<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMH</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Ment Health</journal-id>
      <journal-title>JMIR Mental Health</journal-title>
      <issn pub-type="epub">2368-7959</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i12e31633</article-id>
      <article-id pub-id-type="pmid">34951604</article-id>
      <article-id pub-id-type="doi">10.2196/31633</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Breaking the Data Value-Privacy Paradox in Mobile Mental Health Systems Through User-Centered Privacy Protection: A Web-Based Survey Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Hao</surname>
            <given-names>Haijing</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yin</surname>
            <given-names>Qiuju</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>Dongsong</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>The University of North Carolina at Charlotte</institution>
            <addr-line>9201 University City Blvd</addr-line>
            <addr-line>Charlotte, NC, 28223-0001</addr-line>
            <country>United States</country>
            <phone>1 7046871893</phone>
            <email>dzhang15@uncc.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5406-4681</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Lim</surname>
            <given-names>Jaewan</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5579-6606</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>Lina</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1864-0527</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Dahl</surname>
            <given-names>Alicia A</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6229-0926</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>The University of North Carolina at Charlotte</institution>
        <addr-line>Charlotte, NC</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Dongsong Zhang <email>dzhang15@uncc.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>12</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>24</day>
        <month>12</month>
        <year>2021</year>
      </pub-date>
      <volume>8</volume>
      <issue>12</issue>
      <elocation-id>e31633</elocation-id>
      <history>
        <date date-type="received">
          <day>28</day>
          <month>6</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>30</day>
          <month>7</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>6</day>
          <month>8</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>15</day>
          <month>10</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Dongsong Zhang, Jaewan Lim, Lina Zhou, Alicia A Dahl. Originally published in JMIR Mental Health (https://mental.jmir.org), 24.12.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Mental Health, is properly cited. The complete bibliographic information, a link to the original publication on https://mental.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://mental.jmir.org/2021/12/e31633" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Mobile mental health systems (MMHS) have been increasingly developed and deployed in support of monitoring, management, and intervention with regard to patients with mental disorders. However, many of these systems rely on patient data collected by smartphones or other wearable devices to infer patients’ mental status, which raises privacy concerns. Such a value-privacy paradox poses significant challenges to patients’ adoption and use of MMHS; yet, there has been limited understanding of it.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>To address the significant literature gap, this research aims to investigate both the antecedents of patients’ privacy concerns and the effects of privacy concerns on their continuous usage intention with regard to MMHS.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Using a web-based survey, this research collected data from 170 participants with MMHS experience recruited from online mental health communities and a university community. The data analyses used both repeated analysis of variance and partial least squares regression.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The results showed that data type (<italic>P</italic>=.003), data stage (<italic>P</italic>&#60;.001), privacy victimization experience (<italic>P</italic>=.01), and privacy awareness (<italic>P</italic>=.08) have positive effects on privacy concerns. Specifically, users report higher privacy concerns for social interaction data (<italic>P</italic>=.007) and self-reported data (<italic>P</italic>=.001) than for biometrics data; privacy concerns are higher for data transmission (<italic>P</italic>=.01) and data sharing (<italic>P&#60;</italic>.001) than for data collection. Our results also reveal that privacy concerns have an effect on attitude toward privacy protection (<italic>P</italic>=.001), which in turn affects continuous usage intention with regard to MMHS.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study contributes to the literature by deepening our understanding of the data value-privacy paradox in MMHS research. The findings offer practical guidelines for breaking the paradox through the design of user-centered and privacy-preserving MMHS.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>mobile apps</kwd>
        <kwd>mental health</kwd>
        <kwd>privacy concerns</kwd>
        <kwd>privacy protection</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Patient Data Privacy</title>
        <p>Mental health, including emotional, psychological, and social well-being, affects how people think, feel, and act. According to the National Alliance on Mental Illness, in the United States, 1 in 5 adults experience a mental illness; depression, a type of mental disorder, is the leading cause of disability worldwide; and 90% of the people who commit suicide have mental illness. Recent trends in the health care industry have been driving significant changes in the health information technology landscape, including the movement toward developing effective technologies that enable continuous data collection from patients through mobile and wearable devices [<xref ref-type="bibr" rid="ref1">1</xref>]. Examples of these trends include the shift of health care systems toward more efficient yet less expensive methods of patient care; strong economic incentives to pursue continuous patient monitoring outside clinical settings and innovative technologies to prevent patients from falling ill; increasing adoption of mobile and wearable devices such as smartphones and biological sensors by patients, caregivers, and health care service providers for health and wellness apps; and technology advances that increase the utility of mobile devices [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        <p>Rapid advances in wireless communication, low-power sensing technologies, and pervasive mobile and wearable devices (eg, smartphones, smart watches, and Fitbit) propel research on, and practice of, mobile health (mHealth), including mobile mental health (MMH). According to the Pew Research Center [<xref ref-type="bibr" rid="ref2">2</xref>], 81% of American adults have a smartphone. More than 60% of people have downloaded an mHealth app, with more than 300,000 mHealth apps available. The main features of mHealth apps include symptom checkers, health care professional finders, management of clinical records, medical education and training, patient monitoring, patient self-management, and prescription filling and compliance [<xref ref-type="bibr" rid="ref3">3</xref>].</p>
        <p>MMH systems (MMHS) collect unprecedented amounts and varieties of data through sensors, smartphones, or other wearable devices in support of continuous monitoring, self-management, and intervention with regard to patients with mental illness or patients’ well-being. These data enable researchers to quantify complex temporal dynamics of important physical (eg, body movement), biological (eg, skin temperature and heart rate), behavioral (eg, phone use behavior and keystrokes), psychological (eg, emotion), social (eg, social interactions with others such as phone calls and SMS text messaging), and environmental factors (eg, location and lighting) that may be affected by, or be indicative of, mental illness [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. Thus, MMH technology has great potential to yield new insights, increase health care agility and quality, extend ubiquitous access to health care resources and services, reduce hospital admissions and cost, and improve personal wellness and public mental health.</p>
        <p>These benefits, however, can only be achieved if the health-related data continuously collected from individuals by MMHS are appropriately protected for user privacy. The general notion of privacy is perceived as a human right, a commodity, and control [<xref ref-type="bibr" rid="ref7">7</xref>]. This research focuses on patient data privacy during collection, transmission, storage, and sharing of personal data. Unlike data security, which refers to physical, technological, or administrative safeguards or tools used to protect identifiable health data from unwarranted access or disclosure [<xref ref-type="bibr" rid="ref8">8</xref>], health information privacy is an individual’s right to control the acquisition, use, or disclosure of their identifiable health-related data, including when, how, and to what extent the data can be communicated to others [<xref ref-type="bibr" rid="ref9">9</xref>]. Vulnerabilities regarding privacy may result in breaching the conﬁdentiality of patient data [<xref ref-type="bibr" rid="ref10">10</xref>], leading to ﬁnancial losses, discrimination, stress, dissatisfaction, or even delays in seeking timely treatment because of perceived privacy risks. Individuals with high privacy concerns often perceive a new information system to be risky, eventually developing concerns about it [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Despite its potential, mHealth research and practice has progressed much more slowly than app developments in the industry because privacy issues remain an ongoing concern because of the sensitive, personal, and streaming nature of data collected from individual patients by sensors or other wearable devices [<xref ref-type="bibr" rid="ref11">11</xref>]. Our literature review reveals that approximately half of the surveyed studies on MMHS [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>] did not consider data privacy issues at all. Prior research also suggests that users lack understanding of privacy issues associated with mHealth technologies [<xref ref-type="bibr" rid="ref9">9</xref>]. Although some studies adopted certain user privacy protection methods, most of them deployed a single method (eg, data encryption [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref17">17</xref>] and extracting and storing features of data instead of original content [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]). A number of studies have shown that users sometimes sacrifice their privacy in exchange for benefits and personalized services [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. Different types of information may have different levels of overall “privateness [<xref ref-type="bibr" rid="ref22">22</xref>].” There is a severe lack of studies and comprehensive understanding of users’ privacy concerns with different types of personal data collected and used by MMHS and how to address them to increase users’ adoption of, and engagement with, these systems [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <p>According to the privacy calculus theory [<xref ref-type="bibr" rid="ref24">24</xref>], an individual’s intention to disclose personal information is based on their perceived risk and anticipated benefits. On the one hand, it is theoretically desirable for MMHS to collect as much (and detailed) relevant personal data as possible from individuals that are indicators of mental health so that the systems can predict the individuals’ mental status more accurately and make more informed intervention decisions. On the other hand, it remains uncertain how sensitive, in terms of privacy, users are to different types of personal data being collected, which data processing stages may cause them to have privacy concerns, and to what extent privacy concerns may influence their willingness to use MMHS. To help address the data value-privacy paradox, this study aims to answer the following research questions:</p>
        <list list-type="bullet">
          <list-item>
            <p>Research question 1: How do users’ privacy concerns vary with different types of personal data collected by MMHS?</p>
          </list-item>
          <list-item>
            <p>Research question 2: Do users’ privacy concerns vary with different data processing stages that MMHS involve? If so, how?</p>
          </list-item>
          <list-item>
            <p>Research question 3: How do privacy concerns affect users’ intention of using MMHS?</p>
          </list-item>
        </list>
        <p>To answer these research questions, we conducted a web-based survey with adults who have self-reported mental health issues and used MMHS before. On the basis of the findings of our survey, we propose a set of guidelines for the design of user-centric and privacy-protecting MMHS. This study contributes to MMHS research by deepening our understanding of users’ privacy concerns and potential mitigation solutions. In addition, it offers practical implications for improving the well-being of patients with mental illness by cultivating their adoption of, and engagement with, MMHS.</p>
      </sec>
      <sec>
        <title>Background and Related Work</title>
        <sec>
          <title>Conceptualization of Privacy</title>
          <p>Generally, privacy can be categorized into physical privacy and information privacy (also commonly referred to as data privacy). Historically, the concept of physical privacy was defined as “the right to be left alone [<xref ref-type="bibr" rid="ref25">25</xref>].” Information privacy is concerned not only with individuals’ personal information such as name, home address, and birth date, but also their relationship status, photographs, political and religious views, shopping habits, driving history, and medical records [<xref ref-type="bibr" rid="ref26">26</xref>]. It also involves an individual’s ability to control information about themselves [<xref ref-type="bibr" rid="ref27">27</xref>]. Information privacy is also referred to as controlling whether and how personal data can be collected, stored, processed, and disseminated [<xref ref-type="bibr" rid="ref28">28</xref>]. As technologies evolve, privacy has been increasingly threatened as a result of the rapid growth of portable handheld devices, sensors, and wireless network technology. Accordingly, the conceptualizations of privacy have shifted toward elaborating the complexity of privacy issues in various areas involving the legal, social-psychological, economic, or political concerns that technologies present.</p>
          <p>Smith et al [<xref ref-type="bibr" rid="ref7">7</xref>] proposed a macro model called “Antecedents→Privacy Concerns→Outcomes” that demonstrated the relationships between privacy concerns and their antecedents and outcomes. The model shows that individuals’ experiences with getting exposed to, or victimized by, personal information abuses; privacy awareness; personality (eg, introversion vs extroversion); demographics; and cross-cultural differences are antecedents of privacy concerns. Privacy concerns in turn affect behavioral reactions (eg, willingness to disclose information), trust, regulation, and privacy calculus (ie, trade-off between privacy risks and benefits).</p>
          <p>Plachkinova et al [<xref ref-type="bibr" rid="ref29">29</xref>] developed a taxonomy based on security challenges in an mHealth care environment defined by Stavrou and Pitsillides [<xref ref-type="bibr" rid="ref30">30</xref>] and the threat taxonomy for mHealth privacy proposed by Kotz [<xref ref-type="bibr" rid="ref31">31</xref>]. Plachkinova et al [<xref ref-type="bibr" rid="ref29">29</xref>] identified a few common threats to privacy, including (1) identity threats: misuse of patient identity information; (2) access threats: unauthorized access to protected health information (PHI) or personal health records; and (3) disclosure threats: unauthorized disclosure of patient identity information or PHI. However, the authors’ taxonomy neither differentiates data types nor considers user privacy protection.</p>
        </sec>
        <sec>
          <title>Privacy Regulations</title>
          <p>Privacy regulations have been established to help determine effective ways to develop, manage, monitor, and enforce patient-centric, organizational, and government policies and regulations associated with data collection and use within mHealth systems [<xref ref-type="bibr" rid="ref32">32</xref>]. For example, the Health Insurance Portability and Accountability Act (HIPAA) of 1996 provides data privacy and security guidelines for safeguarding medical information and sets constraints and conditions for the use and disclosure of patient information (<xref ref-type="boxed-text" rid="box1">Textbox 1</xref>). HIPAA’s privacy rule only applies to mHealth apps that involve both a covered entity (eg, health care providers) and PHI. PHI usually includes demographic information, medical history, diagnostic test results, insurance information, and other data gathered by a health care professional that identify an individual and are used for medical treatment. HIPAA does not cover individual users who upload or directly enter their information into mHealth apps [<xref ref-type="bibr" rid="ref33">33</xref>]. In addition, researchers must abide by the federal policy for the protection of human subjects, also known as the Common Rule, to protect individuals participating in research activities. The Common Rule specifies detailed policies and guidelines about informed consent, adverse events, handling of biological data, and vulnerable populations, among other issues [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
          <boxed-text id="box1" position="float">
            <title>The Health Insurance Portability and Accountability Act privacy and security requirements (adapted from Ray and Biswas [<xref ref-type="bibr" rid="ref35">35</xref>]).</title>
            <p>
              <bold>Privacy and security requirements</bold>
            </p>
            <list list-type="bullet">
              <list-item>
                <p>Patients’ understanding</p>
              </list-item>
              <list-item>
                <p>Patients have the right to understand how their health information will be used and stored.</p>
              </list-item>
              <list-item>
                <p>Patient control</p>
              </list-item>
              <list-item>
                <p>Patients can control the access to their health information and are given permission to decide who can access their health data.</p>
              </list-item>
              <list-item>
                <p>Confidentiality</p>
              </list-item>
              <list-item>
                <p>Health data of patients must be kept undisclosed from any party that has no right to access the data.</p>
              </list-item>
              <list-item>
                <p>There should be software safeguards such as encryption to protect health data confidentiality during storage and transmission.</p>
              </list-item>
              <list-item>
                <p>Data integrity</p>
              </list-item>
              <list-item>
                <p>Patients’ eHealth information should be protected from omissions, tampering, and unauthorized destruction.</p>
              </list-item>
              <list-item>
                <p>The health data shared with an entity must be the true representation of the intended information without having any form of alteration.</p>
              </list-item>
              <list-item>
                <p>Consent exception</p>
              </list-item>
              <list-item>
                <p>In life-saving purposes and emergency situations, access to the protected health information without the patient’s authorization is allowed.</p>
              </list-item>
            </list>
          </boxed-text>
          <p>The most recent US privacy regulation is the California Consumer Privacy Act, which provides California residents transparency and protection of personal data, including the right to know where their data are collected and to whom they are sold, as well as the right to disclose. In 2019, Xcertia [<xref ref-type="bibr" rid="ref36">36</xref>] published the following industry guidelines for safe and effective mHealth apps:</p>
          <list list-type="bullet">
            <list-item>
              <p>Guideline P1: Notice of Use and Disclosure. The Privacy Notice describes how an organization collects, uses, and retains user data.</p>
            </list-item>
            <list-item>
              <p>Guideline P2: Retention. If data are collected, the user shall be informed about how long the data will be retained.</p>
            </list-item>
            <list-item>
