          <month>07</month>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>709</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.2307/258792</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van der Werff</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Buckley</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Getting to know you: a longitudinal examination of trust cues and trust development during socialization</article-title>
          <source>J Manage</source>
          <year>2016</year>
          <month>07</month>
          <day>09</day>
          <volume>43</volume>
          <issue>3</issue>
          <fpage>742</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1177/0149206314543475</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>McGill</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Bunn</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Alexander</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Cultural factors and the role of privacy concerns in acceptance of government surveillance</article-title>
          <source>J Assoc Inf Sci Technol</source>
          <year>2020</year>
          <month>06</month>
          <day>25</day>
          <volume>71</volume>
          <issue>9</issue>
          <fpage>1129</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1002/asi.24372</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dutton</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Guerra</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Zizzo</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Peltu</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The cyber trust tension in e-government: balancing identity, privacy, security</article-title>
          <source>Inf Polity</source>
          <year>2005</year>
          <month>11</month>
          <day>22</day>
          <volume>10</volume>
          <issue>1-2</issue>
          <fpage>13</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.3233/ip-2005-0066</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>ES</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>JB</given-names>
            </name>
          </person-group>
          <article-title>Korean mothers' morality in the wake of COVID-19 contact-tracing surveillance</article-title>
          <source>Soc Sci Med</source>
          <year>2021</year>
          <month>02</month>
          <volume>270</volume>
          <fpage>113673</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33453628"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2021.113673</pub-id>
          <pub-id pub-id-type="medline">33453628</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(21)00005-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7833862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mullen</surname>
              <given-names>MR</given-names>
            </name>
          </person-group>
          <article-title>Internet privacy concerns and beliefs about government surveillance – an empirical investigation</article-title>
          <source>J Strat Inf Syst</source>
          <year>2008</year>
          <month>9</month>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>214</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jsis.2007.09.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lipponen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kaltiainen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>van der Werff</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Steffens</surname>
              <given-names>NK</given-names>
            </name>
          </person-group>
          <article-title>Merger-specific trust cues in the development of trust in new supervisors during an organizational merger: a naturally occurring quasi-experiment</article-title>
          <source>Leadership Q</source>
          <year>2020</year>
          <month>08</month>
          <volume>31</volume>
          <issue>4</issue>
          <fpage>101365</fpage>
          <pub-id pub-id-type="doi">10.1016/j.leaqua.2019.101365</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Examining the formation of individual's privacy concerns: toward an integrative view</article-title>
          <source>Proceedings of the International Conference on Information Systems 2008</source>
          <year>2008</year>
          <conf-name>ICIS 2008</conf-name>
          <conf-date>December 14-17, 2008</conf-date>
          <conf-loc>Paris, France</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zimmermann</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Fiske</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Prainsack</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Hangel</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>McLennan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Buyx</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Early perceptions of COVID-19 contact tracing apps in German-speaking countries: comparative mixed methods study</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>02</month>
          <day>08</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>e25525</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/2/e25525/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/25525</pub-id>
          <pub-id pub-id-type="medline">33503000</pub-id>
          <pub-id pub-id-type="pii">v23i2e25525</pub-id>
          <pub-id pub-id-type="pmcid">PMC7872326</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malhotra</surname>
              <given-names>NK</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model</article-title>
          <source>Inf Syst Res</source>
          <year>2004</year>
          <month>12</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>336</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Colquitt</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Lepine</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Piccolo</surname>
              <given-names>RF</given-names>
            </name>
            <name name-style="western">
              <surname>Zapata</surname>
              <given-names>CP</given-names>
            </name>
            <name name-style="western">
              <surname>Rich</surname>
              <given-names>BL</given-names>
            </name>
          </person-group>
          <article-title>Explaining the justice-performance relationship: trust as exchange deepener or trust as uncertainty reducer?</article-title>
          <source>J Appl Psychol</source>
          <year>2012</year>
          <month>01</month>
          <volume>97</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1037/a0025208</pub-id>
          <pub-id pub-id-type="medline">21910516</pub-id>
          <pub-id pub-id-type="pii">2011-20474-001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oldeweme</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Märtins</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Westmattelmann</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Schewe</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The role of transparency, trust, and social influence on uncertainty reduction in times of pandemics: empirical study on the adoption of COVID-19 tracing apps</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>02</month>
          <day>08</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>e25893</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/2/e25893/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/25893</pub-id>
          <pub-id pub-id-type="medline">33465036</pub-id>
          <pub-id pub-id-type="pii">v23i2e25893</pub-id>
          <pub-id pub-id-type="pmcid">PMC7872328</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yasaka</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>Lehrich</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Sahyouni</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Peer-to-peer contact tracing: development of a privacy-preserving smartphone app</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>04</month>
          <day>07</day>
          <volume>8</volume>
          <issue>4</issue>
          <fpage>e18936</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/4/e18936/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18936</pub-id>
          <pub-id pub-id-type="medline">32240973</pub-id>
          <pub-id pub-id-type="pii">v8i4e18936</pub-id>
          <pub-id pub-id-type="pmcid">PMC7144575</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Thong</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>FK</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>PJ</given-names>
