<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v3i1e9922</article-id>
      <article-id pub-id-type="pmid">30882354</article-id>
      <article-id pub-id-type="doi">10.2196/formative.9922</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>What Is Being Used and Who Is Using It: Barriers to the Adoption of Smartphone Patient Experience Surveys</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Burkell</surname>
            <given-names>Jacquelyn</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Bardus</surname>
            <given-names>Marco</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Chen</surname>
            <given-names>Chang</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Paglialonga</surname>
            <given-names>Alessia</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="author" id="contrib1" equal-contrib="yes">
          <name name-style="western">
            <surname>Ng</surname>
            <given-names>Denise</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-4621-340X</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib2" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>McMurray</surname>
            <given-names>Josephine</given-names>
          </name>
          <degrees>MBA, PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <address>
            <institution>Business Technology Management</institution>
            <institution>Lazaridis School of Business &amp; Economics</institution>
            <institution>Wilfrid Laurier University</institution>
            <addr-line>73 George Street</addr-line>
            <addr-line>Brantford, ON, N3T3Y3</addr-line>
            <country>Canada</country>
            <phone>1 5192427477</phone>
            <fax>1 519 751 7589</fax>
            <email>jmcmurray@wlu.ca</email>
          </address>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-5607-3781</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib3" equal-contrib="yes">
          <name name-style="western">
            <surname>Wallace</surname>
            <given-names>James</given-names>
          </name>
          <degrees>MCSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-5162-0256</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib4" equal-contrib="yes">
          <name name-style="western">
            <surname>Morita</surname>
            <given-names>Plinio</given-names>
          </name>
          <degrees>BEng, MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9515-6478</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
      <label>1</label>
      <institution>School of Public Health &amp; Health Systems</institution>
      <institution>Faculty of Applied Health Sciences</institution>  
      <institution>University of Waterloo</institution>  
      <addr-line>Waterloo, ON</addr-line>
      <country>Canada</country></aff>
      <aff id="aff2">
      <label>2</label>
      <institution>Business Technology Management</institution>
      <institution>Lazaridis School of Business &amp; Economics</institution>  
      <institution>Wilfrid Laurier University</institution>  
      <addr-line>Brantford, ON</addr-line>
      <country>Canada</country></aff>
      <author-notes>
        <corresp>Corresponding Author: Josephine McMurray 
        <email>jmcmurray@wlu.ca</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><season>Jan-Mar</season><year>2019</year></pub-date>
      <pub-date pub-type="epub">
        <day>18</day>
        <month>03</month>
        <year>2019</year>
      </pub-date>
      <volume>3</volume>
      <issue>1</issue>
      <elocation-id>e9922</elocation-id>
      <!--history from ojs - api-xml-->
      <history>
        <date date-type="received">
          <day>24</day>
          <month>1</month>
          <year>2018</year>
        </date>
        <date date-type="rev-request">
          <day>14</day>
          <month>8</month>
          <year>2018</year>
        </date>
        <date date-type="rev-recd">
          <day>13</day>
          <month>11</month>
          <year>2018</year>
        </date>
        <date date-type="accepted">
          <day>6</day>
          <month>1</month>
          <year>2019</year>
        </date>
      </history>
      <copyright-statement>©Denise Ng, Josephine McMurray, James Wallace, Plinio Morita. Originally published in JMIR Formative Research (http://formative.jmir.org), 18.03.2019.</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on http://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://formative.jmir.org/2019/1/e9922/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Smartphones are positioned to transform the way health care services gather patient experience data through advanced mobile survey apps which we refer to as smart surveys. In comparison with traditional methods of survey data capture, smartphone sensing survey apps have the capacity to elicit multidimensional, in situ user experience data in real time with unprecedented detail, responsiveness, and accuracy.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aimed to explore the context and circumstances under which patients are willing to use their smartphones to share data on their service experiences.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We conducted in-person, semistructured interviews (N=24) with smartphone owners to capture their experiences, perceptions, and attitudes toward smart surveys.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Analysis examining perceived risk revealed a few barriers to use; however, major potential barriers to adoption were the identity of recipients, reliability of the communication channel, and potential for loss of agency. The results demonstrate that the classical dimensions of perceived risk raised minimal concerns for the use of smartphones to collect patient service experience feedback. However, trust in the doctor-patient relationship, the reliability of the communication channel, the altruistic motivation to contribute to health service quality for others, and the risk of losing information agency were identified as determinants in the patients’ adoption of smart surveys.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>On the basis of these findings, we provide recommendations for the design of smart surveys in practice and suggest a need for privacy design tools for voluntary, health-related technologies.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>quality of healthcare</kwd>
        <kwd>surveys and questionnaires</kwd>
        <kwd>patient satisfaction</kwd>
        <kwd>data collection</kwd>
        <kwd>smartphone</kwd>
        <kwd>mobile phone</kwd>
        <kwd>risk</kwd>
        <kwd>privacy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>High-quality patient-centered care is widely recognized as a priority in health care [<xref ref-type="bibr" rid="ref1">1</xref>] and has been shown to improve patient experience, patient safety, and accessibility to services [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. Health care professionals engaged in patient-centered care focus on ensuring that patients’ experiences at a physician, hospital, or rehabilitation facility meet basic standards of care, such as treating them with courtesy, informing them about their care, and minimizing pain during their visit. Standardized questions surrounding these aspects of a medical visit are widely used within the health care industry to inform patient-centered care best practices and to improve governance, public accountability, and patient autonomy [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>].</p>
        <p>Paper-based collection of experience surveys remains time-consuming, expensive, and limited by factors such as nonresponse, recall bias, and inadequate sample size [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. Although paper-based surveys may be advantageous in some circumstances, that is, to reduce startup costs or for nondigital natives such as the elderly, the use of smartphone-based survey apps, which we call <italic>smart surveys</italic>, provides new opportunities to improve data collection techniques. Mobile technology overcomes many of the limitations of paper-based surveys and enables collection of large quantities of real-time data over a broad geographical area. Exploiting this technology opens the possibility of private and public sector services, health care providers, and government bodies effectively engaging with the public, one-on-one, to better respond to their needs. However, at present, there is little guidance to help service providers understand when and where individuals are willing to disclose service experience data using their smartphones. In particular, there is a lack of understanding of users’ beliefs, perceptions, and attitudes toward sharing of health service experience feedback using their smartphones.</p>
      </sec>
      <sec>
        <title>Patient Experience Surveys</title>
        <p>Patient experience surveys are validated questionnaires, which are developed by health services experts to understand patient perceptions of their health care experience and serve an integral role in patient engagement and service improvement [<xref ref-type="bibr" rid="ref3">3</xref>]. For example, the WatLX patient experience questionnaire [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>] determines agreement with statements such as “I was always treated with courtesy,” “My physical pain was controlled as well as possible,” or “From now on I know what to expect about my care.” When such patient experience feedback is collected, collated, and interpreted, findings can drive critical and necessary improvements in service quality, patient safety, and clinical effectiveness [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>]. In recent years, to increase the benefits yielded from such surveys, health service research has begun to shift from “traditional” paper-based methods of survey administration to the use of technology-enabled survey tools. Yet there is little published research on the use of smartphone technology to collect individuals’ experiences of health services.</p>
        <p>The health care literature has found no significant differences in data equivalence or validity between paper- and Web-based surveys [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. With mobile devices, researchers are able to collect large quantities of data over broad geographical areas. Furthermore, the use of smartphone-based apps provides access to functionality such as location-based activity detection [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>] and notifications [<xref ref-type="bibr" rid="ref17">17</xref>] that can help improve survey compliance and completeness of survey responses to improve the overall reliability of results [<xref ref-type="bibr" rid="ref18">18</xref>]. In situ assessment of services, where data are collected during or immediately after a service encounter, may yield an even more immediate and insightful level of understanding of service quality [<xref ref-type="bibr" rid="ref19">19</xref>]. However, the context in which these data are collected can also introduce new issues such as concerns around privacy [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