              <p>Guideline P3: Access Mechanisms. An app user should be informed if the app accesses local resources or resources from, or for, social networking platforms, provided with an explanation by any appropriate means (eg, the About section) as to how and why such resources are used, and opt-in consent should be obtained to access such resources.</p>
            </list-item>
            <list-item>
              <p>Guideline P4: HIPAA Entity or Business Associate. If a mobile app collects, stores, or transmits information that constitutes PHI (as defined by HIPAA), it does so in full compliance with HIPAA and all applicable state and international regulations.</p>
            </list-item>
            <list-item>
              <p>Guideline P5: Children’s Online Privacy Protection Act. An app should have measures in place to protect children in accordance with applicable laws and regulations if the website is directed at children.</p>
            </list-item>
            <list-item>
              <p>Guideline P6: General Data Protection Regulation. An app should have measures in place to comply with applicable laws and regulations related to the European Union General Data Protection Regulation.</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>Personal Data Collected by Existing MMH Studies</title>
          <p>To understand what personal data have been collected by existing MMH studies and whether these studies have deployed any privacy protection method, we first conducted a literature review. We formulated search queries as various combinations of terms from 3 groups, including technology terms such as “mobile,” “wearable devices,” “sensor,” “IoT,” and “mobile app;” mental health terms such as “mental health,” “depression,” “schizophrenia,” and “stress management” used by Bardram and Matic [<xref ref-type="bibr" rid="ref37">37</xref>] and the US Department of Health and Human Services; and privacy-related search terms such as “privacy,” “privacy protection,” “personal,” and “private information.” We searched for relevant articles in the following databases: PubMed, IEEE Xplore, National Institute of Mental Health Data Archive, ScienceDirect, Taylor &#38; Francis Online, and PubPsych, as well as Google Scholar. We applied 3 inclusion criteria in paper selection: (1) published in English in or after 2014 to reflect the state of the art, (2) focused on MMHS in support of users with an existing mental disorder, and (3) collected personal data from users.</p>
          <p>We found and reviewed 32 papers that met the aforementioned inclusion criteria. These studies [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref58">58</xref>] are summarized in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> along the following dimensions: the target mental diseases that the MMHS were proposed to support, types of personal data collected by the apps, and privacy protection methods deployed in these studies, if any. These studies collected a wide variety of personal data from patients, driven by the target mental diseases. The most commonly used personal data are as follows:</p>
          <list list-type="bullet">
            <list-item>
              <p>Physical activities such as gait, finger tapping, activity time, and distance traveled</p>
            </list-item>
            <list-item>
              <p>Sleep data such as sleeping time and waking time</p>
            </list-item>
            <list-item>
              <p>Physiological data (biomarkers) such as oxygen saturation, heart rate, temperature, blood pressure, electrocardiogram, and peak expiratory flow rate</p>
            </list-item>
            <list-item>
              <p>Location and GPS data</p>
            </list-item>
            <list-item>
              <p>Social activity (ie, social interaction) data</p>
            </list-item>
            <list-item>
              <p>Phone use such as number and length of phone calls, number of incoming and outgoing SMS text messages, and the number of times screen is on</p>
            </list-item>
            <list-item>
              <p>Voice</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>Privacy Protection Adopted by Existing MMHS Studies</title>
          <p>Not surprisingly, of the 32 surveyed studies, 11 (34%) did not mention any user privacy protection, as shown in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. This finding is in line with the findings of previous studies. For example, Nurgalieva et al [<xref ref-type="bibr" rid="ref59">59</xref>] found that only a third of their reviewed mHealth papers considered privacy and security together. A recent survey study revealed that most (68%) of the reviewed MMHS were not sufficiently transparent regarding privacy protection information, whereas more than half had no privacy policy at all [<xref ref-type="bibr" rid="ref60">60</xref>]. Furthermore, the study found that even in the case of mobile apps that had a privacy policy, researchers collected data without informing users about how the data would be used [<xref ref-type="bibr" rid="ref60">60</xref>].</p>
          <p>We categorized the user privacy protection mechanisms implemented in our surveyed studies into the following types: data anonymization; encryption (when transferring data from local mobile devices to remote data storage [eg, cloud storage]); access control; archiving only features extracted from the original data, instead of the original data; and allowing certain collected data to be wiped out remotely by users. Among them, data anonymization and encryption were the most common mechanisms used. A shared key is needed in the process of encryption and decryption, and, according to federal HIPAA and Health Information Technology for Economic and Clinical Health Act regulations, the key length must be 128 bits. The National Institute of Standards and Technology recommends using Suite-B, a set of algorithms that exchange decryption keys and digital signatures to authenticate data [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
          <p>Despite the use of data anonymization and encryption having become common, there are still risks of data breach and disclosure, given that original data are stored physically. In comparison, archiving only selective features extracted from collected user data and allowing users to delete any collected data may help alleviate the risk of disclosure of, or unauthorized access to, personally sensitive data. For example, real-time audio processing can be used to extract relevant health inferences (ie, features) while discarding sensitive content. Of note, this option of privacy protection does not come without a cost—there is always a trade-off between user privacy and data utility: the fewer data points that MMHS collect, the higher the degree of user privacy protection but the more inferior the services they provide. For example, disabling collection of data about users’ physical activities or social interactions will help alleviate users’ privacy concerns, but it may also negatively affect the benefits of MMHS (eg, depression detection) because the systems may not infer users’ mental status accurately because of the removal of such data. By analogy, in e-commerce, consumers may sacrifice their privacy to some extent by allowing cookies to capture their behavior on an online retailer’s website to receive personalized services (eg, personalized product recommendations) [<xref ref-type="bibr" rid="ref61">61</xref>]. Therefore, understanding user perceptions of different types of personal data with regard to privacy and developing and deploying effective privacy protection methods have the potential to break the value-privacy paradox, which will ultimately influence user adoptions and continuous use of MMHS.</p>
        </sec>
        <sec>
          <title>The Research Model and Hypotheses</title>
          <p>As summarized in the previous section, existing MMHS have collected various types of personal data. We investigate privacy concerns mainly from the 2 dimensions in this research: data type and data stage.</p>
          <p>Researchers have found that the same individuals may have different levels of privacy concerns for different types of personal information [<xref ref-type="bibr" rid="ref62">62</xref>]. For instance, online shoppers tend to be more likely to withhold information such as purchase history, social security number, hobbies, and favorite websites than name, gender, and education information [<xref ref-type="bibr" rid="ref63">63</xref>]. Geographic location, mailing address, and information about friends and profession were common data types that a sample of 1000 French online users reported unwilling to disclose [<xref ref-type="bibr" rid="ref64">64</xref>]. From a social media perspective, interaction with others through social networks usually leads to generating and sharing personal information actively [<xref ref-type="bibr" rid="ref65">65</xref>]. Jin [<xref ref-type="bibr" rid="ref66">66</xref>] suggests that although Twitter users often share personal information about their daily lives and entertainment choices, they would hardly reveal their own mental or physical health information. Thus, we propose the first hypothesis as follows:</p>
          <p>Hypothesis 1. Data type has an effect on user privacy concerns with MMHS.</p>
          <p>Data processing stages can be another critical dimension of privacy in MMHS. Data processing starts with data <italic>collection</italic>. Because of limited storage space as well as limited processing power of a mobile or wearable device (eg, smartphone), the data collected by MMHS are typically transferred to a remote server or to the cloud for processing and storage, which will finally lead to data sharing. Xu (2019) characterizes the combination of health informatics and cloud computing as Health Informatics as a Service [<xref ref-type="bibr" rid="ref67">67</xref>]. Hindy et al (2020) emphasize the threats of personal information leakage at a data transmission level because mobile apps are increasingly dependent on wireless networks, which raises privacy concerns when transmitting data wirelessly [<xref ref-type="bibr" rid="ref68">68</xref>]. Zeissig et al [<xref ref-type="bibr" rid="ref69">69</xref>] and Kotz [<xref ref-type="bibr" rid="ref33">33</xref>] suggest that privacy concerns vary with an app’s functionality and the entities that process data. Given that the data at different stages can be exposed to different levels of privacy risks and data transmission and data sharing are particularly vulnerable to intrusion with regard to data privacy, we propose the second hypothesis as follows:</p>
          <p>Hypothesis 2. Data stage has an effect on user privacy concerns with MMHS.</p>
          <p>Hypothesis 2.1. Privacy concerns for the (i) data transmission and (ii) data sharing stages are higher than those for the data collection stage.</p>
          <p>Hypothesis 2.2. Privacy concerns for the (i) data transmission and (ii) data sharing stages are higher than those for the data storage stage.</p>
          <p>Privacy awareness refers to the extent to which individuals are well informed about privacy practices and privacy breach incidents around themselves [<xref ref-type="bibr" rid="ref70">70</xref>]. A number of studies have found that privacy awareness is positively associated with privacy concerns in the context of computer use [<xref ref-type="bibr" rid="ref71">71</xref>], peer relationships on social media [<xref ref-type="bibr" rid="ref72">72</xref>], older generation’s online privacy perception [<xref ref-type="bibr" rid="ref69">69</xref>], personal cloud storage apps [<xref ref-type="bibr" rid="ref73">73</xref>], news content ownership on social media [<xref ref-type="bibr" rid="ref74">74</xref>], and so on.</p>
          <p>Privacy victimization experience has been shown to influence privacy concerns in previous studies [<xref ref-type="bibr" rid="ref70">70</xref>-<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref76">76</xref>]. Privacy calculus theory [<xref ref-type="bibr" rid="ref24">24</xref>] posits that individuals tend to weigh potential benefits and risks of data disclosure decisions. They will disclose personal information when the perceived benefits exceed the potential cost. If they have been previously victimized by privacy disclosure, they may perceive the cost of data disclosure to be higher than the benefit and be hesitant to take a risk. Therefore, previous experience of having been a victim of privacy intrusion could result in MMHS users assessing risks and foreseeing future consequences of privacy intrusion better. For example, Chen et al [<xref ref-type="bibr" rid="ref77">77</xref>] suggest that online scam victims have higher perceived threat than nonvictims. Most victims of personal information breaches feel fearful, angry, and depressed after being victimized, leading to greater privacy concerns than before [<xref ref-type="bibr" rid="ref78">78</xref>]. Bansal et al [<xref ref-type="bibr" rid="ref75">75</xref>] suggest that privacy victimization experience would significantly increase when disclosing private information online. This positive relationship between privacy victimization experience and privacy concerns has also been demonstrated in e-commerce [<xref ref-type="bibr" rid="ref76">76</xref>], internet use for general purposes [<xref ref-type="bibr" rid="ref79">79</xref>], social network platforms [<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref81">81</xref>], allowing permission requests for data acquisition by mobile apps [<xref ref-type="bibr" rid="ref82">82</xref>], and Android app downloads [<xref ref-type="bibr" rid="ref83">83</xref>]. Thus, we predict that people with a higher level of privacy awareness and privacy victimization experience would be more sensitive and concerned about privacy when using MMHS. Therefore, we propose the following 2 hypotheses:</p>
          <p>Hypothesis 3. Privacy awareness is positively associated with privacy concerns about MMHS.</p>
          <p>Hypothesis 4. Privacy victimization experience is positively associated with privacy concerns about MMHS.</p>
          <p>An agreeable attitude toward privacy protection has been suggested as one of the major outcomes of privacy concerns [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref85">85</xref>]. For example, when an individual has a significant privacy concern, they would likely change their online account passwords more frequently than those with lower privacy concerns [<xref ref-type="bibr" rid="ref77">77</xref>]. Deleting cookies, using ad blockers, and choosing a browser mode that keeps browsing history hidden are typical privacy protection methods used when browsing the web [<xref ref-type="bibr" rid="ref86">86</xref>]. Similarly, users of social media [<xref ref-type="bibr" rid="ref87">87</xref>,<xref ref-type="bibr" rid="ref88">88</xref>] and e-commerce services [<xref ref-type="bibr" rid="ref89">89</xref>] also seem to look for personal information protection after recognizing privacy risks.</p>
          <p>Privacy literacy is another predictor of an agreeable attitude toward privacy protection. Self-control theory [<xref ref-type="bibr" rid="ref77">77</xref>] posits that one’s ability to regulate emotions, behaviors, and desires is determined by one’s general intelligence and prior training. People who have high self-control derived from intelligence and sufficient training are likely to pursue a good way of solving a problem [<xref ref-type="bibr" rid="ref90">90</xref>]. Accordingly, it is reasonable to predict that the level of a user’s privacy literacy, such as HIPAA knowledge level, may influence their privacy concerns about MMHS. Therefore, we hypothesize a positive relationship between HIPAA knowledge level and an agreeable attitude toward privacy protection as follows:</p>
          <p>Hypothesis 5. Privacy concerns are positively associated with an agreeable attitude toward privacy protection in MMHS.</p>
          <p>Hypothesis 6. HIPAA knowledge level is positively associated with an agreeable attitude toward privacy protection in MMHS.</p>
          <p>Privacy protection methods can be viewed as solutions to coping with users’ privacy concerns. The Protection Motivation Theory explains how fear may change one’s attitude and behavior [<xref ref-type="bibr" rid="ref91">91</xref>,<xref ref-type="bibr" rid="ref92">92</xref>]. If an event incurs fear, one may try to reduce unstable emotional state and seek alternative ways in which one can find adaptive coping responses. In the context of MMHS, fear may arise from privacy concerns triggered by threats to personal information. Several studies have explored the relationship between the attitude toward privacy protection and intention to use mHealth systems [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. Attitudes toward privacy protection involve a positive perception of usefulness and optimistic expectation of specific methods. It has been found that users’ perceived usefulness of health Internet of Things systems has a significant impact on their intention to use the systems [<xref ref-type="bibr" rid="ref93">93</xref>]. For example, consumers tend to have a stronger willingness to use health recommendation systems when they feel that the latter are useful for fulfilling their health goals [<xref ref-type="bibr" rid="ref94">94</xref>]. Employees’ optimistic attitudes toward their mobile devices have also been found to have a positive impact on users’ intention to use a mobile device in the workplace [<xref ref-type="bibr" rid="ref95">95</xref>]. Therefore, we propose the following hypothesis:</p>
          <p>Hypothesis 7. An agreeable attitude toward privacy protection is positively associated with the continuous usage intention of MMHS.</p>
          <p>MMH literacy [<xref ref-type="bibr" rid="ref96">96</xref>,<xref ref-type="bibr" rid="ref97">97</xref>] plays an important role in the context of health care systems. Zhang and Yan [<xref ref-type="bibr" rid="ref98">98</xref>] reported that eHealth literacy affected users’ continuous intention to use mHealth apps. Drawing on the Elaboration Likelihood Model [<xref ref-type="bibr" rid="ref99">99</xref>], they suggested that eHealth literacy would foster satisfactory emotions for apps, which in turn motivated continuous intention to use them. Britt et al [<xref ref-type="bibr" rid="ref100">100</xref>] demonstrated that a higher literacy level measured by the eHealth Literacy Scale led to a greater intention to use online health resources. In the same vein, Kim et al [<xref ref-type="bibr" rid="ref101">101</xref>] found that mental health literacy would promote help-seeking behavior of college students. Therefore, we expect that patients with higher levels of MMH literacy may understand the potential benefits of MMHS better and accordingly are more likely to use them. Hence, we propose the following hypothesis:</p>
          <p>Hypothesis 8. MMH literacy is positively associated with the continuous usage intention of MMHS.</p>
          <p>Our research model is shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>The research model (H: hypothesis; HIPAA: Health Insurance Portability and Accountability Act; MMH: mobile mental health; MMHS: mobile mental health systems).</p>
            </caption>
            <graphic xlink:href="mental_v8i12e31633_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>To test the hypotheses, we conducted a web-based survey to collect data after receiving approval from the institutional review board of our institution.</p>
      <sec>
        <title>Survey Instruments and Procedure</title>
        <p>Given that this study is targeted at a specific population, we deployed a prescreening questionnaire to determine participants’ eligibility for the study. The eligibility criteria were as follows: participants who (1) were aged ≥18 years, (2) had mental health issues in the past 12 months, and (3) had used any MMHS in the past 12 months. Only qualified participants could proceed with the formal survey.</p>
        <p>The formal survey questionnaire (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>) consisted of 3 parts: part 1 collected information about participants’ basic demographics, mHealth literacy, and knowledge about HIPAA; part 2 consisted of questions about participants’ use of MMHS and their prior experience with privacy protection methods; and part 3 asked questions about privacy concerns with regard to different data stages and data types. As discussed in the previous section, we considered the following 4 data stages: collection, transmission, storage, and sharing. In addition, we drew on the literature and identified the following 8 types of personal data: physiological signals, voice features, physical activities, facial expression, GPS location, social activities, device use, and self-reported data (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). Our design of the questionnaire for the agreeable attitude toward privacy protection, which was also based on the findings of our literature review (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>), consisted of 11 items corresponding to the following privacy protection methods: (1) displaying privacy policy, (2) obtaining user consent, (3) disabling collection of personally identifiable data, (4) user control, (5) encryption, (6) secure data transmission, (7) restriction of data storage access, (8) location protection, (9) feature extraction from audio data, (10) feature extraction from text data, and (11) data retraction. All the survey questions were rated on a 7-point Likert scale, ranging from strongly disagree (score=1) to strongly agree (score=7), with a score of 4 being neutral. The details of the relevant questionnaire items are presented in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref> [<xref ref-type="bibr" rid="ref102">102</xref>-<xref ref-type="bibr" rid="ref104">104</xref>] and <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref> [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref87">87</xref>,<xref ref-type="bibr" rid="ref88">88</xref>,<xref ref-type="bibr" rid="ref93">93</xref>,<xref ref-type="bibr" rid="ref94">94</xref>,<xref ref-type="bibr" rid="ref96">96</xref>,<xref ref-type="bibr" rid="ref100">100</xref>,<xref ref-type="bibr" rid="ref105">105</xref>,<xref ref-type="bibr" rid="ref106">106</xref>].</p>