            </name>
          </person-group>
          <article-title>Managing citizens’ uncertainty in e-government services: the mediating and moderating roles of transparency and trust</article-title>
          <source>Inf Syst Res</source>
          <year>2016</year>
          <month>03</month>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>87</fpage>
          <lpage>111</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.2015.0612</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McEvily</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Tortoriello</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Measuring trust in organisational research: review and recommendations</article-title>
          <source>J Trust Res</source>
          <year>2011</year>
          <month>04</month>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>23</fpage>
          <lpage>63</lpage>
          <pub-id pub-id-type="doi">10.1080/21515581.2011.552424</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hoehle</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Aloysius</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Goodarzi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>A nomological network of customers’ privacy perceptions: linking artifact design to shopping efficiency</article-title>
          <source>Eur J Inf Syst</source>
          <year>2018</year>
          <month>07</month>
          <day>24</day>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>91</fpage>
          <lpage>113</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2018.1496882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>GB</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>User acceptance of information technology: toward a unified view</article-title>
          <source>MIS Q</source>
          <year>2003</year>
          <month>9</month>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>425</fpage>
          <lpage>78</lpage>
          <pub-id pub-id-type="doi">10.2307/30036540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brennan</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McConnell</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>HSE's Covid-19 tracing app passes 1m downloads</article-title>
          <source>Irish Examiner</source>
          <year>2020</year>
          <month>7</month>
          <day>8</day>
          <access-date>2022-07-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.irishexaminer.com/news/arid-31010089.html">https://www.irishexaminer.com/news/arid-31010089.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Callaghan</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Abbas</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Buckley</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Fitzgerald</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Laffey</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>McNicholas</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Nuseibeh</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>O'Keeffe</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Beecham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Razzaq</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rekanar</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Richardson</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Simpkin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>O'Connell</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Storni</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tsvyatkova</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Walsh</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Welsh</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Glynn</surname>
              <given-names>LG</given-names>
            </name>
          </person-group>
          <article-title>Public opinion of the Irish "COVID tracker" digital contact tracing app: a national survey</article-title>
          <source>Digit Health</source>
          <year>2022</year>
          <month>03</month>
          <day>16</day>
          <volume>8</volume>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/20552076221085065?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/20552076221085065</pub-id>
          <pub-id pub-id-type="medline">35321018</pub-id>
          <pub-id pub-id-type="pii">10.1177_20552076221085065</pub-id>
          <pub-id pub-id-type="pmcid">PMC8935577</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Serrano Archimi</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Reynaud</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Yasin</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Bhatti</surname>
              <given-names>ZA</given-names>
            </name>
          </person-group>
          <article-title>How perceived corporate social responsibility affects employee cynicism: the mediating role of organizational trust</article-title>
          <source>J Bus Ethics</source>
          <year>2018</year>
          <month>5</month>
          <day>2</day>
          <volume>151</volume>
          <issue>4</issue>
          <fpage>907</fpage>
          <lpage>21</lpage>
          <pub-id pub-id-type="doi">10.1007/s10551-018-3882-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gaskin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lim</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Model bias: AMOS plugin</article-title>
          <source>Gaskination's Statistics</source>
          <access-date>2020-10-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://statwiki.kolobkreations.com/">http://statwiki.kolobkreations.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fornell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Larcker</surname>
              <given-names>DF</given-names>
            </name>
          </person-group>
          <article-title>Evaluating structural equation models with unobservable variables and measurement error</article-title>
          <source>J Mark Res</source>
          <year>2018</year>
          <month>11</month>
          <day>28</day>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1177/002224378101800104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Raykov</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Estimation of composite reliability for congeneric measures</article-title>
          <source>Appl Psychol Meas</source>
          <year>2016</year>
          <month>07</month>
          <day>27</day>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>173</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1177/01466216970212006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Connolly</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Mobile health technology adoption across generations: narrowing the digital divide</article-title>
          <source>Inf Syst J</source>
          <year>2018</year>
          <month>01</month>
          <day>29</day>
          <volume>28</volume>
          <issue>6</issue>
          <fpage>995</fpage>
          <lpage>1019</lpage>
          <pub-id pub-id-type="doi">10.1111/isj.12179</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walrave</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Waeterloos</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ponnet</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Adoption of a contact tracing app for containing COVID-19: a health belief model approach</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2020</year>
          <month>09</month>
          <day>01</day>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>e20572</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2020/3/e20572/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20572</pub-id>
          <pub-id pub-id-type="medline">32755882</pub-id>
          <pub-id pub-id-type="pii">v6i3e20572</pub-id>
          <pub-id pub-id-type="pmcid">PMC7470174</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Seto</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Challa</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ware</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Adoption of COVID-19 contact tracing apps: a balance between privacy and effectiveness</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>03</month>
          <day>04</day>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>e25726</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/3/e25726/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/25726</pub-id>