        <p>Smart surveys, which we define as smartphone survey apps that use advanced functionality to provide more intuitive surveys or gather more contextual complementary data in addition to participant responses, introduce a number of unfamiliar behaviors for patients to undertake that may work as barriers to adoption. For example, they require users to download an app to their personal smartphone and to disclose potentially sensitive information via a digital channel that may be perceived as public or insecure. To better identify and understand how these barriers may impact the adoption of smart surveys, we turn to the theory of perceived risk [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
      </sec>
      <sec>
        <title>Perceived Risk Theory</title>
        <p>A user’s perceptions of risk can have a negative effect on information system (IS) adoption [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. Initially introduced in the context of consumer behavior research, perceived risk can be conceptualized as the subjective expectation of loss experienced by a consumer during purchase decisions [<xref ref-type="bibr" rid="ref21">21</xref>]. Perceived risk describes risk as a multidimensional construct that comprises facets such as financial risk, performance risk, physical risk, psychological risk, social risk, time risk, and privacy risk. Our framework of perceived risk is adapted from studies by Jacoby and Kaplan [<xref ref-type="bibr" rid="ref22">22</xref>] and Featherman and Pavlou [<xref ref-type="bibr" rid="ref23">23</xref>] (<xref ref-type="table" rid="table1">Table 1</xref>).</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Seven dimensions of perceived risk framework.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="150"/>
            <col width="850"/>
            <thead>
              <tr valign="top">
                <td>Risk dimension</td>
                <td>Definition</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Performance</td>
                <td>The possibility that a product or service is not performing the way it was designed or advertised, therefore failing to deliver the expected benefits.</td>
              </tr>
              <tr valign="top">
                <td>Financial</td>
                <td>The possibility that the use of a product or service will cause undesired financial loss (due to purchase and incurring fees or fraud).</td>
              </tr>
              <tr valign="top">
                <td>Time</td>
                <td>The possibility that a product or service will cause the consumer to lose time from researching the product, learning the use, or returning the product if it underperforms.</td>
              </tr>
              <tr valign="top">
                <td>Psychological</td>
                <td>The risk that the purchase or performance of a product or service will cause a negative effect on the consumer’s mind or self-perception (eg, frustration or loss of self-esteem).</td>
              </tr>
              <tr valign="top">
                <td>Social</td>
                <td>The potential loss of the consumer’s social circle due to the use of a product or service.</td>
              </tr>
              <tr valign="top">
                <td>Physical</td>
                <td>The possibility that the use of a product or service may be harmful or injurious to the consumer’s health.</td>
              </tr>
              <tr valign="top">
                <td>Privacy</td>
                <td>The potential for personal information being shared without consent and/or used for purposes other than originally intended.</td>
              </tr>
              <tr valign="top">
                <td>Overall</td>
                <td>A general measure of perceived risk when all criteria are considered together.</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>Consumer behavior and IS research has found perceived risk and its antecedents to be key predictors of electronic service adoption; for example, perceived risk and its dimensions are inhibitors of technology acceptance model variables [<xref ref-type="bibr" rid="ref19">19</xref>]. Of all the facets of perceived risk, privacy (security) risk is demonstrated to be the most important barrier in the adoption of e-services for consumers, having both direct and indirect influences on the intention to adopt [<xref ref-type="bibr" rid="ref25">25</xref>]. Financial risk, the second most important inhibitor to adoption, also has a significant negative impact on attitude to technology adoption [<xref ref-type="bibr" rid="ref26">26</xref>]. Time risk has a negative influence on attitudes, implying consumers are concerned about delays and length of time to complete a transaction.</p>
        <p>Perceived risk impacts attitudes toward adopting mobile e-services [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>] as well as the intentions of use among both frequent and infrequent users of mobile e-services. In these studies, results have consistently shown overall perceived risk to be mediated by privacy, financial, time, and performance risks. With respect to mobile health (mHealth) app adoption studies, perceived risk has significant and negative effects on attitudes toward adoption. For example, Schnall et al [<xref ref-type="bibr" rid="ref30">30</xref>] identified patient concerns regarding security (eg, health information or location sharing) when referring to mHealth apps and smartphone devices, similar to Zhou [<xref ref-type="bibr" rid="ref31">31</xref>].</p>
        <p>Previous research has categorized users based on the intensity of their perceptions of privacy risk. Westin [<xref ref-type="bibr" rid="ref32">32</xref>] separates technology users into 1 of the 3 risk groups based on their willingness to share personal information on the Web: (1) privacy fundamentalists (high privacy orientation and supports regulatory controls), (2) privacy pragmatists (weigh benefits to self or society and bases trust on context), and (3) privacy unconcerned (willing to share information and reject privacy concerns). These categories were developed over a series of more than 30 consumer surveys [<xref ref-type="bibr" rid="ref33">33</xref>] and have been used extensively by the computer-human interaction community as a requirements engineering design tool to help anticipate user needs and design functionally relevant technology. However, in practice, this methodology has faced criticism, and research has found a lack of correlation between Westin’s categories and user behaviors and attitudes (ie, willingness to share information), perhaps attributable to the development of the questions before the internet [<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref36">36</xref>]. In response to this mismatch between Westin’s categories and user behavior and to more fully account for the importance of privacy risk as a barrier to adoption of smart surveys, we turn to Dupree et al’s work on privacy personas [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p>
      </sec>
      <sec>
        <title>Privacy Personas</title>
        <p>Dupree et al [<xref ref-type="bibr" rid="ref37">37</xref>] developed privacy personas to add contextual information to participants clustered by their attitudes and behaviors related to security and privacy. The personas provide a better understanding of a user’s proactivity and ability to act upon privacy risk concerns, better aligning their behavior with their attitudes. Dupree et al identify the following 5 clusters:</p>
        <list list-type="order">
          <list-item>
            <p>Fundamentalists (high knowledge and motivation): like Westin’s privacy fundamentalists [<xref ref-type="bibr" rid="ref33">33</xref>], these individuals are highly concerned with privacy and show distrust toward corporate monitoring. They exercise extreme caution when handling their information, often encrypting their devices.</p>
          </list-item>
          <list-item>
            <p>Lazy experts (high knowledge and low motivation): these individuals share the same technical knowledge as fundamentalists, but often choose convenience over security and socialization over privacy. They continue to put effort into protecting their privacy, however not to the extent where they would limit their interactions with society.</p>
          </list-item>
          <list-item>
            <p>Technicians (medium knowledge and high motivation): have less technical knowledge compared with the fundamentalists and lazy experts. However, they show limited trust in privacy settings and are highly motivated to protect their privacy, often choosing privacy over being social. They tend to form their attitudes more intuitively but will change their behavior when provided with evidence.</p>
          </list-item>
          <list-item>
            <p>Amateurs (medium knowledge and medium motivation): these individuals are just learning about security concepts. They are not nearly as motivated or knowledgeable as the other previously mentioned groups. Despite having limited knowledge, this group will still act to protect themselves from privacy threats.</p>
          </list-item>
          <list-item>
            <p>Marginally concerned (low knowledge and low motivation): with limited knowledge about security concepts, they trust networks and websites which claim to be safe. They are aware of potential privacy threats but feel these threats are unlikely to happen to them.</p>
          </list-item>
        </list>
        <p>Morton and Sasse [<xref ref-type="bibr" rid="ref39">39</xref>], who performed their research concurrently with Dupree et al, also identify 5 clusters that closely correspond to those listed above but in the context of location disclosure.</p>
        <p>The purpose of this study was to understand what beliefs, perceptions, and attitudes influenced patients’ intentions to share health service experience feedback using their smartphones, in particular, what role perceived risk plays in this process. Health care providers are increasingly being held accountable for the quality of services they provide; however, data collection is expensive, response rates are low, and turnaround times can be long. Although mHealth apps are common in the sector, and smartphones have been used to collect experience data in other industries [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>], there has been little research into the use of mobile apps to collect in situ, location-based experience data in health care.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Participant Recruitment and Selection</title>
        <p>We recruited participants from a local university between January and February 2017 using posters, email, and snowball sampling techniques. Participants were classified according to their privacy persona and their dimensions of perceived risk, and their responses were sequentially analyzed to allow researchers to evaluate the breadth of our sample and to ensure that individuals with different technical backgrounds as well as varying degrees of privacy tolerance related to information sharing were included in the study. Recruitment and analysis proceeded until saturation [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. Participants received Can $10 for participating in the interview.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>MetricWire's smartphone app served as a platform to administer the patient experience SmartSurvey.</p>