        <p>To ensure data quality, we incorporated 3 attention-check questions into the survey, such as “Please skip this question and do not select anything.” We excluded from data analysis the data collected from the participants who failed to follow the instruction while responding to these questions.</p>
      </sec>
      <sec>
        <title>Participants</title>
        <p>We recruited participants from multiple venues such as online mental health communities (eg, the depression community on Reddit [n=159], the anxiety community on Reddit [n=134], and the mental health group on Facebook [n=55]).</p>
        <p>Among the 348 respondents who successfully passed the prescreening test questions, 134 (38.5%) failed the attention-check questions and another 44 (12.6%) completed the survey in an amount of time that was more than 3 SDs from the average time used by the participants of a pilot study. At the end, we obtained 48.9% (170/348) of valid responses. The demographic information of these respondents is presented in <xref ref-type="table" rid="table1">Table 1</xref>. Each participant was offered a US $5 Amazon gift card for completing the survey.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Demographic statistics of the survey respondents (N=170).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="550"/>
            <col width="420"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Demographic characteristics</td>
                <td>Participants, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Age (years)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>18-25</td>
                <td>47 (27.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>26-30</td>
                <td>71 (41.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>31-35</td>
                <td>42 (24.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>36-40</td>
                <td>7 (4.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>41-45</td>
                <td>3 (1.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Gender</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td>61 (35.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td>109 (64.1)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Education</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>High school graduate</td>
                <td>3 (1.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Some college</td>
                <td>89 (52.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>College graduate</td>
                <td>55 (32.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Postgraduate degree</td>
                <td>13 (7.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Some postgraduate work</td>
                <td>10 (5.9)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Marital status</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Married</td>
                <td>82 (48.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Single</td>
                <td>79 (46.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Divorced</td>
                <td>9 (5.3)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>We tested the left part of the model using a 2-way repeated analysis of variance and deployed partial least squares (PLS) regression for the right part of the model (<xref rid="figure1" ref-type="fig">Figure 1</xref>) using SmartPLS software [<xref ref-type="bibr" rid="ref107">107</xref>]. It is commonly recognized that correlations among independent variables might increase the variance and lower the power of regression analysis [<xref ref-type="bibr" rid="ref108">108</xref>,<xref ref-type="bibr" rid="ref109">109</xref>]. In view of the large number of data types considered in our research design, we first performed a principal component analysis through varimax rotation with Kaiser normalization [<xref ref-type="bibr" rid="ref110">110</xref>] to identify the principal components based on the eigenvalues and corresponding eigenvectors of the covariance matrix. Next, based on the results, we selected 4 principal components that explained more than 82% of the variance of the original data types. Specifically, physiological signals, voice features, physical activities, and facial expressions were grouped together and labeled as <italic>biometric factors</italic>, whereas GPS location and social activities were grouped together and labeled as <italic>social interactions</italic>. The remaining original data types—<italic>self-reported data</italic> and <italic>device use</italic>—were left unchanged. These 4 data types were used in subsequent data analyses.</p>
        <p>To support PLS regression analysis, we first examined the convergent validity and discriminant validity of the research constructs, which are critical building blocks of model evaluation. We tested the convergent validity with Cronbach α [<xref ref-type="bibr" rid="ref111">111</xref>], composite reliability with rho_A [<xref ref-type="bibr" rid="ref112">112</xref>], and discriminant validity with average variable extracted. Following the suggestion of Henseler et al [<xref ref-type="bibr" rid="ref113">113</xref>], we further assessed the discriminant validity by applying the Heterotrait-Monotrait ratio of correlations. Correlations among the constructs are presented in <xref ref-type="supplementary-material" rid="app5">Multimedia Appendix 5</xref>.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Descriptive Statistics and Construct Validations</title>
        <p>The test results of convergent and discriminant validity are reported in <xref ref-type="table" rid="table2">Table 2</xref>. They show that the internal consistency of all reflective constructs (ie, continuous usage intention, MMH literacy, privacy awareness, privacy victimization experience, and HIPAA knowledge level) was acceptable, with Cronbach α&#62;.75. In addition, both their composite reliability and rho_A values exceed the cutoff threshold (0.70) [<xref ref-type="bibr" rid="ref112">112</xref>]. The average variable extracted results show that all values were &#62;0.60, the acceptable level [<xref ref-type="bibr" rid="ref114">114</xref>]. The discriminant validity among the reflective constructs is further established based on the Heterotrait-Monotrait ratio of correlations (&#60;0.90; <xref ref-type="supplementary-material" rid="app6">Multimedia Appendix 6</xref>). The detailed factor loadings of the constructs and indicators are reported in <xref ref-type="supplementary-material" rid="app7">Multimedia Appendix 7</xref>.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Construct reliability and validity (reflective constructs only).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="230"/>
            <col width="190"/>
            <col width="140"/>
            <col width="220"/>
            <col width="220"/>
            <thead>
              <tr valign="top">
                <td>Constructs</td>
                <td>Cronbach α</td>
                <td>rho_A</td>
                <td>Composite reliability</td>
                <td>Average variable extracted</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Continuous usage intention</td>
                <td>.759</td>
                <td>0.764</td>
                <td>0.862</td>
                <td>0.675</td>
              </tr>
              <tr valign="top">
                <td>MMH<sup>a</sup> literacy</td>
                <td>.892</td>
                <td>0.899</td>
                <td>0.915</td>
                <td>0.607</td>
              </tr>
              <tr valign="top">
                <td>Privacy awareness</td>
                <td>.829</td>
                <td>0.834</td>
                <td>0.886</td>
                <td>0.660</td>
              </tr>
              <tr valign="top">
                <td>Privacy victimization experience</td>
                <td>.842</td>
                <td>0.872</td>
                <td>0.892</td>
                <td>0.630</td>
              </tr>
              <tr valign="top">
                <td>HIPAA<sup>b</sup> knowledge level</td>
                <td>1.000</td>
                <td>1.000</td>
                <td>1.000</td>
                <td>1.000</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>MMH: mobile mental health.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>HIPAA: Health Insurance Portability and Accountability Act.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>The top 3 most common mental health issues of the participants based on their self-reports were depression (33), dysthymia (30), and anxiety (24). According to Wasil et al [<xref ref-type="bibr" rid="ref115">115</xref>], there are approximately 325,000 mobile apps for health and wellness in the market (ie, Google Play and Apple App Store). Calm [<xref ref-type="bibr" rid="ref116">116</xref>], Talkspace [<xref ref-type="bibr" rid="ref117">117</xref>], PTSD (posttraumatic stress disorder) Coach [<xref ref-type="bibr" rid="ref118">118</xref>], and Optimism [<xref ref-type="bibr" rid="ref119">119</xref>] are the most commonly used MMHS among our survey respondents. Calm helps users practice meditation and sleep by providing mindfulness music and bedtime stories. It mainly collects data of users’ daily app use and time spent on meditating. Talkspace is designed to match a licensed mental health therapist with a user conveniently and affordably in comparison with in-person therapy. Talkspace allows users to submit text, image, and video data regarding their mental status when consulting therapists. PTSD Coach supports those who have PTSD. It gathers users’ self-assessment data of PTSD symptoms and daily app use data. Optimism is a mobile app used to track a user’s mood level on a daily basis as reported by users with mood disorder.</p>
        <p>On the basis of the results of the principal component analysis, we identified 4 main personal data types with respect to privacy concerns, including the degree of privacy concerns arising from <italic>biometric factors</italic>, <italic>social interactions</italic>, <italic>device use</italic>, and <italic>self-reported data</italic>. The descriptive statistics of privacy concerns and other research constructs are reported in <xref ref-type="table" rid="table3">Tables 3</xref> and <xref ref-type="table" rid="table4">4</xref>, respectively. For all the variables in <xref ref-type="table" rid="table3">Tables 3</xref> and <xref ref-type="table" rid="table4">4</xref>, their median, maximum, and minimum values are 5, 7, and 1, respectively.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Descriptive statistics of privacy concerns.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="540"/>
            <col width="0"/>
            <col width="430"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Research constructs and variables</td>
                <td>Values, mean (SD)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Data type</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Biometric factors</td>
                <td colspan="2">4.66 (1.89)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Social interaction</td>
                <td colspan="2">4.89 (1.71)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Device use</td>
                <td colspan="2">4.70 (1.76)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Self-reported data</td>
                <td colspan="2">4.92 (1.84)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Data stage</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Collect</td>
                <td colspan="2">4.61 (1.83)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Store</td>
                <td colspan="2">4.67 (1.83)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Transmit</td>
                <td colspan="2">4.80 (1.82)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Share</td>
                <td colspan="2">4.92 (1.82)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Descriptive statistics of other constructs.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="750"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Research constructs and variables</td>
                <td>Values, mean (SD)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Privacy awareness</td>
                <td>4.77 (1.75)</td>
              </tr>
              <tr valign="top">
                <td>Privacy concerns (composite)</td>
                <td>4.75 (1.83)</td>
              </tr>
              <tr valign="top">
                <td>Privacy victimization experience</td>
                <td>4.44 (1.96)</td>
              </tr>
              <tr valign="top">
                <td>Agreeable attitude toward privacy protection (composite)</td>
                <td>5.09 (1.57)</td>
              </tr>
              <tr valign="top">
                <td>MMH<sup>a</sup> literacy</td>
                <td>4.84 (1.69)</td>
              </tr>
              <tr valign="top">
                <td>HIPAA<sup>b</sup> knowledge level</td>
                <td>4.14 (1.92)</td>
              </tr>
              <tr valign="top">
                <td>Continuous usage intention</td>
                <td>5.04 (1.54)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>MMH: mobile mental health.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>HIPAA: Health Insurance Portability and Accountability Act.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Effects of Data Type and Data Stage</title>
        <p>We conducted a 2-way repeated analysis of variance by using privacy concerns as the dependent variable and data type and data stage as the independent variables. The results are reported in <xref ref-type="table" rid="table5">Table 5</xref>. The analyses yielded significant main effects of data type (<italic>P</italic>=.003) and data stage (<italic>P</italic>&#60;.001), as well as their significant interaction effect (<italic>P</italic>=.008) on privacy concerns.</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Analysis of variance results for the effects of data type and data stage on privacy concerns.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="260"/>
            <col width="260"/>
            <col width="370"/>
            <col width="110"/>
            <thead>
              <tr valign="top">
                <td>Sources</td>
                <td><italic>F</italic> test (<italic>df</italic>)</td>
                <td>Mean squared errors</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Data type</td>
                <td>4.73 (3,507)</td>
                <td>11.78</td>
                <td>.003</td>
              </tr>
              <tr valign="top">
                <td>Data stage</td>
                <td>9.35 (3,507)</td>
                <td>15.46</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>Data type×data stage</td>
                <td>2.47 (9,1521)</td>
                <td>2.25</td>
                <td>.008</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>The results of post hoc multiple comparisons of the effects of data type and data stage are reported in <xref ref-type="table" rid="table6">Tables 6</xref> and <xref ref-type="table" rid="table7">7</xref>, respectively. The analysis results of data type show that social interaction data (<italic>P</italic>=.007) and self-reported data (<italic>P</italic>=.001) raise greater privacy concerns than biometrics data. In addition, social interaction data cause higher privacy concerns than device use data (<italic>P</italic>=.045), whereas device use data provoke privacy concerns more than self-reported data (<italic>P</italic>=.02).</p>
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Results of comparison of privacy concerns across data types.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="300"/>
            <col width="300"/>
            <col width="210"/>
            <col width="160"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Data type (I) and data type (J)</td>
                <td> Mean difference (I–J)</td>
                <td><italic>P</italic> value</td>
                <td>SE</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="5">
                  <bold>Biometrics factors</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Social interaction</td>
                <td>–0.232</td>
                <td>.007</td>
                <td>0.084</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Device use</td>
                <td>–0.044</td>
                <td>.53</td>
                <td>0.070</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Self-reported data</td>
                <td>–0.262</td>
                <td>.001</td>
                <td>0.079</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Social interaction</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Device use</td>
                <td>0.188</td>
                <td>.045</td>
                <td>0.093</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Self-reported data</td>
                <td>–0.030</td>
                <td>.74</td>
                <td>0.092</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Device use</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Self-reported data</td>
                <td>–0.218</td>
                <td>.02</td>
                <td>0.093</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table7">
          <label>Table 7</label>
          <caption>
            <p>Results of comparison of privacy concerns across data stages.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="220"/>
            <col width="0"/>
            <col width="350"/>
            <col width="0"/>
            <col width="200"/>
            <col width="0"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Stage (I) and stage (J)</td>
                <td colspan="2">Mean difference (I–J)</td>
                <td colspan="2"><italic>P</italic> value</td>
                <td>SE</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="8">
                  <bold>Collect</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Store</td>
                <td colspan="2">–0.056</td>
                <td colspan="2">.36</td>
                <td colspan="2">0.060</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Transmit</td>
                <td colspan="2">–0.197</td>
                <td colspan="2">.01</td>
                <td colspan="2">0.075</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Share</td>
                <td colspan="2">–0.336</td>
                <td colspan="2">&#60;.001</td>
                <td colspan="2">0.091</td>
              </tr>
              <tr valign="top">
                <td colspan="8">
                  <bold>Store</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Transmit</td>
                <td colspan="2">–0.142</td>
                <td colspan="2">.01</td>
                <td colspan="2">0.057</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Share</td>
                <td colspan="2">–0.281</td>
                <td colspan="2">&#60;.001</td>
                <td colspan="2">0.068</td>
              </tr>
              <tr valign="top">
                <td colspan="8">
                  <bold>Transmit</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Share</td>
                <td colspan="2">–0.139</td>
                <td colspan="2">.02</td>
                <td colspan="2">0.061</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>The analysis results of data stage show that the data transmission stage raises greater privacy concerns than both data collection (<italic>P</italic>=.01) and data storage stages (<italic>P</italic>=.01), whereas the data sharing stage also raises higher privacy concerns than the data collection (<italic>P</italic>&#60;.001), data storage (<italic>P</italic>&#60;.001), and data transmission stages (<italic>P</italic>=.02). However, no difference was detected between the data collection and data storage stages (<italic>P</italic>=.36). Thus, hypotheses 1, 2.1 (i), 2.1 (ii), 2.2 (i), and 2.2 (ii) are supported.</p>
      </sec>
      <sec>
        <title>Effects on Continuous Usage Intention</title>
        <p>The results of PLS regression analysis are reported in <xref ref-type="table" rid="table8">Table 8</xref> and <xref rid="figure2" ref-type="fig">Figure 2</xref>. The results show that privacy victimization experience (<italic>P</italic>=.01) has a significant effect, whereas privacy awareness has a marginally significant effect (<italic>P</italic>=.08) on privacy concerns. Therefore, hypothesis 3 is marginally supported, whereas hypothesis 4 is supported. In addition, both privacy concerns (<italic>P</italic>=.001) and HIPAA knowledge level (<italic>P</italic>&#60;.001) have a positive effect on agreeable attitude toward privacy protection. Therefore, both hypotheses 5 and 6 are supported. Furthermore, both agreeable attitude toward privacy protection (<italic>P</italic>=.001) and MMH literacy (<italic>P=</italic>.001) have a positive effect on the continuous usage intention of MMHS. Therefore, hypotheses 7 and 8 are also supported.</p>