          <pub-id pub-id-type="medline">33617459</pub-id>
          <pub-id pub-id-type="pii">v23i3e25726</pub-id>
          <pub-id pub-id-type="pmcid">PMC7935397</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walrave</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Waeterloos</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ponnet</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Reasons for nonuse, discontinuation of use, and acceptance of additional functionalities of a COVID-19 contact tracing app: cross-sectional survey study</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2022</year>
          <month>01</month>
          <day>14</day>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>e22113</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2022/1/e22113/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/22113</pub-id>
          <pub-id pub-id-type="medline">34794117</pub-id>
          <pub-id pub-id-type="pii">v8i1e22113</pub-id>
          <pub-id pub-id-type="pmcid">PMC8763311</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McEvily</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Reorganizing the boundaries of trust: from discrete alternatives to hybrid forms</article-title>
          <source>Org Sci</source>
          <year>2011</year>
          <month>10</month>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>1266</fpage>
          <lpage>76</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.1110.0649</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van der Werff</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Legood</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Buckley</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Weibel</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>de Cremer</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Trust motivation: the self-regulatory processes underlying trust decisions</article-title>
          <source>Org Psychol Rev</source>
          <year>2019</year>
          <month>09</month>
          <day>11</day>
          <volume>9</volume>
          <issue>2-3</issue>
          <fpage>99</fpage>
          <lpage>123</lpage>
          <pub-id pub-id-type="doi">10.1177/2041386619873616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oliver</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lepri</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sterly</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lambiotte</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Deletaille</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>De Nadai</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Letouzé</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Salah</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Benjamins</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Cattuto</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Colizza</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>de Cordes</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Fraiberger</surname>
              <given-names>SP</given-names>
            </name>
            <name name-style="western">
              <surname>Koebe</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Murillo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Pham</surname>
              <given-names>PN</given-names>
            </name>
            <name name-style="western">
              <surname>Pivetta</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Saramäki</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Scarpino</surname>
              <given-names>SV</given-names>
            </name>
            <name name-style="western">
              <surname>Tizzoni</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Verhulst</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vinck</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle</article-title>
          <source>Sci Adv</source>
          <year>2020</year>
          <month>06</month>
          <day>05</day>
          <volume>6</volume>
          <issue>23</issue>
          <fpage>eabc0764</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https:///www.science.org/doi/10.1126/sciadv.abc0764?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1126/sciadv.abc0764</pub-id>
          <pub-id pub-id-type="medline">32548274</pub-id>
          <pub-id pub-id-type="pii">abc0764</pub-id>
          <pub-id pub-id-type="pmcid">PMC7274807</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>Heilig</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Ethical justification for conducting public health surveillance without patient consent</article-title>
          <source>Am J Public Health</source>
          <year>2012</year>
          <month>01</month>
          <volume>102</volume>
          <issue>1</issue>
          <fpage>38</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.2011.300297</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mozur</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Zhong</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Krolik</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>In coronavirus fight, China gives citizens a color code, with red flags</article-title>
          <source>The New York Times</source>
          <year>2020</year>
          <month>3</month>
          <day>1</day>
          <access-date>2023-03-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Fraser</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Abeler-Dörner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bonsall</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Ethics of instantaneous contact tracing using mobile phone apps in the control of the COVID-19 pandemic</article-title>
          <source>J Med Ethics</source>
          <year>2020</year>
          <month>07</month>
          <day>04</day>
          <volume>46</volume>
          <issue>7</issue>
          <fpage>427</fpage>
          <lpage>31</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://jme.bmj.com/lookup/pmidlookup?view=long&#38;pmid=32366705"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/medethics-2020-106314</pub-id>
          <pub-id pub-id-type="medline">32366705</pub-id>
          <pub-id pub-id-type="pii">medethics-2020-106314</pub-id>
          <pub-id pub-id-type="pmcid">PMC7231546</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Endo</surname>
              <given-names>PT</given-names>
            </name>
            <name name-style="western">
              <surname>Silva</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Lima</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bezerra</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gomes</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ribeiro-Dantas</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Alves</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Monteiro</surname>
              <given-names>KH</given-names>
            </name>
            <name name-style="western">
              <surname>Lynn</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sampaio</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>#StayHome: monitoring and benchmarking social isolation trends in Caruaru and the Região Metropolitana do Recife during the COVID-19 pandemic</article-title>
          <source>Rev Soc Bras Med Trop</source>
          <year>2020</year>
          <month>6</month>
          <day>24</day>
          <volume>53</volume>
          <fpage>e20200271</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scielo.br/scielo.php?script=sci_arttext&#38;pid=S0037-86822020000101001&#38;lng=en&#38;nrm=iso&#38;tlng=en"/>
          </comment>
          <pub-id pub-id-type="doi">10.1590/0037-8682-0271-2020</pub-id>
          <pub-id pub-id-type="medline">32609249</pub-id>
          <pub-id pub-id-type="pii">S0037-86822020000101001</pub-id>
          <pub-id pub-id-type="pmcid">PMC7325600</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tidy</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Coronavirus: Israel enables emergency spy powers</article-title>
          <source>BBC News</source>
          <year>2020</year>
          <month>3</month>
          <day>17</day>
          <access-date>2023-03-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bbc.com/news/technology-51930681">https://www.bbc.com/news/technology-51930681</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