          </caption>
          <graphic xlink:href="formative_v3i1e9922_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Data Collection and Analysis</title>
        <p>Participants were welcomed upon their arrival and were given an overview of the purpose of the study and the data collection process by a researcher. Participants reviewed and signed an informed consent form and provided demographic information. Data were collected from participants using short questionnaires followed by a semistructured, in-depth interview. The information gathered from the questionnaires and think-aloud technique provided information for classification of participants into privacy persona clusters as well as complementary data for further context.</p>
        <p>In the first questionnaire, participants were asked to rate their perspectives on privacy and security (PAS) (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>). The second questionnaire included Westin’s privacy user questions [<xref ref-type="bibr" rid="ref32">32</xref>] and questions that were related to their knowledge and motivation to protect their privacy (<xref ref-type="app" rid="app2">Multimedia Appendix 2</xref>) [<xref ref-type="bibr" rid="ref37">37</xref>]. Before completing the final questionnaire and interview, participants were given the opportunity to learn more about the mobile app used for the survey distribution, analysis, and administration [<xref ref-type="bibr" rid="ref44">44</xref>] and to evaluate its key features and user interface. The MetricWire app is a commercially available mobile phone and Web-based survey platform [<xref ref-type="bibr" rid="ref44">44</xref>]. The app allows mobile completion of surveys, with functionality such as automatic alerts or triggers to prompt phone owners to respond to a survey based on factors such as time of day or location of the device. Researchers loaded a modified standardized and validated patient experience survey [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>] into the MetricWire platform using a smartphone provided by the researchers (<xref ref-type="fig" rid="figure1">Figure 1</xref>). Participants were asked to recall their last visit to a physician and fill out the survey. Completion of the survey ranged from 2 min to 5 min.</p>
        <p>Using cognitive interviewing techniques [<xref ref-type="bibr" rid="ref45">45</xref>] (think aloud), where questions are administered, and participants are encouraged to verbalize the reasoning behind their answers, a third questionnaire (including questions adapted from Jacoby and Kaplan’s [<xref ref-type="bibr" rid="ref22">22</xref>] perceived risk study), was used to assess participants’ perceptions of risk (<xref ref-type="app" rid="app3">Multimedia Appendix 3</xref>). These semistructured participant interviews ranged from 20 min to 40 min. Throughout and at the end of the interview, the researcher summarized their interpretation of each participant’s responses. Participants were encouraged to add any additional information that they felt was missing from the summarized interview responses. This process served as an informal method for member checking [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
        <p>Upon completion of each participant interview, participant responses were transcribed manually from the digital recordings and thematically analyzed using QSR International’s NVivo 11 [<xref ref-type="bibr" rid="ref47">47</xref>]. Responses were used to inform subsequent interviews. We used constant comparison and content analysis to code and analyze the transcripts [<xref ref-type="bibr" rid="ref48">48</xref>], with 3 researchers (DN, JM, and JW) reviewing the interview transcripts independently and using consensus methods to iteratively discuss content and discrepancies to ensure coding consistency. Data were manually sorted using the perceived risk framework and then thematically analyzed to uncover the unique challenges facing smart surveys’ adoption and use for patient experience sampling. Interview transcripts underwent initial open-ended coding where quotes were divided into 4 concepts and 12 subconcepts based on similarities in meaning or context. These concepts were then discussed among the researchers to further develop emergent themes. The themes were developed based on both the perceived risk typology (deductive reasoning) and open and axial coding of interview transcripts (inductive reasoning) [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref49">49</xref>].</p>
        <p>To assign participants to 1 of Dupree’s clusters, each participant’s data were reviewed (DN), and the participant was preliminarily assigned. Following a process of discussion (JM, JW, and PM), participants were reassigned as necessary until each cluster remained stable. Participant data were collected until we had at least one participant from each of the Dupree clusters identified, and saturation was achieved, where no new themes or evidence emerged from the interview transcripts [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>].</p>
        <p>Ethics approval for this study was sought and obtained jointly from the ethics committees at Wilfrid Laurier University and the University of Waterloo (#4690). All participants provided written informed consent before participating in the study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview</title>
        <p>We conducted 24 semistructured interviews with Canadian smartphone owners (7 male and 17 female) with varying educational backgrounds, technical knowledge, and motivations to protect privacy. All the participants were registered university students, half at the graduate level and, as such, are “digital natives” and thus confident using smartphones and mobile apps [<xref ref-type="bibr" rid="ref50">50</xref>]. All had received some postsecondary or postgraduate education, were comfortable speaking English, and regularly used a smartphone. The average age of the sample was 23.9 years (minimum: 21 years, maximum: 56 years, and median: 22.5 years).</p>
      </sec>
      <sec>
        <title>Perceived Risks and Privacy Personas of the Sample</title>
        <p>Respondents were classified according to Dupree et al’s [<xref ref-type="bibr" rid="ref37">37</xref>] privacy clusters framework (<xref ref-type="table" rid="table2">Table 2</xref>). Participant 4 was rated with <italic>low technical knowledge</italic> yet <italic>high motivation</italic> to protect their privacy. Therefore, they did not fit any of the Dupree privacy personas, and we classified them as “Undefined.”</p>
        <p>To develop an understanding of the core issues facing smart survey adoption, we also categorized responses according to the dimensions of perceived risk [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] (<xref ref-type="table" rid="table3">Table 3</xref>). Participants were most concerned about PAS and performance risk; under the circumstances, that is, the introduction of a novel app for use in a contextually sensitive location, this result was predictable. None of the participants expressed concerns related to their psychological or social well-being as a result of using the app.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Participants classified by privacy persona.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="250"/>
            <col width="250"/>
            <col width="250"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Privacy persona</td>
                <td>Knowledge</td>
                <td>Motivation</td>
                <td>Statistics, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Marginally concerned</td>
                <td>Low</td>
                <td>Low</td>
                <td>8 (33)</td>
              </tr>
              <tr valign="top">
                <td>Technicians</td>
                <td>Medium</td>
                <td>Medium</td>
                <td>7 (29)</td>
              </tr>
              <tr valign="top">
                <td>Amateurs</td>
                <td>Medium</td>
                <td>Low</td>
                <td>5 (21)</td>
              </tr>
              <tr valign="top">
                <td>Lazy experts</td>
                <td>High</td>
                <td>Low</td>
                <td>2 (8)</td>
              </tr>
              <tr valign="top">
                <td>Fundamentalists</td>
                <td>High</td>
                <td>High</td>
                <td>1 (4)</td>
              </tr>
              <tr valign="top">
                <td>Undefined</td>
                <td>Low</td>
                <td>High</td>
                <td>1 (4)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Number of participants who classified dimensions of perceived risk as either “likely” or “very likely.”</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Type of perceived risk</td>
                <td>Statistics, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Privacy and security</td>
                <td>18 (75)</td>
              </tr>
              <tr valign="top">
                <td>Performance</td>
                <td>12 (50)</td>
              </tr>
              <tr valign="top">
                <td>Time</td>
                <td>4 (17)</td>
              </tr>
              <tr valign="top">
                <td>Financial</td>
                <td>2 (8)</td>
              </tr>
              <tr valign="top">
                <td>Physical</td>
                <td>1 (4)</td>
              </tr>
              <tr valign="top">
                <td>Psychological</td>
                <td>0 (0)</td>
              </tr>
              <tr valign="top">
                <td>Social</td>
                <td>0 (0)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Thematic Analysis</title>
        <p>A number of themes emerged from our analysis of cognitive and in-depth interview transcripts: (1) perceived risks associated with smart survey use, (2) loss of information agency, and (3) trusted data collectors and altruistic intentions. These are organized according to the focus of this study: first, how perceived risk impacts the propensity to use smartphones to provide service feedback using our perceived risk framework, and second, the role of participants’ key beliefs, perceptions, and attitudes in that process.</p>
        <sec>
          <title>The Impact of Perceived Risk on Intentions to Use Smart Surveys</title>
          <sec>
            <title>Performance Risk</title>
            <p>Although performance risk was the most cited type of risk, participants perceived it to be minimal when downloading or using smart surveys. The likelihood of performance risk was rated by 25% (6 out of 24) participants as “Very Unlikely” and as “Unlikely” by 46% (11 out of 24) participants. Some participants attributed this lack of risk to smart surveys being more simplistic in design than other apps on their phone and others to functionality that allowed participant audit before data were submitted:</p>
            