        <table-wrap position="float" id="table8">
          <label>Table 8</label>
          <caption>
            <p>Results of partial least squares regression analysis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="560"/>
            <col width="130"/>
            <col width="210"/>
            <col width="100"/>
            <thead>
              <tr valign="top">
                <td>Hypotheses</td>
                <td>Estimate (SD)</td>
                <td>t-statistic (<italic>df</italic>)</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Data type→Privacy concerns</td>
                <td>—<sup>a</sup></td>
                <td>—<sup>a</sup></td>
                <td>—<sup>a</sup></td>
              </tr>
              <tr valign="top">
                <td>Data transmission and data sharing stages→Privacy concerns</td>
                <td>—<sup>b</sup></td>
                <td>—<sup>b</sup></td>
                <td>—<sup>b</sup></td>
              </tr>
              <tr valign="top">
                <td>Privacy awareness→Privacy concerns</td>
                <td>0.309 (0.179)</td>
                <td>1.728 (499)</td>
                <td>.08</td>
              </tr>
              <tr valign="top">
                <td>Privacy victimization experience→Privacy concerns</td>
                <td>0.434 (0.172)</td>
                <td>2.515 (499)</td>
                <td>.01</td>
              </tr>
              <tr valign="top">
                <td>Privacy concerns→Agreeable attitude toward privacy protection</td>
                <td>0.374 (0.109)</td>
                <td>3.440 (499)</td>
                <td>.001</td>
              </tr>
              <tr valign="top">
                <td>HIPAA<sup>c</sup> knowledge level→Agreeable attitude toward privacy protection</td>
                <td>0.422 (0.089)</td>
                <td>4.728 (499)</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>Agreeable attitude toward privacy protection→Continuous usage intention of MMHS<sup>d</sup></td>
                <td>0.372 (0.116)</td>
                <td>3.199 (499)</td>
                <td>.001</td>
              </tr>
              <tr valign="top">
                <td>MMH<sup>e</sup> literacy→Continuous usage intention of MMHS</td>
                <td>0.370 (0.107)</td>
                <td>3.461 (499)</td>
                <td>.001</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table8fn1">
              <p><sup>a</sup>See <xref ref-type="table" rid="table6">Table 6</xref>.</p>
            </fn>
            <fn id="table8fn2">
              <p><sup>b</sup>See <xref ref-type="table" rid="table7">Table 7</xref>.</p>
            </fn>
            <fn id="table8fn3">
              <p><sup>c</sup>HIPAA: Health Insurance Portability and Accountability Act.</p>
            </fn>
            <fn id="table8fn4">
              <p><sup>d</sup>MMHS: mobile mental health systems.</p>
            </fn>
            <fn id="table8fn5">
              <p><sup>e</sup>MMH: mobile mental health.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Results of the research model. HIPAA: Health Insurance Portability and Accountability Act; MMH: mobile mental health; MMHS: mobile mental health systems.</p>
          </caption>
          <graphic xlink:href="mental_v8i12e31633_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Overview</title>
        <p>MMHS have been increasingly used to monitor users’ emotional status, improve mental illness management, and retain psychological well-being [<xref ref-type="bibr" rid="ref120">120</xref>]. However, users’ privacy concerns with regard to the use of MMHS can be a critical barrier to their adoption of, and benefiting from, these systems [<xref ref-type="bibr" rid="ref121">121</xref>]. This study proposes and tests a novel research model for explaining user privacy concerns about MMHS from the data and user experience perspectives and examines the direct or indirect effects of privacy concerns on user perceptions of different privacy protection methods and intention to continue using MMHS.</p>
      </sec>
      <sec>
        <title>Principal Findings</title>
        <p>First, we discovered a significant main effect of data type on privacy concerns. Respondents expressed stronger privacy concerns about social interaction data (eg, outgoing or incoming phone calls and SMS text messages) and self-reported data (eg, current medication) than physiological data and device use data. The strong concern about social interaction data is somewhat surprising because one may assume intuitively that physiological signals (ie, skin temperature and heart rate) and physical activities (ie, walking and sleeping) should be more privacy sensitive. A possible explanation is that social isolation is one of the most typical characteristics of individuals with mental health issues [<xref ref-type="bibr" rid="ref122">122</xref>,<xref ref-type="bibr" rid="ref123">123</xref>]. As a result, this subpopulation may perceive social interaction data as more private than physiological and physical activity data.</p>
        <p>Second, this study reveals a significant effect of data stage on privacy concerns. Specifically, data transmission and data sharing cause higher privacy concerns than data collection and data storage, which supports our hypotheses.</p>
        <p>Third, the results confirm our hypothesis that privacy victimization experience has a positive effect on privacy concerns. Although privacy awareness is positively associated with privacy concerns, this effect was only marginally significant at a 0.1 significance level. A possible explanation lies in what constitutes privacy awareness. Correia and Compeau [<xref ref-type="bibr" rid="ref124">124</xref>] argue that privacy awareness consists of 3 elements: the literacy of the elements related to privacy, the recognition that the elements exist in a current system, and the forecast of their impacts on the future. Thus, these aspects may guide future efforts in improving the effectiveness of privacy awareness training.</p>
        <p>Fourth, the findings of this study show that increasing privacy concerns escalate agreeable attitude toward privacy protection.</p>
        <p>Fifth, our findings show that privacy knowledge about HIPAA contributes to an agreeable attitude toward privacy protection of MMHS. In addition, MMH literacy facilitates continuous usage intention of using MMHS. The findings suggest the importance of increasing privacy knowledge and mHealth literacy of users with mental health issues for improving the use of MMHS.</p>
      </sec>
      <sec>
        <title>Research Contributions</title>
        <p>Despite increasing efforts being made with regard to leveraging mobile and sensing technologies for improving public mental health, there has been a lack of research on the understanding of users’ privacy concerns and their impacts on the use of MMHS. This study makes contributions to the multidisciplinary literature. First, to the best of our knowledge, this study is the first research effort that systematically investigates user privacy concerns in the context of MMHS. Second, this study not only extends the Antecedents→Privacy Concerns→Outcomes model to MMHS, but also introduces new constructs, including HIPAA knowledge level and MMH literacy. Third, unlike prior studies that treated privacy data as monotonic [<xref ref-type="bibr" rid="ref86">86</xref>,<xref ref-type="bibr" rid="ref125">125</xref>,<xref ref-type="bibr" rid="ref126">126</xref>], this research for the first time innovatively probes different data types and stages while investigating privacy concerns. The differences in the effects on privacy concerns of different data types and data stages have significant implications for future privacy research. Fourth, this study introduces MMH literacy as an antecedent to the continuous usage intention of MMHS. eHealth literacy has been used to assess healthy behavior on the internet [<xref ref-type="bibr" rid="ref127">127</xref>-<xref ref-type="bibr" rid="ref129">129</xref>], but it has rarely been used to explain the continuous intention to use innovative technology. Last but not least, this study goes beyond privacy concerns by understanding their effects on privacy protection. Our research findings reveal that an agreeable attitude toward privacy protection mediates the relationship between privacy concerns and users’ continuous MMHS usage intention.</p>
      </sec>
      <sec>
        <title>Practical Implications</title>
        <p>This study offers a number of practical implications for different stakeholders of MMHS. For designers and developers of user-centric privacy-protecting MMHS, different effects of various personal data on privacy concerns suggest that different types of personal data should not be treated equally from a privacy protection perspective; designers and developers should care not only about the types of user data being collected, but also about how the data will be processed. In particular, they should pay more attention to effective privacy protection methods deployed for data sharing and data transmission than those deployed for data collection and data storage. As users differ in terms of their sensitivity to privacy and different personal data, the deployed privacy protection methods should be user-centered and personalized; the effect of privacy concerns on continuous MMHS usage intention can be mediated by privacy protection. Thus, implementing privacy protection measures and developing ways to improve the MMH literacy of patients can be effective strategies for increasing the trust of patients with mental health issues in MMHS and their adoption and continuous use of MMHS.</p>
        <p>From an MMHS user perspective, users should increase their awareness of different types of data collected by MMHS; improve their knowledge regarding privacy and MMH literacy; and be educated about different privacy protection methods, which can help them choose MMHS and understand how these methods can possibly address their privacy concerns.</p>
        <p>The following is a set of general guidelines for the design of user-centered, privacy-preserving MMHS based on the findings of this research:</p>
        <list list-type="bullet">
          <list-item>
            <p>Only collect user data that are relevant to MMH</p>
          </list-item>
          <list-item>
            <p>Deidentify any data that may reveal the identity of individual users</p>
          </list-item>
          <list-item>
            <p>Encrypt data, particularly during data transmission and data sharing</p>
          </list-item>
          <list-item>
            <p>Provide user-controlled data collection, enabling users to remove certain collected data of their choice</p>
          </list-item>
          <list-item>
            <p>Provide user-controlled data access: data access and sharing should be limited to specific, user-approved parties</p>
          </list-item>
          <list-item>
            <p>Provide continuous mobile user authentication to ensure that the data are collected from the right person</p>
          </list-item>
          <list-item>
            <p>Include audits and risk assessment in privacy protocols</p>
          </list-item>
          <list-item>
            <p>Set up a policy that encrypts self-reported data and social interaction data</p>
          </list-item>
          <list-item>
            <p>Collect information about users’ prior experiences of privacy victimization and recommend targeted privacy protection methods</p>
          </list-item>
          <list-item>
            <p>Improve public education about the goals, methods, and procedures of data management and privacy protection, which is essential</p>
          </list-item>
          <list-item>
            <p>Allow users to adjust privacy levels and retract collected data. This will be one of the balanced solutions in practice</p>
          </list-item>
          <list-item>
            <p>Design MMHS with an emphasis on personalized privacy protection. Personalization is one of the key features of recent MMHS to provide customized treatment to individuals</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Limitations of the Study and Future Research</title>
        <p>This study includes several limitations that offer future research opportunities. We used a web-based survey for data collection in this study, which is subject to the limitations of self-reported data. Future studies may collect actual patient use data by either collaborating with MMHS providers or using self-developed mobile apps. We also acknowledge that our recruitment strategy may pose a potential risk for selection bias—though our university-wide solicitation for participation was circulated through the university’s email listserv, students could be more technology savvy and therefore more willing to participate than faculty and staff members. In addition, our recruitment flyer, which was circulated through online mental health communities, may have caused hesitation among individuals who have privacy concerns about using technology for mental health to participate in this survey. In addition to data type and data stage, other factors of MMHS, such as system functions, can be potential antecedents of privacy concerns. For instance, MMHS that focus on improving mindfulness and sleep quality, such as Calm and Headspace [<xref ref-type="bibr" rid="ref130">130</xref>,<xref ref-type="bibr" rid="ref131">131</xref>], are likely to yield different levels of privacy concerns compared with MMHS that focus on serious clinical mental illness, such as PTSD Coach and NOCD (an MMHS for the treatment of obsessive-compulsive disorder).</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>A summary of collected patient data and privacy protection methods in existing mobile mental health studies (N=32).</p>
        <media xlink:href="mental_v8i12e31633_app1.docx" xlink:title="DOCX File , 22 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Survey questionnaire.</p>
        <media xlink:href="mental_v8i12e31633_app2.docx" xlink:title="DOCX File , 23 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Construct measurement - privacy concerns.</p>
        <media xlink:href="mental_v8i12e31633_app3.docx" xlink:title="DOCX File , 17 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Construct measurements - other concerns.</p>
        <media xlink:href="mental_v8i12e31633_app4.docx" xlink:title="DOCX File , 19 KB"/>
      </supplementary-material>
      <supplementary-material id="app5">
        <label>Multimedia Appendix 5</label>
        <p>Correlations among the constructs.</p>
        <media xlink:href="mental_v8i12e31633_app5.docx" xlink:title="DOCX File , 14 KB"/>
      </supplementary-material>
      <supplementary-material id="app6">
        <label>Multimedia Appendix 6</label>
        <p>Discriminant validity: Heterotrait-Monotrait ratio of correlations.</p>
        <media xlink:href="mental_v8i12e31633_app6.docx" xlink:title="DOCX File , 13 KB"/>
      </supplementary-material>
      <supplementary-material id="app7">
        <label>Multimedia Appendix 7</label>
        <p>Factor loadings.</p>
        <media xlink:href="mental_v8i12e31633_app7.docx" xlink:title="DOCX File , 18 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">MMH</term>
          <def>
            <p>mobile mental health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">MMHS</term>
          <def>
            <p>mobile mental health systems</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PHI</term>
          <def>
            <p>protected health information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PLS</term>
          <def>
            <p>partial least squares</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This research was sponsored in part by the US National Science Foundation (award number: CNS 1704800) and the University of North Carolina at Charlotte School of Data Science Seed Grant (award number 2020005). Any opinions, findings, and conclusions expressed in this manuscript are those of the authors and do not necessarily reflect the views of the sponsors.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kotz</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gunter</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Weiner</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>Privacy and security in mobile health: a research agenda</article-title>
          <source>Computer (Long Beach Calif)</source>
          <year>2016</year>
          <month>06</month>
          <volume>49</volume>
          <issue>6</issue>
          <fpage>22</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28344359"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/MC.2016.185</pub-id>
          <pub-id pub-id-type="medline">28344359</pub-id>
          <pub-id pub-id-type="pmcid">PMC5362254</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Silver</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Smartphone ownership is growing rapidly around the world, but not always equally</article-title>
          <source>Pew Research Center</source>
          <year>2019</year>
          <access-date>2021-11-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/global/2019/02/05/smartphone-ownership-is-growing-rapidly-around-the-world-but-not-always-equally/">https://www.pewresearch.org/global/2019/02/05/smartphone-ownership-is-growing-rapidly-around-the-world-but-not-always-equally/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Islam</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Mobile apps for mental health: a content analysis</article-title>
          <source>Indian J Mental Health</source>
          <year>2020</year>
          <volume>7</volume>
          <issue>3</issue>
          <fpage>222</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://indianmentalhealth.com/pdf/2020/vol7-issue3/9-Original-Research-Article_Mobile-apps-for-Mental.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bidja</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>DepressionGNN: depression prediction using graph neural network on smartphone and wearable sensors</article-title>
          <source>University of Connecticut</source>
          <year>2019</year>
          <access-date>2021-11-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://opencommons.uconn.edu/cgi/viewcontent.cgi?article=1640&#38;context=srhonors_theses">https://opencommons.uconn.edu/cgi/viewcontent.cgi?article=1640&#38;context=srhonors_theses</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>PS</given-names>
            </name>
            <name name-style="western">
              <surname>Piscitello</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zulueta</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ajilore</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Ryan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Leow</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>DeepMood: modeling mobile phone typing dynamics for mood detection</article-title>
          <source>Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>
          <year>2017</year>
          <conf-name>Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</conf-name>
          <conf-date>Aug 13 - 17, 2017</conf-date>
          <conf-loc>Halifax NS Canada</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3097983.3098086</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Aung</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Ben-Zeev</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Brian</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>AT</given-names>
            </name>
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hauser</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kane</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Scherer</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Walsh</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Predicting symptom trajectories of schizophrenia using mobile sensing</article-title>
          <source>Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies</source>
          <year>2017</year>
          <month>09</month>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>24</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pac.cs.cornell.edu/pubs/IMWUT_2017_predicting_trajectory.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3130976</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information privacy research: an interdisciplinary review</article-title>
          <source>MIS Q</source>
          <year>2011</year>
          <month>12</month>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>989</fpage>
          <lpage>1015</lpage>
          <pub-id pub-id-type="doi">10.2307/41409970</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Privacy and confidentiality in the nationwide health information network</article-title>
          <source>National Committee on Vital and Health Statistics</source>
          <access-date>2021-11-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://library.ahima.org/doc?oid=75960#.YZKBzGBBzIU">https://library.ahima.org/doc?oid=75960#.YZKBzGBBzIU</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arora</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yttri</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nilse</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Privacy and security in mobile health (mHealth) research</article-title>