            <disp-quote>
              <p>...from my point of view, it doesn’t look too fancy or a gaming application with a lot of coding and stuff...I feel like chances of it not working...will be low.</p>
              <attrib>P21, Amateur</attrib>
            </disp-quote>
            
            <disp-quote>
              <p>It’s not quite as advanced as some other apps. And since it submits [data] all at once... I would be able to look at all the information before it’s submitted.</p>
              <attrib>P14, Lazy expert</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Time Risk</title>
            <p>Some participants commented that smart surveys’ voluntary nature mitigated any associated risks related to time. Others disagreed, saying time loss from downloading and using the app was “very likely”; as they perceived that only health care providers would ultimately benefit from the data, they saw no off-setting personal benefit to mitigate the time risk:</p>
            
            <disp-quote>
              <p>Very likely, because it does benefit just the company, not really yourself. And like I said, it already takes a long time as an app it downloads and all that stuff...</p>
              <attrib>P4, Undefined</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Financial Risk</title>
            <p>The majority of participants felt that the possibility of financial loss associated with the app was either “Very Unlikely” 71% (17 out of 24 participants) or “Unlikely” 21% (5 out of 24 participants). The perception of low financial risk was attributed to smart surveys’ free download and lack of request for any financial information:</p>
            
            <disp-quote>
              <p>As a patient, would I have to pay money to download the app?...In this case, there doesn’t seem like there’s any chance that I would be losing money with Smart surveys. I don’t think it’s asking for credit card information or anything.</p>
              <attrib>P22, Lazy expert</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Psychological Risk</title>
            <p>When asked to judge their perception of psychological risk associated with smart surveys, nearly all participants 8% (20 out of 24) rated their perceived psychological risk to be “Very Unlikely.” Participants were familiar with providing feedback and with using smartphone apps:</p>
            
            <disp-quote>
              <p>...it’s voluntary if there was something I didn’t want to say or discuss, I wouldn’t have taken it.</p>
              <attrib>P21, Amateur</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Social Risk</title>
            <p>Overall, participants perceived a very low possibility of social risk, noting that completing surveys on a smartphone was sociably acceptable and could be completed privately:</p>
            
            <disp-quote>
              <p>I’m on my phone a lot anyways. I’m answering surveys. I don’t think anyone would think of me differently because it’s just surveys.</p>
              <attrib>P7, Technician</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Physical Risk</title>
            <p>There was little to suggest that participants perceived any physical risk associated with this technology and noted that it was comparable with any other app on their smartphone:</p>
            
            <disp-quote>
              <p>Well, it’s just filling out buttons on a survey. I don’t think there should be health issues any more than health issues from just using a smartphone.</p>
              <attrib>P7, Technician</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Privacy and Security Risk</title>
            <p>In line with the 6 dimensions of risk, participants rated the likelihood of “overall” risk associated with smart surveys as low. However, when discussing the overall risk, the predominant concerns related to PAS risk included the loss or misuse of sensitive information associated with their location and activity:</p>
            <disp-quote>
            <p>Personally, I don’t like the idea of data being collected on me...If there’s an app that could literally tell you physically where you’re being, that’s part of the metadata government can collect on you.</p>
             <attrib>P12, Technician</attrib>
            </disp-quote>
            
            <p>Similarly, participants displayed heightened sensitivity and apprehension about the possibility of the app being used to retrieve additional information unrelated to the research:</p>
            
            <disp-quote>
              <p>Maybe if I download some app, maybe someone can get your personal information on your phone.</p>
              <attrib>P6, Marginally concerned</attrib>
            </disp-quote>
            
            <p>Moreover, 1 participant was concerned that a third party, such as an employer or insurance company, could use the collected data to deny individuals employment or insurance claims:</p>
            
            <disp-quote>
              <p>If it’s not associated with my insurance company in any way, and it’s only for the health care to improve their staff’s interaction with their patient. I don’t think it would be likely [I would consider it a risk].</p>
              <attrib>P24, Technician</attrib>
            </disp-quote>
            
            <disp-quote>
              <p>Yes. I just think I would just want to know what is being used and who’s using it. And if someone could tell me that, then it might change my mind from not giving out that information to giving information.</p>
              <attrib>P11, Marginally concerned</attrib>
            </disp-quote>
            
            <disp-quote>
              <p>I don’t consider the information to be very sensitive. Even if it does go into the wrong hands, which would be weird, I probably wouldn’t mind too much.</p>
              <attrib>P7, Technician</attrib>
            </disp-quote>
            
            <p>Another expressed a belief that mobile apps may be less secure than traditional desktops apps and that the use of smartphones introduces risks such as susceptibility to hackers, in-device vulnerability, and susceptibility to loss:</p>
            
            <disp-quote>
              <p>It’s not 100% safe...I’m not sure apps interact with each other in a smartphone...if other apps can steal information from another app. It’s not 100% safe.</p>
              <attrib>P21, Amateur</attrib>
            </disp-quote>
            
            <disp-quote>
              <p>I think it’s safe. It’s not risky to share feedback. But you never know. Sometimes people can get your secure passwords, your bank passwords.</p>
              <attrib>P23, Amateur</attrib>
            </disp-quote>
            
            <disp-quote>
              <p>...it’s not really safe to send it through the smartphone...a smartphone can easily go into the wrong hands. It could get stolen, or even borrowed, maybe you just left it somewhere...</p>
              <attrib>P7, Technician</attrib>
            </disp-quote>
            
            <p>Location (Global Positioning System, GPS) data were an area of particular sensitivity. The majority of participants 71% (17 out of 24) were reluctant to disclose their location (GPS) data for service quality improvement. Many chose to not share location information for reasons of privacy, safety, and battery life:</p>
            
            <disp-quote>
              <p>If it’s on all the time, I feel like someone’s following me all the time or someone can see that they’re following me and it probably drains out my battery too.</p>
              <attrib>P13, Amateur</attrib>
            </disp-quote>
            
            <p>Other issues included concern over the perceived lack of standards surrounding the handling and storage of patient experience data. The heightened sensitivity was not surprising given the considerable attention to PAS risks associated with mHealth apps [<xref ref-type="bibr" rid="ref51">51</xref>] and frequent breaches of health ISs in the free press at the time. Finally, the overall usability of smartphones relative to desktops was also considered, reflecting limitations of a smartphone’s display as part of their confidence in the device to live up to the task of completing a survey:</p>
            