          <source>Alcohol Res</source>
          <year>2014</year>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>143</fpage>
          <lpage>51</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26259009"/>
          </comment>
          <pub-id pub-id-type="medline">26259009</pub-id>
          <pub-id pub-id-type="pmcid">PMC4432854</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sampat</surname>
              <given-names>BH</given-names>
            </name>
            <name name-style="western">
              <surname>Prabhakar</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Privacy risks and security threats in mHealth apps</article-title>
          <source>J Int Technol Inf Manag</source>
          <year>2017</year>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>126</fpage>
          <lpage>53</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarworks.lib.csusb.edu/cgi/viewcontent.cgi?article=1353&#38;context=jitim"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tovino</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>Privacy and security issues with mobile health research applications</article-title>
          <source>J Law Med Ethics</source>
          <year>2020</year>
          <month>03</month>
          <volume>48</volume>
          <issue>1_suppl</issue>
          <fpage>154</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1177/1073110520917041</pub-id>
          <pub-id pub-id-type="medline">32342741</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Birenboim</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dijst</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Scheepers</surname>
              <given-names>FE</given-names>
            </name>
            <name name-style="western">
              <surname>Poelman</surname>
              <given-names>MP</given-names>
            </name>
            <name name-style="western">
              <surname>Helbich</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Wearables and location tracking technologies for mental-state sensing in outdoor environments</article-title>
          <source>Prof Geogr</source>
          <year>2019</year>
          <month>03</month>
          <day>25</day>
          <volume>71</volume>
          <issue>3</issue>
          <fpage>449</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1080/00330124.2018.1547978</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Salafi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kah</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Design of unobtrusive wearable mental stress monitoring device using physiological sensor</article-title>
          <source>7th WACBE World Congress on Bioengineering 2015</source>
          <year>2015</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bogomolov</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lepri</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ferron</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pianesi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Daily stress recognition from mobile phone data, weather conditions and individual traits</article-title>
          <source>Proceedings of the 22nd ACM International Conference on Multimedia</source>
          <year>2014</year>
          <conf-name>Proceedings of the 22nd ACM international conference on Multimedia</conf-name>
          <conf-date>Nov 3 - 7, 2014</conf-date>
          <conf-loc>Orlando Florida USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2647868.2654933</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kidd</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Feldcamp</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Adler</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kaleis</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Vichnevetski</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>McKenzie</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Voineskos</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Feasibility and outcomes of a multi-function mobile health approach for the schizophrenia spectrum: App4Independence (A4i)</article-title>
          <source>PLoS One</source>
          <year>2019</year>
          <volume>14</volume>
          <issue>7</issue>
          <fpage>e0219491</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0219491"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0219491</pub-id>
          <pub-id pub-id-type="medline">31306439</pub-id>
          <pub-id pub-id-type="pii">PONE-D-18-20735</pub-id>
          <pub-id pub-id-type="pmcid">PMC6629069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Kerz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Folarin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Joyce</surname>
              <given-names>DW</given-names>
            </name>
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Karr</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Dobson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>MacCabe</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Capturing rest-activity profiles in schizophrenia using wearable and mobile technologies: development, implementation, feasibility, and acceptability of a remote monitoring platform</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>10</month>
          <day>30</day>
          <volume>6</volume>
          <issue>10</issue>
          <fpage>e188</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/10/e188/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.8292</pub-id>
          <pub-id pub-id-type="medline">30377146</pub-id>
          <pub-id pub-id-type="pii">v6i10e188</pub-id>
          <pub-id pub-id-type="pmcid">PMC6234334</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fraiwan</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Basmaji</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hassanin</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>A mobile mental health monitoring system: a smart glove</article-title>
          <source>Proceedings of the 2018 14th International Conference on Signal-Image Technology &#38; Internet-Based Systems (SITIS)</source>
          <year>2018</year>
          <conf-name>2018 14th International Conference on Signal-Image Technology &#38; Internet-Based Systems (SITIS)</conf-name>
          <conf-date>Nov 26-29, 2018</conf-date>
          <conf-loc>Las Palmas de Gran Canaria, Spain</conf-loc>
          <pub-id pub-id-type="doi">10.1109/sitis.2018.00043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Woo</surname>
              <given-names>WL</given-names>
            </name>
          </person-group>
          <article-title>IoT structured long-term wearable social sensing for mental wellbeing</article-title>
          <source>IEEE Internet Things J</source>
          <year>2019</year>
          <month>4</month>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>3652</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1109/jiot.2018.2889966</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdullah</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Matthews</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Frank</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Gay</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Automatic detection of social rhythms in bipolar disorder</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2016</year>
          <month>05</month>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>538</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1093/jamia/ocv200</pub-id>
          <pub-id pub-id-type="medline">26977102</pub-id>
          <pub-id pub-id-type="pii">ocv200</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barth</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>MD</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review</article-title>
          <source>Telemat Inf</source>
          <year>2017</year>
          <month>11</month>
          <volume>34</volume>
          <issue>7</issue>
          <fpage>1038</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2017.04.013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Adjerid</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Balebako</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Brandimarte</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Cranor</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Komanduri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Leon</surname>
              <given-names>PG</given-names>
            </name>
            <name name-style="western">
              <surname>Sadeh</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Schaub</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Sleeper</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Nudges for privacy and security</article-title>
          <source>ACM Comput Surv</source>
          <year>2017</year>
          <month>10</month>
          <volume>50</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.1145/3054926</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Caine</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Exploring everyday privacy behaviors and misclosures</article-title>
          <source>Georgia Tech Library</source>
          <year>2009</year>
          <access-date>2021-11-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://smartech.gatech.edu/handle/1853/31665?show=full">https://smartech.gatech.edu/handle/1853/31665?show=full</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Watzlaf</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Parmanto</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Barriers to and facilitators of the use of mobile health apps from a security perspective: mixed-methods study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>04</month>
          <day>16</day>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>e11223</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/4/e11223/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11223</pub-id>
          <pub-id pub-id-type="medline">30990458</pub-id>
          <pub-id pub-id-type="pii">v7i4e11223</pub-id>
          <pub-id pub-id-type="pmcid">PMC6488955</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Culnan</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>PK</given-names>
            </name>
          </person-group>
          <article-title>Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation</article-title>
          <source>Organ Sci</source>
          <year>1999</year>
          <month>02</month>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>104</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.10.1.104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Warren</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Brandeis</surname>
              <given-names>LD</given-names>
            </name>
          </person-group>
          <article-title>The right to privacy</article-title>
          <source>Harv Law Rev</source>
          <year>1890</year>
          <month>12</month>
          <day>15</day>
          <volume>4</volume>
          <issue>5</issue>
          <fpage>193</fpage>
          <lpage>220</lpage>
          <pub-id pub-id-type="doi">10.2307/1321160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kweon</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>L</given-names>
            </name>
            <collab>editors</collab>
          </person-group>
          <article-title>Privacy in Mobile Advertising: From a User Perspective</article-title>
          <year>2012</year>
          <month>08</month>
          <conf-name>18th Americas Conference on Information Systems</conf-name>
          <conf-date>2012</conf-date>
          <conf-loc>Seattle, USA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Crossler</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bélanger</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The mobile privacy-security knowledge gap model: understanding behaviors</article-title>
          <source>CORE</source>
          <access-date>2021-11-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://core.ac.uk/download/pdf/77239956.pdf">https://core.ac.uk/download/pdf/77239956.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kokolakis</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon</article-title>
          <source>Comput Secur</source>
          <year>2017</year>
          <month>01</month>
          <volume>64</volume>
          <fpage>122</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2015.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Plachkinova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Andrés</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chatterjee</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A taxonomy of mhealth apps - security and privacy concerns</article-title>
          <source>Proceedings of the 2015 48th Hawaii International Conference on System Sciences</source>
          <year>2015</year>
          <conf-name>2015 48th Hawaii International Conference on System Sciences</conf-name>
          <conf-date>Jan 5-8, 2015</conf-date>
          <conf-loc>Kauai, HI, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/hicss.2015.385</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stavrou</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Pitsillides</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security challenges in a mobile healthcare environment</article-title>
          <source>Proceedings of the IWWST '05, 3rd International Workshop in Wireless Security Technologies</source>
          <year>2005</year>
          <conf-name>IWWST '05, 3rd International Workshop in Wireless Security Technologies</conf-name>
          <conf-date>Apr 4-5, 2005</conf-date>
          <conf-loc>London, UK</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kotz</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A threat taxonomy for mHealth privacy</article-title>
          <source>Proceedings of the 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</source>
          <year>2011</year>
          <conf-name>2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</conf-name>
          <conf-date>Jan 4-8, 2011</conf-date>
          <conf-loc>Bangalore, India</conf-loc>
          <pub-id pub-id-type="doi">10.1109/comsnets.2011.5716518</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Armontrout</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Drogin</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Gutheil</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Mobile mental health: navigating new rules and regulations for digital tools</article-title>
          <source>Curr Psychiatry Rep</source>
          <year>2016</year>
          <month>10</month>
          <day>23</day>
          <volume>18</volume>
          <issue>10</issue>
          <fpage>91</fpage>
          <pub-id pub-id-type="doi">10.1007/s11920-016-0726-x</pub-id>
          <pub-id pub-id-type="medline">27553979</pub-id>
          <pub-id pub-id-type="pii">10.1007/s11920-016-0726-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ohno-Machado</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Iranmehr</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Privacy, security, and machine learning for mobile health applications</article-title>
          <source>American Association for the Advancement of Science</source>
          <access-date>2021-11-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.aaas.org/sites/default/files/Ohno%20Privacy,%20Security,%20and%20Machine%20Learning%20for%20Mobile%20Health%20Applications%20.pdf">https://www.aaas.org/sites/default/files/Ohno%20Privacy,%20Security,%20and%20Machine%20Learning%20for%20Mobile%20Health%20Applications%20.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
          <source>Proposed Revisions to the Common Rule for the Protection of Human Subjects in the Behavioral and Social Sciences</source>
          <year>2014</year>
          <publisher-loc>Washington (DC)</publisher-loc>
          <publisher-name>National Academies Press (US)</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ray</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Biswas</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Design of an efficient mobile health system for achieving HIPAA privacy-security regulations</article-title>
          <source>Int J Wireless Mobile Comput</source>
          <year>2014</year>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>378</fpage>
          <lpage>87</lpage>
          <pub-id pub-id-type="doi">10.1504/ijwmc.2014.063056</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <article-title>Xcertia mHealth app guidelines</article-title>
          <source>Xcertia Guidelines</source>
          <year>2019</year>
          <access-date>2021-11-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.himss.org/sites/hde/files/media/file/2020/04/17/xcertia-guidelines-2019-final.pdf">https://www.himss.org/sites/hde/files/media/file/2020/04/17/xcertia-guidelines-2019-final.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bardram</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Matic</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A decade of ubiquitous computing research in mental health</article-title>
          <source>IEEE Pervasive Comput</source>
          <year>2020</year>
          <month>1</month>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>62</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="doi">10.1109/mprv.2019.2925338</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tsiouris</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Gatsios</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Rigas</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Miljkovic</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Koroušić Seljak</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Bohanec</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Arredondo</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Antonini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Konitsiotis</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Koutsouris</surname>
              <given-names>DD</given-names>
            </name>
            <name name-style="western">
              <surname>Fotiadis</surname>
              <given-names>DI</given-names>
            </name>
          </person-group>
          <article-title>PD_Manager: an mHealth platform for Parkinson's disease patient management</article-title>
          <source>Healthc Technol Lett</source>
          <year>2017</year>
          <month>06</month>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>102</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1049/htl.2017.0007"/>
          </comment>
          <pub-id pub-id-type="doi">10.1049/htl.2017.0007</pub-id>
          <pub-id pub-id-type="medline">28706727</pub-id>
          <pub-id pub-id-type="pii">HTL.2017.0007</pub-id>
          <pub-id pub-id-type="pmcid">PMC5496467</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arroyo-Gallego</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Ledesma-Carbayo</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Sanchez-Ferro</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Butterworth</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Mendoza</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Matarazzo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Montero</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lopez-Blanco</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Puertas-Martin</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Trincado</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Giancardo</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Detection of Motor Impairment in Parkinson's Disease Via Mobile Touchscreen Typing</article-title>
          <source>IEEE Trans Biomed Eng</source>
          <year>2017</year>
          <month>09</month>
          <volume>64</volume>
          <issue>9</issue>
          <fpage>1994</fpage>
          <lpage>2002</lpage>
          <pub-id pub-id-type="doi">10.1109/TBME.2017.2664802</pub-id>
          <pub-id pub-id-type="medline">28237917</pub-id>
          <pub-id pub-id-type="pii">7859354</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bitsaki</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Koutras</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Koutras</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Leymann</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Steimle</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wagner</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wieland</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>ChronicOnline: implementing a mHealth solution for monitoring and early alerting in chronic obstructive pulmonary disease</article-title>
          <source>Health Informatics J</source>
          <year>2017</year>
          <month>09</month>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>197</fpage>
          <lpage>207</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1460458216641480?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1460458216641480</pub-id>
          <pub-id pub-id-type="medline">27102885</pub-id>
          <pub-id pub-id-type="pii">1460458216641480</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saeb</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lattie</surname>
              <given-names>EG</given-names>
            </name>
            <name name-style="western">
              <surname>Schueller</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Kording</surname>
              <given-names>KP</given-names>
            </name>
            <name name-style="western">
              <surname>Mohr</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>The relationship between mobile phone location sensor data and depressive symptom severity</article-title>
          <source>PeerJ</source>
          <year>2016</year>
          <month>09</month>
          <day>29</day>
          <volume>4</volume>
          <fpage>e2537</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.7717/peerj.2537"/>
          </comment>
          <pub-id pub-id-type="doi">10.7717/peerj.2537</pub-id>
          <pub-id pub-id-type="medline">28344895</pub-id>
          <pub-id pub-id-type="pii">2537</pub-id>
          <pub-id pub-id-type="pmcid">PMC5361882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saeb</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kwasny</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Karr</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kording</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mohr</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>The Relationship between Clinical, Momentary, and Sensor-based Assessment of Depression</article-title>
          <source>Int Conf Pervasive Comput Technol Healthc</source>
          <year>2015</year>
          <month>08</month>
          <volume>2015</volume>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26640739"/>
          </comment>
          <pub-id pub-id-type="doi">10.4108/icst.pervasivehealth.2015.259034</pub-id>
          <pub-id pub-id-type="medline">26640739</pub-id>
          <pub-id pub-id-type="pmcid">PMC4667797</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Delahunty</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wood</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Arcan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>First insights on a passive major depressive disorder prediction system with incorporated conversational chatbot</article-title>
          <source>Proceedings of the Irish Conference on Artificial Intelligence and Cognitive Science</source>
          <year>2018</year>
          <conf-name>Irish Conference on Artificial Intelligence and Cognitive Science</conf-name>
          <conf-date>Aug 19-21, 2009</conf-date>
          <conf-loc>Dublin, Ireland</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://repository.ust.hk/ir/Record/1783.1-95166"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-642-17080-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alvarez-Lozano</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Osmani</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Mayora</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Frost</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bardram</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Faurholt-Jepsen</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Tell me your apps and I will tell you your mood: correlation of apps usage with bipolar disorder state</article-title>
          <source>Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments</source>
          <year>2014</year>
          <month>05</month>
          <conf-name>Proceedings of the 7th International Conference on Pervasive Technologies Related to Assistive Environments</conf-name>
          <conf-date>May 27 - 30, 2014</conf-date>
          <conf-loc>Rhodes Greece</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/2674396.2674408"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2674396.2674408</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grünerbl</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Muaremi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Osmani</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Bahle</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ohler</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tröster</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Mayora</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Haring</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lukowicz</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Smartphone-based recognition of states and state changes in bipolar disorder patients</article-title>
          <source>IEEE J Biomed Health Inform</source>
          <year>2015</year>
          <month>01</month>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>140</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1109/JBHI.2014.2343154</pub-id>
          <pub-id pub-id-type="medline">25073181</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Faurholt-Jepsen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vinberg</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Frost</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Christensen</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Bardram</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Kessing</surname>
              <given-names>LV</given-names>
            </name>
          </person-group>
          <article-title>Smartphone data as an electronic biomarker of illness activity in bipolar disorder</article-title>
          <source>Bipolar Disord</source>
          <year>2015</year>
          <month>11</month>
          <volume>17</volume>
          <issue>7</issue>
          <fpage>715</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1111/bdi.12332</pub-id>
          <pub-id pub-id-type="medline">26395972</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Aung</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Abdullah</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Brian</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>CrossCheck: toward passive sensing and detection of mental health changes in people with schizophrenia</article-title>
          <source>Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing</source>
          <year>2016</year>
          <conf-name>Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing</conf-name>
          <conf-date>Sep 12 - 16, 2016</conf-date>
          <conf-loc>Heidelberg Germany</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.semanticscholar.org/paper/CrossCheck%3A-toward-passive-sensing-and-detection-of-Wang-Aung/0298d6c953f9b04f557687f276430afa750a1766"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2971648.2971740</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ben-Zeev</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Abdullah</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Brian</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Scherer</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Mistler</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Hauser</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kane</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Mobile behavioral sensing for outpatients and inpatients with Schizophrenia</article-title>
          <source>Psychiatr Serv</source>
          <year>2016</year>
          <month>05</month>
          <day>01</day>
          <volume>67</volume>
          <issue>5</issue>
          <fpage>558</fpage>
          <lpage>61</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26695497"/>
          </comment>
          <pub-id pub-id-type="doi">10.1176/appi.ps.201500130</pub-id>
          <pub-id pub-id-type="medline">26695497</pub-id>
          <pub-id pub-id-type="pmcid">PMC4918904</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sano</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>AZ</given-names>
            </name>
            <name name-style="western">
              <surname>McHill</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jaques</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Czeisler</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Klerman</surname>
              <given-names>EB</given-names>
            </name>
            <name name-style="western">
              <surname>Picard</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>Recognizing academic performance, sleep quality, stress level, and mental health using personality traits, wearable sensors and mobile phones</article-title>
          <source>Int Conf Wearable Implant Body Sens Netw</source>
          <year>2015</year>
          <month>06</month>
          <volume>2015</volume>
          <fpage>-</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28516162"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/BSN.2015.7299420</pub-id>
          <pub-id pub-id-type="medline">28516162</pub-id>
          <pub-id pub-id-type="pmcid">PMC5431072</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naddeo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Verde</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Forastiere</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>De Pietro</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sannino</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A real-time m-health monitoring system: an integrated solution combining the use of several wearable sensors and mobile devices</article-title>
          <source>Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies</source>
          <year>2017</year>
          <conf-name>Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies</conf-name>
          <conf-date>Feb21-23, 2017</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
          <pub-id pub-id-type="doi">10.5220/0006296105450552</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lanata</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Valenza</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Nardelli</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gentili</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Scilingo</surname>
              <given-names>EP</given-names>
            </name>
          </person-group>
          <article-title>Complexity index from a personalized wearable monitoring system for assessing remission in mental health</article-title>
          <source>IEEE J Biomed Health Inform</source>
          <year>2015</year>
          <month>01</month>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>132</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1109/JBHI.2014.2360711</pub-id>
          <pub-id pub-id-type="medline">25291802</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boonstra</surname>
              <given-names>TW</given-names>
            </name>
            <name name-style="western">
              <surname>Nicholas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>QJ</given-names>
            </name>
            <name name-style="western">
              <surname>Shaw</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Townsend</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Christensen</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Using mobile phone sensor technology for mental health research: integrated analysis to identify hidden challenges and potential solutions</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>07</month>
          <day>30</day>
          <volume>20</volume>
          <issue>7</issue>
          <fpage>e10131</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/7/e10131/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10131</pub-id>
          <pub-id pub-id-type="medline">30061092</pub-id>
          <pub-id pub-id-type="pii">v20i7e10131</pub-id>
          <pub-id pub-id-type="pmcid">PMC6090171</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zulueta</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Piscitello</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rasic</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Easter</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Babu</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Langenecker</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>McInnis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ajilore</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Nelson</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Ryan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Leow</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Predicting mood disturbance severity with mobile phone keystroke metadata: a biaffect digital phenotyping study</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>07</month>
          <day>20</day>
          <volume>20</volume>
          <issue>7</issue>
          <fpage>e241</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/7/e241/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9775</pub-id>
          <pub-id pub-id-type="medline">30030209</pub-id>
          <pub-id pub-id-type="pii">v20i7e241</pub-id>
          <pub-id pub-id-type="pmcid">PMC6076371</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Leu</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>A wandering path tracking and fall detection system for people with dementia</article-title>
          <source>Proceedings of the 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications</source>
          <year>2014</year>
          <conf-name>International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)</conf-name>
          <conf-date>Nov 8-10, 2014</conf-date>
          <conf-loc>Guangdong, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/bwcca.2014.127</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dolatabadi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zhi</surname>
              <given-names>YX</given-names>
            </name>
            <name name-style="western">
              <surname>Flint</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Mansfield</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Iaboni</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Taati</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The feasibility of a vision-based sensor for longitudinal monitoring of mobility in older adults with dementia</article-title>
          <source>Arch Gerontol Geriatr</source>
          <year>2019</year>
          <volume>82</volume>
          <fpage>200</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1016/j.archger.2019.02.004</pub-id>
          <pub-id pub-id-type="medline">30831526</pub-id>
          <pub-id pub-id-type="pii">S0167-4943(19)30040-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sano</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McHill</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Barger</surname>
              <given-names>LK</given-names>
            </name>
            <name name-style="western">
              <surname>Klerman</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Picard</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Identifying objective physiological markers and modifiable behaviors for self-reported stress and mental health status using wearable sensors and mobile phones: observational study</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>06</month>
          <day>08</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>e210</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/6/e210/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9410</pub-id>
          <pub-id pub-id-type="medline">29884610</pub-id>
          <pub-id pub-id-type="pii">v20i6e210</pub-id>
          <pub-id pub-id-type="pmcid">PMC6015266</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vildjiounaite</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kallio</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kyllönen</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Nieminen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Määttänen</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Lindholm</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mäntyjärvi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gimel’farb</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Unobtrusive stress detection on the basis of smartphone usage data</article-title>
          <source>Pers Ubiquitous Comput</source>
          <year>2018</year>
          <month>1</month>
          <day>17</day>
          <volume>22</volume>
          <issue>4</issue>
          <fpage>671</fpage>
          <lpage>88</lpage>
          <pub-id pub-id-type="doi">10.1007/s00779-017-1108-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Voss</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Schwartz</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Daniels</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kline</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Haber</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Washington</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Tariq</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Robinson</surname>
              <given-names>TN</given-names>
            </name>
            <name name-style="western">
              <surname>Desai</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Feinstein</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Winograd</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wall</surname>
              <given-names>DP</given-names>
            </name>
          </person-group>
          <article-title>Effect of wearable digital intervention for improving socialization in children with autism spectrum disorder: a randomized clinical trial</article-title>
          <source>JAMA Pediatr</source>
          <year>2019</year>
          <month>05</month>
          <day>01</day>
          <volume>173</volume>
          <issue>5</issue>
          <fpage>446</fpage>
          <lpage>54</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30907929"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamapediatrics.2019.0285</pub-id>
          <pub-id pub-id-type="medline">30907929</pub-id>
          <pub-id pub-id-type="pii">2728462</pub-id>
          <pub-id pub-id-type="pmcid">PMC6503634</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nurgalieva</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>O'Callaghan</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy of mHealth applications: a scoping review</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>104247</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.2999934</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Loughlin</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Neary</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Adkins</surname>
              <given-names>EC</given-names>
            </name>
            <name name-style="western">
              <surname>Schueller</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>Reviewing the data security and privacy policies of mobile apps for depression</article-title>
          <source>Internet Interv</source>
          <year>2019</year>
          <month>03</month>
          <volume>15</volume>
          <fpage>110</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2214-7829(18)30046-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.invent.2018.12.001</pub-id>
          <pub-id pub-id-type="medline">30792962</pub-id>
          <pub-id pub-id-type="pii">S2214-7829(18)30046-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC6371412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bella</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Coles-Kemp</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Internet users' security and privacy while they interact with Amazon</article-title>
          <source>Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications</source>
          <year>2011</year>
          <conf-name>2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications</conf-name>
          <conf-date>Changsha</conf-date>
          <conf-loc>Nov 16-18, 2011</conf-loc>
          <pub-id pub-id-type="doi">10.1109/trustcom.2011.118</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Karan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Consumers’ privacy concern and privacy protection on social network sites in the era of big data: empirical evidence from college students</article-title>
          <source>J Interact Advert</source>
          <year>2019</year>
          <month>09</month>
          <day>04</day>
          <volume>19</volume>
          <issue>3</issue>
          <fpage>187</fpage>
          <lpage>201</lpage>
          <pub-id pub-id-type="doi">10.1080/15252019.2019.1651681</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Metzger</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Communication privacy management in electronic commerce</article-title>
          <source>J Comput Mediat Commun</source>
          <year>2007</year>
          <volume>12</volume>
          <issue>2</issue>
          <fpage>335</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1083-6101.2007.00328.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prince</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Do consumers want to control their personal data? Empirical evidence</article-title>
          <source>Int J Hum Comput Stud</source>
          <year>2018</year>
          <month>02</month>
          <volume>110</volume>
          <fpage>21</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijhcs.2017.10.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Houghton</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Joinson</surname>