            <disp-quote>
              <p>...I mean, it’s kind of normal for me to do surveys on a computer but doing it on the phone is a little awkward. Another reason, I guess, I’m not too fond of reading too much on a smartphone ’cause I have a smaller screen and the text is small.</p>
              <attrib>P7, Technician</attrib>
            </disp-quote>
            
          </sec>
        </sec>
        <sec>
          <title>The Role of Participants’ Beliefs, Perceptions, and Attitudes</title>
          <sec>
            <title>Trusted Data Collectors and Altruistic Intentions</title>
            <p>Importantly, the third-party mobile app for data collection using a smartphone was perceived as distinct from the health care facility requesting the data, which participants generally trusted to comply with ethical treatment of their data:</p>
            
            <disp-quote>
              <p>...because it’s health care facility. I have complete trust in them.</p>
              <attrib>P2, Amateur</attrib>
            </disp-quote>
            
            <p>The identity of those who receive and interpret patient experience data was an important consideration for participants when deciding to complete a patient experience smart survey. More than half the participants 6% (14 out of 24) mentioned concerns over who received and viewed their information. Knowing who the users were and how the data would be used helped them decide whether or not to share feedback. Sharing experience data with their care providers was not a barrier, given its less sensitive nature, and thus diminished consequences if mishandled.</p>
            <p>For some participants with altruistic intentions, the <italic>impact</italic> of their feedback was a significant factor in decision making, particularly where trusted care providers might directly or indirectly use that feedback to improve service quality for others:</p>
            
            <disp-quote>
              <p>I want my feedback to improve the service. I don’t write my feedback for someone who can’t change anything or improve anything.</p>
              <attrib>P20, Marginally concerned</attrib>
            </disp-quote>
            
            <disp-quote>
              <p>If I share my data with the doctor, the administrator will not benefit me if they look into my data. Anyone who’s not really involved with the service. If I want to share my information in my smartphone, I want to give it to the doctor directly...It’s also the benefit of the smartphone, it can give it directly to the doctor.</p>
              <attrib>P15, Marginally concerned</attrib>
            </disp-quote>
            
          </sec>
          <sec>
            <title>Loss of Information Agency</title>
            <p>Participants expressed concern that collected data may be used for purposes beyond what was initially intended or disclosed, specifically that it might affect their “information agency.” This differed from their privacy concerns, where privacy risk is defined as the potential loss of personal information without the consumers’ knowledge following the use of a service or a product [<xref ref-type="bibr" rid="ref23">23</xref>]. The loss of information agency is the loss of control over the interactions after the information has been shared by the participant. An example of loss of information agency might relate to receiving marketing emails following a service encounter, using contact information a patient provided to an endorsed third party collecting a trusted provider’s service quality survey data. In addition, 1 participant explained that the loss of agency can be apparent when seeing Web-based advertisements tailored to her daily life:</p>
            
            <disp-quote>
              <p>Maybe it’s stuff you don’t necessarily want a third party to know and they do know it because sometimes certain third party companies display ads based on what you’ve done if you see an ad that’s something related to you in story that you’ve done.</p>
              <attrib>P21, Amateur</attrib>
            </disp-quote>
            