              <given-names>AN</given-names>
            </name>
          </person-group>
          <article-title>Privacy, social network sites, and social relations</article-title>
          <source>J Technol Hum Serv</source>
          <year>2010</year>
          <month>05</month>
          <day>10</day>
          <volume>28</volume>
          <issue>1-2</issue>
          <fpage>74</fpage>
          <lpage>94</lpage>
          <pub-id pub-id-type="doi">10.1080/15228831003770775</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>S-AA</given-names>
            </name>
          </person-group>
          <article-title>Peeling back the multiple layers of Twitter’s private disclosure onion: the roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter</article-title>
          <source>New Media Soc</source>
          <year>2013</year>
          <month>02</month>
          <day>07</day>
          <volume>15</volume>
          <issue>6</issue>
          <fpage>813</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1177/1461444812471814</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>An empirical study of patients' privacy concerns for health informatics as a service</article-title>
          <source>Technol Forecast Soc Change</source>
          <year>2019</year>
          <month>06</month>
          <volume>143</volume>
          <fpage>297</fpage>
          <lpage>306</lpage>
          <pub-id pub-id-type="doi">10.1016/j.techfore.2019.01.018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hindy</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Brosset</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bayne</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Seeam</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Tachtatzis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Atkinson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bellekens</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>A taxonomy of network threats and the effect of current datasets on intrusion detection systems</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>104650</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.3000179</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zeissig</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lidynia</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vervier</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gadeib</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Online privacy perceptions of older adults</article-title>
          <source>International Conference on Human Aspects of IT for the Aged Population</source>
          <year>2017</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malhotra</surname>
              <given-names>NK</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Internet Users' Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model</article-title>
          <source>Inf Syst Res</source>
          <year>2004</year>
          <month>12</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>336</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mamonov</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Benbunan-Fich</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The impact of information security threat awareness on privacy-protective behaviors</article-title>
          <source>Comput Hum Behav</source>
          <year>2018</year>
          <month>06</month>
          <volume>83</volume>
          <fpage>32</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.01.028</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ozdemir</surname>
              <given-names>ZD</given-names>
            </name>
            <name name-style="western">
              <surname>Jeff Smith</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Benamati</surname>
              <given-names>JH</given-names>
            </name>
          </person-group>
          <article-title>Antecedents and outcomes of information privacy concerns in a peer context: an exploratory study</article-title>
          <source>Eur J Inf Syst</source>
          <year>2018</year>
          <month>02</month>
          <day>15</day>
          <volume>26</volume>
          <issue>6</issue>
          <fpage>642</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1057/s41303-017-0056-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Widjaja</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>JV</given-names>
            </name>
            <name name-style="western">
              <surname>Sukoco</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Ha</surname>
              <given-names>Q-A</given-names>
            </name>
          </person-group>
          <article-title>Understanding users' willingness to put their personal information on the personal cloud-based storage applications: an empirical study</article-title>
          <source>Comput Human Behav</source>
          <year>2019</year>
          <month>02</month>
          <volume>91</volume>
          <fpage>167</fpage>
          <lpage>85</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.09.034</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shipman</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Marshall</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Ownership, privacy, and control in the wake of Cambridge analytica: the relationship between attitudes and awareness</article-title>
          <source>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</source>
          <year>2020</year>
          <conf-name>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>Apr 25-30, 2020</conf-date>
          <conf-loc>Honolulu</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3313831.3376662</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bansal</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Zahedi</surname>
              <given-names>FM</given-names>
            </name>
            <name name-style="western">
              <surname>Gefen</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Do context and personality matter? Trust and privacy concerns in disclosing private information online</article-title>
          <source>Inf Manag</source>
          <year>2016</year>
          <month>01</month>
          <volume>53</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>21</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2015.08.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Rosson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Carroll</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Measuring Mobile Users' Concerns for Information Privacy</source>
          <year>2012</year>
          <publisher-loc>USA</publisher-loc>
          <publisher-name>ICIS</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Beaudoin</surname>
              <given-names>CE</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Securing online privacy: an empirical test on internet scam victimization, online privacy concerns, and privacy protection behaviors</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>05</month>
          <day>27</day>
          <volume>70</volume>
          <issue>1</issue>
          <fpage>291</fpage>
          <lpage>302</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2015/1/e31/"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.01.003</pub-id>
          <pub-id pub-id-type="pii">v3i1e31</pub-id>
          <pub-id pub-id-type="pmcid">PMC4393507</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Green</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gies</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bobnis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Piquero</surname>
              <given-names>NL</given-names>
            </name>
            <name name-style="western">
              <surname>Piquero</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Velasquez</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The role of victim services for individuals who have experienced serious identity-based crime</article-title>
          <source>Victim Offender</source>
          <year>2020</year>
          <month>04</month>
          <day>14</day>
          <volume>15</volume>
          <issue>6</issue>
          <fpage>720</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1080/15564886.2020.1743804</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Thong</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Drivers and inhibitors of internet privacy concern: a multidimensional development theory perspective</article-title>
          <source>J Bus Ethics</source>
          <year>2019</year>
          <month>06</month>
          <day>17</day>
          <volume>168</volume>
          <issue>3</issue>
          <fpage>539</fpage>
          <lpage>64</lpage>
          <pub-id pub-id-type="doi">10.1007/s10551-019-04237-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bhasker</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Interplay between trust, information privacy concerns and behavioural intention of users on online social networks</article-title>
          <source>Behav Inf Technol</source>
          <year>2018</year>
          <month>05</month>
          <day>09</day>
          <volume>37</volume>
          <issue>6</issue>
          <fpage>622</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1080/0144929x.2018.1470671</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Negative impact of social network services based on stressor-stress-outcome: the role of experience of privacy violations</article-title>
          <source>Future Internet</source>
          <year>2019</year>
          <month>06</month>
          <day>20</day>
          <volume>11</volume>
          <issue>6</issue>
          <fpage>137</fpage>
          <pub-id pub-id-type="doi">10.3390/fi11060137</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Degirmenci</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Mobile users’ information privacy concerns and the role of app permission requests</article-title>
          <source>Int J Inf Manag</source>
          <year>2020</year>
          <month>02</month>
          <volume>50</volume>
          <fpage>261</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2019.05.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y(C)</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ling</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns for mobile app download: an elaboration likelihood model perspective</article-title>
          <source>Decis Support Syst</source>
          <year>2017</year>
          <month>02</month>
          <volume>94</volume>
          <fpage>19</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2016.10.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kraus</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wechsung</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Möller</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A comparison of privacy and security knowledge and privacy concern as influencing factors for mobile protection behavior</article-title>
          <source>Proceedings of the Workshop on Privacy Personas and Segmentation</source>
          <year>2014</year>
          <conf-name>Workshop on Privacy Personas and Segmentation</conf-name>
          <conf-date>Jul 9-11, 2014</conf-date>
          <conf-loc>Menlo Park, CA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alshammari</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Mylonas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sedky</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Champion</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bauer</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Exploring the adoption of physical security controls in smartphones</article-title>
          <source>International Conference on Human Aspects of Information Security, Privacy, and Trust</source>
          <year>2015</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boerman</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Kruikemeier</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zuiderveen Borgesius</surname>
              <given-names>FJ</given-names>
            </name>
          </person-group>
          <article-title>Exploring motivations for online privacy protection behavior: insights from panel data</article-title>
          <source>Commun Res</source>
          <year>2018</year>
          <month>10</month>
          <day>05</day>
          <volume>48</volume>
          <issue>7</issue>
          <fpage>953</fpage>
          <lpage>77</lpage>
          <pub-id pub-id-type="doi">10.1177/0093650218800915</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saeri</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Ogilvie</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>La Macchia</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Louis</surname>
              <given-names>WR</given-names>
            </name>
          </person-group>
          <article-title>Predicting Facebook users' online privacy protection: risk, trust, norm focus theory, and the theory of planned behavior</article-title>
          <source>J Soc Psychol</source>
          <year>2014</year>
          <volume>154</volume>
          <issue>4</issue>
          <fpage>352</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1080/00224545.2014.914881</pub-id>
          <pub-id pub-id-type="medline">25154118</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>The dark side of ubiquitous connectivity in smartphone-based SNS: an integrated model from information perspective</article-title>
          <source>Comput Hum Behav</source>
          <year>2018</year>
          <month>07</month>
          <volume>84</volume>
          <fpage>185</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.02.023</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Anic</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Škare</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Kursan Milaković</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>The determinants and effects of online privacy concerns in the context of e-commerce</article-title>
          <source>Electron Commer Res Appl</source>
          <year>2019</year>
          <volume>36</volume>
          <fpage>100868</fpage>
          <pub-id pub-id-type="doi">10.1016/j.elerap.2019.100868</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beaver</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Barnes</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Boutwell</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <source>The Nurture Versus Biosocial Debate in Criminology: On the Origins of Criminal Behavior and Criminality</source>
          <year>2014</year>
          <publisher-loc>Thousand Oaks, California</publisher-loc>
          <publisher-name>SAGE Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Norman</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Boer</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Seydel</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Protection motivation theory</article-title>
          <source>Predicting Health Behaviour: Research and Practice With Social Cognition Models</source>
          <year>2005</year>
          <publisher-loc>Berkshire</publisher-loc>
          <publisher-name>Open University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Prentice-Dunn</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Protection motivation theory</article-title>
          <source>Handbook of Health Behavior Research 1: Personal and Social Determinants</source>
          <year>1997</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Plenum Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alanazi</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Soh</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Behavioral intention to use IoT technology in healthcare settings</article-title>
          <source>Eng Technol Appl Sci Res</source>
          <year>2019</year>
          <month>10</month>
          <day>09</day>
          <volume>9</volume>
          <issue>5</issue>
          <fpage>4769</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.48084/etasr.3063</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wendel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dellaert</surname>
              <given-names>BG</given-names>
            </name>
            <name name-style="western">
              <surname>Ronteltap</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>van Trijp</surname>
              <given-names>HC</given-names>
            </name>
          </person-group>
          <article-title>Consumers' intention to use health recommendation systems to receive personalized nutrition advice</article-title>
          <source>BMC Health Serv Res</source>
          <year>2013</year>
          <month>04</month>
          <day>04</day>
          <volume>13</volume>
          <fpage>126</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmchealthservres.biomedcentral.com/articles/10.1186/1472-6963-13-126"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1472-6963-13-126</pub-id>
          <pub-id pub-id-type="medline">23557363</pub-id>
          <pub-id pub-id-type="pii">1472-6963-13-126</pub-id>
          <pub-id pub-id-type="pmcid">PMC3623628</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lebek</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Degirmenci</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Breitner</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices</article-title>
          <source>Proceedings of the 19th Americas Conference on Information Systems, AMCIS 2013</source>
          <year>2013</year>
          <conf-name>19th Americas Conference on Information Systems, AMCIS 2013</conf-name>
          <conf-date>Aug 15-17, 2013</conf-date>
          <conf-loc>Chicago, Illinois, USA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noblin</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Wan</surname>
              <given-names>TT</given-names>
            </name>
            <name name-style="western">
              <surname>Fottler</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The impact of health literacy on a patient's decision to adopt a personal health record</article-title>
          <source>Perspect Health Inf Manag</source>
          <year>2012</year>
          <month>10</month>
          <day>1</day>
          <volume>9</volume>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23209454"/>
          </comment>
          <pub-id pub-id-type="medline">23209454</pub-id>
          <pub-id pub-id-type="pmcid">PMC3510648</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Norman</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Skinner</surname>
              <given-names>HA</given-names>
            </name>
          </person-group>
          <article-title>eHEALS: the eHealth literacy scale</article-title>
          <source>J Med Internet Res</source>
          <year>2006</year>
          <month>11</month>
          <day>14</day>
          <volume>8</volume>
          <issue>4</issue>
          <fpage>e27</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2006/4/e27/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.8.4.e27</pub-id>
          <pub-id pub-id-type="medline">17213046</pub-id>
          <pub-id pub-id-type="pii">v8i4e27</pub-id>
          <pub-id pub-id-type="pmcid">PMC1794004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>She</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The role of perceived e-health literacy in users’ continuance intention to use mobile healthcare applications: an exploratory empirical study in China</article-title>
          <source>Inf Technol Dev</source>
          <year>2017</year>
          <month>03</month>
          <day>09</day>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>198</fpage>
          <lpage>223</lpage>
          <pub-id pub-id-type="doi">10.1080/02681102.2017.1283286</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petty</surname>
              <given-names>RE</given-names>
            </name>
            <name name-style="western">
              <surname>Cacioppo</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Goldman</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Personal involvement as a determinant of argument-based persuasion</article-title>
          <source>J Pers Soc Psychol</source>
          <year>1981</year>
          <month>11</month>
          <volume>41</volume>
          <issue>5</issue>
          <fpage>847</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1037/0022-3514.41.5.847</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Britt</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Collins</surname>
              <given-names>WB</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Linnemeier</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Englebert</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>eHealth literacy and health behaviors affecting modern college students: a pilot study of issues identified by the american college health association</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>12</month>
          <day>19</day>
          <volume>19</volume>
          <issue>12</issue>
          <fpage>e392</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/12/e392/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.3100</pub-id>
          <pub-id pub-id-type="medline">29258979</pub-id>
          <pub-id pub-id-type="pii">v19i12e392</pub-id>
          <pub-id pub-id-type="pmcid">PMC5750421</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>EY</given-names>
            </name>
          </person-group>
          <article-title>Pathways linking mental health literacy to professional help-seeking intentions in Korean college students</article-title>
          <source>J Psychiatr Ment Health Nurs</source>
          <year>2020</year>
          <month>08</month>
          <volume>27</volume>
          <issue>4</issue>
          <fpage>393</fpage>
          <lpage>405</lpage>
          <pub-id pub-id-type="doi">10.1111/jpm.12593</pub-id>
          <pub-id pub-id-type="medline">31954091</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>James</surname>
              <given-names>TL</given-names>
            </name>
          </person-group>
          <article-title>Toward an understanding of the antecedents to health information privacy concern: a mixed methods study</article-title>
          <source>Inf Syst Front</source>
          <year>2020</year>
          <month>08</month>
          <day>21</day>
          <fpage>1</fpage>
          <lpage>26</lpage>
          <pub-id pub-id-type="doi">10.1007/s10796-020-10053-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Health information privacy concerns, antecedents, and information disclosure intention in online health communities</article-title>
          <source>Inf Manag</source>
          <year>2018</year>
          <month>06</month>
          <volume>55</volume>
          <issue>4</issue>
          <fpage>482</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2017.11.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>AY</given-names>
            </name>
          </person-group>
          <article-title>Why mobile users trust smartphone social networking services? A PLS-SEM approach</article-title>
          <source>J Bus Res</source>
          <year>2016</year>
          <month>11</month>
          <volume>69</volume>
          <issue>11</issue>
          <fpage>4890</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2016.04.048</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Milberg</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Information privacy: measuring individuals' concerns about organizational practices</article-title>
          <source>MIS Quart</source>
          <year>1996</year>
          <month>06</month>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>167</fpage>
          <pub-id pub-id-type="doi">10.2307/249477</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref106">
        <label>106</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Terry</surname>
              <given-names>NP</given-names>
            </name>
            <name name-style="western">
              <surname>Gunter</surname>
              <given-names>TD</given-names>
            </name>
          </person-group>
          <article-title>Regulating mobile mental health apps</article-title>
          <source>Behav Sci Law</source>
          <year>2018</year>
          <month>03</month>
          <volume>36</volume>
          <issue>2</issue>
          <fpage>136</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1002/bsl.2339</pub-id>
          <pub-id pub-id-type="medline">29659069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref107">
        <label>107</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ringle</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Wende</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Becker</surname>
              <given-names>J-M</given-names>
            </name>
          </person-group>
          <source>SmartPLS 3</source>
          <year>2015</year>
          <publisher-loc>Boenningstedt</publisher-loc>
          <publisher-name>SmartPLS GmbH</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref108">
        <label>108</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pedhazur</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kerlinger</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <source>Multiple Regression in Behavioral Research</source>
          <year>1982</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Holt, Rinehart, and Winston</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref109">
        <label>109</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Slinker</surname>
              <given-names>BK</given-names>
            </name>
            <name name-style="western">
              <surname>Glantz</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>Multiple regression for physiological data analysis: the problem of multicollinearity</article-title>
          <source>Am J Physiol</source>
          <year>1985</year>
          <month>07</month>
          <volume>249</volume>
          <issue>1 Pt 2</issue>
          <fpage>R1</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1152/ajpregu.1985.249.1.R1</pub-id>
          <pub-id pub-id-type="medline">4014489</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref110">
        <label>110</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaiser</surname>
              <given-names>HF</given-names>
            </name>
          </person-group>
          <article-title>The varimax criterion for analytic rotation in factor analysis</article-title>
          <source>Psychometrika</source>
          <year>1958</year>
          <month>9</month>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>187</fpage>
          <lpage>200</lpage>
          <pub-id pub-id-type="doi">10.1007/BF02289233</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref111">
        <label>111</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tavakol</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dennick</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Making sense of Cronbach's alpha</article-title>
          <source>Int J Med Educ</source>
          <year>2011</year>
          <month>06</month>
          <day>27</day>
          <volume>2</volume>
          <fpage>53</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ijme.net/pmid/28029643"/>
          </comment>
          <pub-id pub-id-type="doi">10.5116/ijme.4dfb.8dfd</pub-id>
          <pub-id pub-id-type="medline">28029643</pub-id>
          <pub-id pub-id-type="pii">ijme.2.5355</pub-id>
          <pub-id pub-id-type="pmcid">PMC4205511</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref112">
        <label>112</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fornell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Larcker</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Structural equation models with unobservable variables and measurement error: Algebra and statistics</article-title>
          <source>J Mark Res</source>
          <year>1981</year>
          <month>08</month>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>382</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.2307/3150980</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref113">
        <label>113</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Henseler</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ringle</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Sarstedt</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A new criterion for assessing discriminant validity in variance-based structural equation modeling</article-title>
          <source>J Acad Mark Sci</source>
          <year>2014</year>
          <month>8</month>
          <day>22</day>
          <volume>43</volume>
          <issue>1</issue>
          <fpage>115</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1007/s11747-014-0403-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref114">
        <label>114</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shook</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Ketchen</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hult</surname>
              <given-names>GT</given-names>
            </name>
            <name name-style="western">
              <surname>Kacmar</surname>
              <given-names>KM</given-names>
            </name>
          </person-group>
          <article-title>An assessment of the use of structural equation modeling in strategic management research</article-title>
          <source>Strategic Manag J</source>
          <year>2004</year>
          <month>04</month>
          <volume>25</volume>
          <issue>4</issue>
          <fpage>397</fpage>
          <lpage>404</lpage>
          <pub-id pub-id-type="doi">10.1002/smj.385</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref115">
        <label>115</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wasil</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Gillespie</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schell</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lorenzo-Luaces</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>DeRubeis</surname>
              <given-names>RJ</given-names>
            </name>
          </person-group>
          <article-title>Estimating the real-world usage of mobile apps for mental health: development and application of two novel metrics</article-title>
          <source>World Psychiatry</source>
          <year>2021</year>
          <month>02</month>
          <day>12</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>137</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/wps.20827"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/wps.20827</pub-id>
          <pub-id pub-id-type="medline">33432761</pub-id>
          <pub-id pub-id-type="pmcid">PMC7801857</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref116">
        <label>116</label>
        <nlm-citation citation-type="web">
          <article-title>Calm homepage</article-title>
          <source>Calm</source>
          <access-date>2021-11-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.calm.com/">https://www.calm.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref117">
        <label>117</label>
        <nlm-citation citation-type="web">
          <article-title>Talkspace homepage</article-title>
          <source>Talkspace</source>
          <access-date>2021-11-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.talkspace.com">https://www.talkspace.com</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref118">
        <label>118</label>
        <nlm-citation citation-type="web">
          <article-title>PTSD coach</article-title>
          <source>US Department of Veterans Affairs</source>
          <access-date>2021-11-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mobile.va.gov/app/ptsd-coach">https://mobile.va.gov/app/ptsd-coach</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref119">
        <label>119</label>
        <nlm-citation citation-type="web">
          <article-title>Optimism review</article-title>
          <source>One Mind PsyberGuide</source>
          <access-date>2021-11-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://onemindpsyberguide.org/apps/optimism/">https://onemindpsyberguide.org/apps/optimism/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref120">
        <label>120</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lecomte</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Potvin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Corbière</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Guay</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Samson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Cloutier</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Francoeur</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Pennou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Khazaal</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Mobile apps for mental health issues: meta-review of meta-analyses</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>05</month>
          <day>29</day>
          <volume>8</volume>
          <issue>5</issue>
          <fpage>e17458</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/5/e17458/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/17458</pub-id>
          <pub-id pub-id-type="medline">32348289</pub-id>
          <pub-id pub-id-type="pii">v8i5e17458</pub-id>
          <pub-id pub-id-type="pmcid">PMC7293054</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref121">
        <label>121</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benjumea</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ropero</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera-Romero</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro-Zubiete</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Carrasco</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy assessment in mobile health apps: scoping review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>07</month>
          <day>02</day>
          <volume>8</volume>
          <issue>7</issue>
          <fpage>e18868</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/7/e18868/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18868</pub-id>
          <pub-id pub-id-type="medline">32459640</pub-id>
          <pub-id pub-id-type="pii">v8i7e18868</pub-id>
          <pub-id pub-id-type="pmcid">PMC7367524</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref122">
        <label>122</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lloyd-Evans</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Giacco</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Forsyth</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Nebo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mann</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Social isolation in mental health: a conceptual and methodological review</article-title>
          <source>Soc Psychiatry Psychiatr Epidemiol</source>
          <year>2017</year>
          <month>12</month>
          <volume>52</volume>
          <issue>12</issue>
          <fpage>1451</fpage>
          <lpage>61</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29080941"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s00127-017-1446-1</pub-id>
          <pub-id pub-id-type="medline">29080941</pub-id>
          <pub-id pub-id-type="pii">10.1007/s00127-017-1446-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC5702385</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref123">
        <label>123</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mann</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lloyd-Evans</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Terhune</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Shihabi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The effectiveness of interventions for reducing subjective and objective social isolation among people with mental health problems: a systematic review</article-title>
          <source>Soc Psychiatry Psychiatr Epidemiol</source>
          <year>2020</year>
          <month>07</month>
          <volume>55</volume>
          <issue>7</issue>
          <fpage>839</fpage>
          <lpage>76</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31741017"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s00127-019-01800-z</pub-id>
          <pub-id pub-id-type="medline">31741017</pub-id>
          <pub-id pub-id-type="pii">10.1007/s00127-019-01800-z</pub-id>
          <pub-id pub-id-type="pmcid">PMC7303071</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref124">
        <label>124</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Compeau</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Information privacy awareness (IPA): a review of the use, definition and measurement of IPA</article-title>
          <source>ScholarSpace</source>
          <year>2017</year>
          <access-date>2021-11-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarspace.manoa.hawaii.edu/handle/10125/41646">https://scholarspace.manoa.hawaii.edu/handle/10125/41646</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref125">
        <label>125</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Beaudoin</surname>
              <given-names>CE</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Protecting oneself online: the effects of negative privacy experiences on privacy protective behaviors</article-title>
          <source>J Mass Commun Q</source>
          <year>2016</year>
          <month>03</month>
          <day>23</day>
          <volume>93</volume>
          <issue>2</issue>
          <fpage>409</fpage>
          <lpage>29</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2015/1/e31/"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1077699016640224</pub-id>
          <pub-id pub-id-type="pii">v3i1e31</pub-id>
          <pub-id pub-id-type="pmcid">PMC4393507</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref126">
        <label>126</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mousavi</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory</article-title>
          <source>Decis Support Syst</source>
          <year>2020</year>
          <month>08</month>
          <volume>135</volume>
          <fpage>113323</fpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2020.113323</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref127">
        <label>127</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Suri</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>Y-K</given-names>
            </name>
            <name name-style="western">
              <surname>Majid</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Foo</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Health information literacy of senior citizens – a review</article-title>
          <source>Information Literacy. Lifelong Learning and Digital Citizenship in the 21st Century</source>
          <year>2014</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref128">
        <label>128</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noblin</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Rutherford</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Impact of health literacy on senior citizen engagement in health care IT usage</article-title>
          <source>Gerontol Geriatr Med</source>
          <year>2017</year>
          <volume>3</volume>
          <fpage>2333721417706300</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/2333721417706300?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2333721417706300</pub-id>
          <pub-id pub-id-type="medline">28508022</pub-id>
          <pub-id pub-id-type="pii">10.1177_2333721417706300</pub-id>
          <pub-id pub-id-type="pmcid">PMC5415284</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref129">
        <label>129</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aponte</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nokes</surname>
              <given-names>KM</given-names>
            </name>
          </person-group>
          <article-title>Validating an electronic health literacy scale in an older hispanic population</article-title>
          <source>J Clin Nurs</source>
          <year>2017</year>
          <month>09</month>
          <volume>26</volume>
          <issue>17-18</issue>
          <fpage>2703</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1111/jocn.13763</pub-id>
          <pub-id pub-id-type="medline">28207962</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref130">
        <label>130</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huberty</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Green</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Glissmann</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Larkey</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Puzia</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Efficacy of the mindfulness meditation mobile app "calm" to reduce stress among college students: randomized controlled trial</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>06</month>
          <day>25</day>
          <volume>7</volume>
          <issue>6</issue>
          <fpage>e14273</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/6/e14273/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/14273</pub-id>
          <pub-id pub-id-type="medline">31237569</pub-id>
          <pub-id pub-id-type="pii">v7i6e14273</pub-id>
          <pub-id pub-id-type="pmcid">PMC6614998</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref131">
        <label>131</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wen</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sweeney</surname>
              <given-names>TE</given-names>
            </name>
            <name name-style="western">
              <surname>Welton</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Trockel</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Katznelson</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Encouraging mindfulness in medical house staff via smartphone app: a pilot study</article-title>
          <source>Acad Psychiatry</source>
          <year>2017</year>
          <month>10</month>
          <volume>41</volume>
          <issue>5</issue>
          <fpage>646</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1007/s40596-017-0768-3</pub-id>
          <pub-id pub-id-type="medline">28795335</pub-id>
          <pub-id pub-id-type="pii">10.1007/s40596-017-0768-3</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