            <p>In general, the participants exhibited comments and knowledge consistent with their Dupree classification.</p>
          </sec>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Mobile apps are increasingly being used to gather real-time clinical and ecological patient data and to help manage workload in the health services sectors [<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref54">54</xref>]. Although smartphones are changing the way we deliver health care and engage patients [<xref ref-type="bibr" rid="ref55">55</xref>], examples of their use in collecting in situ patient service experience data are scant. We explored perceptions and attitudes, which impact the adoption and use of smartphone-based apps to collect patient experience data, referred to as smart surveys. The theory of perceived risk [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] suggests there will be inhibitors to smart surveys adoption. Yet, although participants mentioned perceived risks normally associated with electronic commerce and other Web-based activities such as social, psychological, physical, financial, and time risks [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref56">56</xref>], these were considered minimal.</p>
        <p>The study used an app that participants would have to download, retain on their phone, and manage alerts and the software app itself over time. The most commonly perceived risk was PAS, consistent with other mHealth and wearables literature [<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>]. Participants’ PAS risk perceptions were related to connectivity, data sharing, encryption, and storage. Consistent with Dupree et al [<xref ref-type="bibr" rid="ref37">37</xref>], we observed that not all digital natives have the same level of technical knowledge. Our thematic analysis revealed other factors indirectly related to risk that influenced participant’s perceptions of smart surveys as a conduit for patient service experience data collection. In particular, participants trusted the data collectors and communication channel, thereby reducing perceptions of risk. Conversely, concerns over loss of information agency, evoked based on past social and personal experiences where they lost control of their data, served to amplify their PAS concerns. These themes have implications for the design and use of smart surveys apps in practice in 3 main areas. The 3 themes, with recommendations for developers are as follows:</p>
        <sec>
          <title>Support Communication Between Providers and Recipients of Information</title>
          <p>When individuals do trust their health care provider, the presence of trust reflects a belief that the provider has the ability and motivation to make changes that result in service improvements [<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref60">60</xref>]. However, existing surveys often do not allow for participants to see the impact of their feedback or for providers to acknowledge its importance. Participants’ concerns revealed a need to better communicate patient experience survey goals to patients and to ensure that feedback impacts service improvements. Only half of the participants believed their feedback was important, and some participants regarded feedback as a formality rather than a tool to improve services. Similarly, we found that participants wanted health care providers who receive their comments to have the authority to implement changes. Our results point to an opportunity for smart surveys’ functionality to be expanded to include frictionless feedback loops where health care providers acknowledge the importance of participation and communicate when service feedback has been received and implemented. These communications are essential in building trust between patients and providers and are poorly supported through paper surveys.</p>
          <p>Furthermore, our results suggest a need to better identify any complementary uses and recipients of survey data. Research ethics standards of practice require that researchers inform participants how data will be used at the beginning of a survey; however, this is not necessarily the case for private or nonprofit health service providers. Outside of personal health information, the use and management of which is often governed by legislation, consumers have very little control over what data are stored and shared for commercial use [<xref ref-type="bibr" rid="ref61">61</xref>]. Our results suggest that participants want health care providers to affirm who and how the feedback data will be used and its sequelae.</p>
          <sec>
            <title>Recommendation Number 1</title>
            <p>Smart surveys functionality should foster trust between patients and providers by identifying the recipients of feedback data and communicating when it is read and what improvements to care are made as a result.</p>
          </sec>
        </sec>
        <sec>
          <title>Provide Transparency of Motives and Options</title>
          <p>Participants perceived a lack of confidence in the security of smartphones and that they can be perceived as a second-class computing device when compared with desktop personal computers for completing surveys. For example, participants expressed concerns about installing apps on their personal devices and uncertainty about how data may be shared between different apps. This was notable among the amateurs and marginally concerned. For individuals with more in-depth technical knowledge such as the fundamentalists, disclosure of implementation details was equally important, such as the types of permissions the app required, the type and location of servers on which the data would be stored, whether information would be encrypted, and the length of time their information would be retained. However, it should be noted that this was the exception. As with Gkioulos et al, we found that digital natives tended to ignore or were complacent about privacy policies [<xref ref-type="bibr" rid="ref50">50</xref>].</p>
          <sec>
            <title>Recommendation Number 2</title>
            <p>For technical users, provide optional information about where data will be stored, for how long, and whether it will be encrypted.</p>
          </sec>
          <sec>
            <title>Recommendation Number 3</title>
            <p>Where possible, smart surveys should provide optional modalities to complete experience surveys on devices other than smartphones.</p>
          </sec>
        </sec>
        <sec>
          <title>Controlling Access to And Sharing of Information</title>
          <p>Although there were disagreements about the sensitivity of feedback data, participants were consistently hesitant about unauthorized use of or access to data, particularly their location (ie, GPS) [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref62">62</xref>]. Participants believed that location data introduced a higher level of risk and loss of agency that could lead to subsequent inconveniences (eg, telemarketing interactions) or consequences (eg, identity theft). In some cases, participants believed that loss of information agency could lead to the loss of privacy, loss of finances, or physical harm.</p>
          <p>The perceived risk of losing agency represents a significant barrier to adoption of “advanced” smart surveys features such as geofencing (use of technology to create a virtual geographic boundary that triggers or alerts when a mobile device enters or leaves the area). For example, smart surveys can reduce recall bias by prompting patients for feedback soon after they leave a physician’s office, instead of days or months later in traditional survey methods. The majority of participants found location-based prompts too intrusive and risky and had location services disabled on their phone. This finding is consistent with prior research that demonstrates concerns for privacy are higher when the service is based on tracking the user’s location [<xref ref-type="bibr" rid="ref62">62</xref>]. Furthermore, participants were conscious of the consequences of their location being disclosed to third parties.</p>
          <sec>
            <title>Recommendation Number 4</title>
            <p>Smart surveys should support alternatives to location services for prompting patients for feedback, for example, quick response codes or calendar integration.</p>
          </sec>
        </sec>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>The themes identified through our interviews helped to develop an understanding of barriers to smartphone-based patient experience surveys. Nevertheless, we are careful to acknowledge limitations to this study. First, the attitudes and perceptions of risk held by our participants were captured at 1 point in time, and attitudes toward adoption can change over time and as the y become more familiar with technology [<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]. Furthermore, participants were not asked to download and use the app on their own devices. Consequently, there may have been less consideration given to risk as participants did not actually surrender any personal information. Future work will address these limitations through data triangulation and a longitudinal validation that patient behaviors reflect their reported perceptions. Second, participants were mostly younger (average age: 23.9 years) and more educated, and as a result, they are not necessarily representative of the largest patient segment using health care services [<xref ref-type="bibr" rid="ref65">65</xref>]. Although the results of this study may not be generalizable to the wider population, a majority of adults now own cell phones, 77% of them own smartphones, and a growing percentage of adults aged 50 to 64 years and over 65 years are smartphone users (73% and 46%, respectively) [<xref ref-type="bibr" rid="ref66">66</xref>]. These rapidly growing rates and the decreasing availability of cell phones without expanded digital capability and access to the internet suggest that adults across the life stage will soon experience similar issues as the study sample.</p>
        <p>We used nonprobability convenience sampling and a nonsystematic recruitment process for this exploratory study; we did not anticipate our findings would be exhaustive; however, we believe that they add to the understanding of this emerging domain. On the basis of our findings, we believe that individuals with higher technical knowledge and motivation to protect their privacy were under-represented. Finally, the strength of qualitative research is its ability to describe and understand both obvious and latent phenomena contained within the “thick descriptions” provided by interview data. Although our interpretation of these exploratory data is nongeneralizable, the use of in-depth interview methodology provides researchers with an appreciation of the complexity and context of this relatively new research domain. It should also be acknowledged that with every new innovative technology, the patterns of risk and security concerns may differ from those of ostensibly similar legacy systems [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The use of smartphone-based patient experience surveys provides new and exciting opportunities for health care providers to assess and improve the quality of health services. We conducted 24 semistructured interviews with smartphone users to explore the types of perceived risks that may exist when using smart surveys in the context-sensitive health services sector. The results demonstrate that the classical dimensions of perceived risk raised minimal concerns for the use of smartphones to collect patient service experience feedback. However, PAS risk associated with trust in the doctor-patient relationship, the reliability of the communication channel, and the risk of potential loss of agency over shared information may inhibit adoption. Conversely, altruistic motivations to contribute to health service quality for others may facilitate patients’ adoption of smart surveys. We conclude that barriers and enablers of adoption of novel technologies may change from sector to sector and should be further explored.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Questionnaire: participant perspectives on privacy and security.</p>
        <media xlink:href="formative_v3i1e9922_app1.pdf" xlink:title="PDF File (Adobe PDF File), 56KB"/>
      </app>
      <app id="app2">
        <title>Multimedia Appendix 2</title>
        <p>Questionnaire: perceived risk associated with the use of smart surveys.</p>
        <media xlink:href="formative_v3i1e9922_app2.pdf" xlink:title="PDF File (Adobe PDF File), 64KB"/>
      </app>
      <app id="app3">
        <title>Multimedia Appendix 3</title>
        <p>In-depth interview (Think Aloud) prompts.</p>
        <media xlink:href="formative_v3i1e9922_app3.pdf" xlink:title="PDF File (Adobe PDF File), 69KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">GPS</term>
          <def>
            <p>Global Positioning System</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">IS</term>
          <def>
            <p>information system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">PAS</term>
          <def>
            <p>privacy and security</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work is funded by a Social Science and Humanities Research Council of Canada Insight Development Grant (#430-2016-00858). We would like to thank Mr Brian Stewart and the team at MetricWire for their support of this study.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Richards</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Montori</surname>
            <given-names>VM</given-names>
          </name>
          <name name-style="western">
            <surname>Godlee</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Lapsley</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Paul</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Let the patient revolution begin</article-title>
        <source>Br Med J</source>  
        <year>2013</year>  
        <month>05</month>  
        <day>14</day>  
        <volume>346</volume>  
        <fpage>f2614</fpage>  
        <pub-id pub-id-type="doi">10.1136/bmj.f2614</pub-id>
        <pub-id pub-id-type="medline">23674136</pub-id></nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Boulding</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Glickman</surname>
            <given-names>SW</given-names>
          </name>
          <name name-style="western">
            <surname>Manary</surname>
            <given-names>MP</given-names>
          </name>
          <name name-style="western">
            <surname>Schulman</surname>
            <given-names>KA</given-names>
          </name>
          <name name-style="western">
            <surname>Staelin</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Relationship between patient satisfaction with inpatient care and hospital readmission within 30 days</article-title>
        <source>Am J Manag Care</source>  
        <year>2011</year>  
        <month>01</month>  
        <volume>17</volume>  
        <issue>1</issue>  
        <fpage>41</fpage>  
        <lpage>8</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.ajmc.com/pubMed.php?pii=12805"/>
        </comment>  
        <pub-id pub-id-type="medline">21348567</pub-id>
        <pub-id pub-id-type="pii">12805</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Doyle</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Lennox</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Bell</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>A systematic review of evidence on the links between patient experience and clinical safety and effectiveness</article-title>
        <source>BMJ Open</source>  
        <year>2013</year>  
        <month>01</month>  
        <day>3</day>  
        <volume>3</volume>  
        <issue>1</issue>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://bmjopen.bmj.com/cgi/pmidlookup?view=long&amp;pmid=23293244"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/bmjopen-2012-001570</pub-id>
        <pub-id pub-id-type="medline">23293244</pub-id>
        <pub-id pub-id-type="pii">bmjopen-2012-001570</pub-id>
        <pub-id pub-id-type="pmcid">PMC3549241</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ahmed</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Burt</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Roland</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Measuring patient experience: concepts and methods</article-title>
        <source>Patient</source>  
        <year>2014</year>  
        <volume>7</volume>  
        <issue>3</issue>  
        <fpage>235</fpage>  
        <lpage>41</lpage>  
        <pub-id pub-id-type="doi">10.1007/s40271-014-0060-5</pub-id>
        <pub-id pub-id-type="medline">24831941</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Price</surname>
            <given-names>RA</given-names>
          </name>
          <name name-style="western">
            <surname>Elliott</surname>
            <given-names>MN</given-names>
          </name>
          <name name-style="western">
            <surname>Zaslavsky</surname>
            <given-names>AM</given-names>
          </name>
          <name name-style="western">
            <surname>Hays</surname>
            <given-names>RD</given-names>
          </name>
          <name name-style="western">
            <surname>Lehrman</surname>
            <given-names>WG</given-names>
          </name>
          <name name-style="western">
            <surname>Rybowski</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Edgman-Levitan</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Cleary</surname>
            <given-names>PD</given-names>
          </name>
        </person-group>
        <article-title>Examining the role of patient experience surveys in measuring health care quality</article-title>
        <source>Med Care Res Rev</source>  
        <year>2014</year>  
        <month>10</month>  
        <volume>71</volume>  
        <issue>5</issue>  
        <fpage>522</fpage>  
        <lpage>54</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25027409"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1177/1077558714541480</pub-id>
        <pub-id pub-id-type="medline">25027409</pub-id>
        <pub-id pub-id-type="pii">1077558714541480</pub-id>
        <pub-id pub-id-type="pmcid">PMC4349195</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McMurray</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>McNeil</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Lafortune</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Black</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Prorok</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Stolee</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Measuring patients' experience of rehabilitation services across the care continuum. Part I: a systematic review of the literature</article-title>
        <source>Arch Phys Med Rehabil</source>  
        <year>2016</year>  
        <month>01</month>  
        <volume>97</volume>  
        <issue>1</issue>  
        <fpage>104</fpage>  
        <lpage>20</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.apmr.2015.08.407</pub-id>
        <pub-id pub-id-type="medline">26299752</pub-id>
        <pub-id pub-id-type="pii">S0003-9993(15)01073-4</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Miller</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>The smartphone psychology manifesto</article-title>
        <source>Perspect Psychol Sci</source>  
        <year>2012</year>  
        <month>05</month>  
        <volume>7</volume>  
        <issue>3</issue>  
        <fpage>221</fpage>  
        <lpage>37</lpage>  
        <pub-id pub-id-type="doi">10.1177/1745691612441215</pub-id>
        <pub-id pub-id-type="medline">26168460</pub-id>
        <pub-id pub-id-type="pii">7/3/221</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tomlinson</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Solomon</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Singh</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Doherty</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Chopra</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Ijumba</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Tsai</surname>
            <given-names>AC</given-names>
          </name>
          <name name-style="western">
            <surname>Jackson</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>The use of mobile phones as a data collection tool: a report from a household survey in South Africa</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2009</year>  
        <volume>9</volume>  
        <fpage>51</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1472-6947/9/51"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1472-6947-9-51</pub-id>
        <pub-id pub-id-type="medline">20030813</pub-id>
        <pub-id pub-id-type="pii">1472-6947-9-51</pub-id>
        <pub-id pub-id-type="pmcid">PMC2811102</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McMurray</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>McNeil</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Gordon</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Elliott</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Stolee</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Building a rehabilitative care measurement instrument to improve the patient experience</article-title>
        <source>Arch Phys Med Rehabil</source>  
        <year>2019</year>  
        <month>01</month>  
        <volume>100</volume>  
        <issue>1</issue>  
        <fpage>39</fpage>  
        <lpage>44</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.apmr.2018.05.022</pub-id>
        <pub-id pub-id-type="medline">29958901</pub-id>
        <pub-id pub-id-type="pii">S0003-9993(18)30381-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McMurray</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>McNeil</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Gordon</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Elliott</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Stolee</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Psychometric testing of a rehabilitative care patient experience instrument</article-title>
        <source>Arch Phys Med Rehabil</source>  
        <year>2018</year>  
        <month>09</month>  
        <volume>99</volume>  
        <issue>9</issue>  
        <fpage>1840</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.apmr.2018.04.028</pub-id>
        <pub-id pub-id-type="medline">29852150</pub-id>
        <pub-id pub-id-type="pii">S0003-9993(18)30319-8</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="web">
        <source>WatLX</source>  
        <access-date>2018-01-23</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://uwaterloo.ca/watlx/">https://uwaterloo.ca/watlx/</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6wh1DseTq"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Abernethy</surname>
            <given-names>AP</given-names>
          </name>
          <name name-style="western">
            <surname>Herndon</surname>
            <given-names>JE</given-names>
          </name>
          <name name-style="western">
            <surname>Wheeler</surname>
            <given-names>JL</given-names>
          </name>
          <name name-style="western">
            <surname>Patwardhan</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Shaw</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Lyerly</surname>
            <given-names>HK</given-names>
          </name>
          <name name-style="western">
            <surname>Weinfurt</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Improving health care efficiency and quality using tablet personal computers to collect research-quality, patient-reported data</article-title>
        <source>Health Serv Res</source>  
        <year>2008</year>  
        <month>12</month>  
        <volume>43</volume>  
        <issue>6</issue>  
        <fpage>1975</fpage>  
        <lpage>91</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/18761678"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1111/j.1475-6773.2008.00887.x</pub-id>
        <pub-id pub-id-type="medline">18761678</pub-id>
        <pub-id pub-id-type="pii">HESR887</pub-id>
        <pub-id pub-id-type="pmcid">PMC2613994</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Green</surname>
            <given-names>AS</given-names>
          </name>
          <name name-style="western">
            <surname>Rafaeli</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Bolger</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Shrout</surname>
            <given-names>PE</given-names>
          </name>
          <name name-style="western">
            <surname>Reis</surname>
            <given-names>HT</given-names>
          </name>
        </person-group>
        <article-title>Paper or plastic? Data equivalence in paper and electronic diaries</article-title>
        <source>Psychol Methods</source>  
        <year>2006</year>  
        <month>03</month>  
        <volume>11</volume>  
        <issue>1</issue>  
        <fpage>87</fpage>  
        <lpage>105</lpage>  
        <pub-id pub-id-type="doi">10.1037/1082-989X.11.1.87</pub-id>
        <pub-id pub-id-type="medline">16594769</pub-id>
        <pub-id pub-id-type="pii">2006-03820-006</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Marcano</surname>
            <given-names>BJ</given-names>
          </name>
          <name name-style="western">
            <surname>Jamsek</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Huckvale</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>O'Donoghue</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Morrison</surname>
            <given-names>CP</given-names>
          </name>
          <name name-style="western">
            <surname>Car</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Comparison of self-administered survey questionnaire responses collected using mobile apps versus other methods</article-title>
        <source>Cochrane Database Syst Rev</source>  
        <year>2015</year>  
        <month>07</month>  
        <day>27</day>  
        <issue>7</issue>  
        <fpage>MR000042</fpage>  
        <pub-id pub-id-type="doi">10.1002/14651858.MR000042.pub2</pub-id>
        <pub-id pub-id-type="medline">26212714</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ludford</surname>
            <given-names>PJ</given-names>
          </name>
          <name name-style="western">
            <surname>Frankowski</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Reily</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Wilms</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Terveen</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Because I Carry My Cell Phone Anyway: Functional Location-based Reminder Applications</article-title>
        <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>  
        <year>2006</year>  
        <conf-name>CHI'06</conf-name>
        <conf-date>April 22-27, 2006</conf-date>
        <conf-loc>Montreal, Canada</conf-loc>
        <publisher-loc>USA</publisher-loc>
        <publisher-name>ACM</publisher-name>
        <fpage>889</fpage>  
        <lpage>98</lpage>
        <comment><ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple">https://dl.acm.org/citation.cfm?id=1124903</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Perez-Quinones</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Beyond "Geofencing": Specifying Location in Location-Based Reminder Applications</article-title>
        <source>Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems</source>  
        <year>2015</year>  
        <conf-name>CHI EA'15</conf-name>
        <conf-date>April 18-23, 2015</conf-date>
        <conf-loc>Seoul, South Korea</conf-loc>
        <publisher-loc>USA</publisher-loc>
        <publisher-name>ACM</publisher-name>
        <fpage>1767</fpage>  
        <lpage>72</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pielot</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Church</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>de Oliveira</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>An In-situ Study of Mobile Phone Notifications</article-title>
        <source>Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices &amp; Services</source>  
        <year>2014</year>  
        <conf-name>MobileHCI'14</conf-name>
        <conf-date>September 23-26, 2014</conf-date>
        <conf-loc>Toronto, Canada</conf-loc>
        <fpage>233</fpage>  
        <lpage>42</lpage> </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sullivan</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Bornstein</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>McMurray</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>Memorial University of Newfoundland</source>  
        <year>2016</year>  
        <access-date>2019-01-31</access-date>
        <comment>The Effectiveness of Digital Surveys for Collecting Patient Feedback
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nlcahr.mun.ca/CHRSP/PATIENT_FEEDBACK_RER.pdf">https://www.nlcahr.mun.ca/CHRSP/PATIENT_FEEDBACK_RER.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75qCUNMH6"/></comment> </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kuntsche</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Labhart</surname>
            <given-names>F</given-names>
          </name>
        </person-group>
        <article-title>Using personal cell phones for ecological momentary assessment</article-title>
        <source>Eur Psychol Internet</source>  
        <year>2013</year>  
        <volume>18</volume>  
        <issue>1</issue>  
        <fpage>3</fpage>  
        <lpage>11</lpage>  
        <pub-id pub-id-type="doi">10.1027/1016-9040/a000127</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Dinev</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Information privacy research: an interdisciplinary review</article-title>
        <source>MIS Q</source>  
        <year>2011</year>  
        <volume>35</volume>  
        <issue>4</issue>  
        <fpage>989</fpage>  
        <lpage>1015</lpage>  
        <comment>https://misq.org/information-privacy-research-an-interdisciplinary-review.html</comment> </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bauer</surname>
            <given-names>RA</given-names>
          </name>
        </person-group>
        <article-title>Consumer Behavior as Risk Taking</article-title>
        <source>Dynamic Marketing for a Changing World, Proceedings of the 43rd Conference of the American Marketing Association</source>  
        <year>1960</year>  
        <conf-name>43rd Conference of the American Marketing Association</conf-name>
        <conf-date>June 15-17, 1960</conf-date>
        <conf-loc>Chicago</conf-loc>
        <fpage>389</fpage>  
        <lpage>98</lpage> </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jacoby</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Kaplan</surname>
            <given-names>LB</given-names>
          </name>
        </person-group>
        <source>Association for Consumer Research</source>  
        <year>1972</year>  
        <access-date>2019-02-04</access-date>
        <comment>The components of perceived risk
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://acrwebsite.org/volumes/12016/volumes/sv02/SV02">http://acrwebsite.org/volumes/12016/volumes/sv02/SV02</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75vXKmLE6"/></comment> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Featherman</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Pavlou</surname>
            <given-names>PA</given-names>
          </name>
        </person-group>
        <article-title>Predicting e-services adoption: a perceived risk facets perspective</article-title>
        <source>Int J Hum Comput Stud</source>  
        <year>2003</year>  
        <month>10</month>  
        <volume>59</volume>  
        <issue>4</issue>  
        <fpage>451</fpage>  
        <lpage>74</lpage>  
        <pub-id pub-id-type="doi">10.1016/S1071-5819(03)00111-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Littler</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Melanthiou</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: the case of internet banking</article-title>
        <source>J Retail Cons Serv</source>  
        <year>2006</year>  
        <month>11</month>  
        <volume>13</volume>  
        <issue>6</issue>  
        <fpage>431</fpage>  
        <lpage>43</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.jretconser.2006.02.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Iglesias-Pradas</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Pascual-Miguel</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Hernández-García</surname>
            <given-names>Á</given-names>
          </name>
          <name name-style="western">
            <surname>Chaparro-Peláez</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Barriers and drivers for non-shoppers in B2C e-commerce: a latent class exploratory analysis</article-title>
        <source>Comput Human Behav</source>  
        <year>2013</year>  
        <volume>29</volume>  
        <issue>2</issue>  
        <fpage>314</fpage>  
        <lpage>22</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.chb.2012.01.024</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Biucky</surname>
            <given-names>ST</given-names>
          </name>
          <name name-style="western">
            <surname>Abdolvand</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Harandi</surname>
            <given-names>SR</given-names>
          </name>
        </person-group>
        <article-title>The effects of perceived risk on social commerce adoption based on the tam model</article-title>
        <source>Int J Electron Commer Stud</source>  
        <year>2017</year>  
        <volume>8</volume>  
        <issue>2</issue>  
        <fpage>196</fpage>  
        <pub-id pub-id-type="medline">12876581</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>da Chen</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>A model of consumer acceptance of mobile payment</article-title>
        <source>Int J Mob Commun</source>  
        <year>2008</year>  
        <volume>6</volume>  
        <issue>1</issue>  
        <fpage>32</fpage>  
        <pub-id pub-id-type="doi">10.1504/IJMC.2008.015997</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>MC</given-names>
          </name>
        </person-group>
        <article-title>Factors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit</article-title>
        <source>Electron Commer Res Appl</source>  
        <year>2009</year>  
        <month>05</month>  
        <volume>8</volume>  
        <issue>3</issue>  
        <fpage>130</fpage>  
        <lpage>41</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.elerap.2008.11.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tan</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Leo</surname>
            <given-names>TS</given-names>
          </name>
        </person-group>
        <article-title>Factors influencing the adoption of internet banking</article-title>
        <source>J Assoc Inf Syst</source>  
        <year>2000</year>  
        <volume>1</volume>  
        <fpage>1</fpage>  
        <lpage>44</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.580.5818&amp;rep=rep1&amp;type=pdf"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schnall</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Higgins</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Brown</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Carballo-Dieguez</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Bakken</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Trust, perceived risk, perceived ease of use and perceived usefulness as factors related to mHealth technology use</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2015</year>  
        <volume>216</volume>  
        <fpage>467</fpage>  
        <lpage>71</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26262094"/>
        </comment>  
        <pub-id pub-id-type="doi">10.3233/978-1-61499-564-7-467</pub-id>
        <pub-id pub-id-type="medline">26262094</pub-id>
        <pub-id pub-id-type="pmcid">PMC5588863</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Examining location-based services usage from the perspectives of Unified Theory of Acceptance and Use of Technology and privacy risk</article-title>
        <source>J Electron Commer Res</source>  
        <year>2012</year>  
        <volume>13</volume>  
        <issue>2</issue>  
        <fpage>135</fpage>  
        <lpage>44</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jecr.org/sites/default/files/13_2_p03.pdf"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Westin</surname>
            <given-names>AF</given-names>
          </name>
        </person-group>
        <article-title>Social and political dimensions of privacy</article-title>
        <source>J Soc Issues</source>  
        <year>2003</year>  
        <volume>59</volume>  
        <issue>2</issue>  
        <fpage>431</fpage>  
        <lpage>53</lpage>  
        <pub-id pub-id-type="doi">10.1111/1540-4560.00072</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kumaraguru</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Cranor</surname>
            <given-names>LF</given-names>
          </name>
        </person-group>
        <source>Carnegie Mellon University</source>  
        <year>2005</year>  
        <access-date>2019-02-04</access-date>
        <comment>Privacy Indexes: A Survey of Westin's Studies
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cs.cmu.edu/~ponguru/CMU-ISRI-05-138.pdf">https://www.cs.cmu.edu/~ponguru/CMU-ISRI-05-138.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75vZLYgbZ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Consolvo</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>IE</given-names>
          </name>
          <name name-style="western">
            <surname>Matthews</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>LaMarca</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Tabert</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Powledge</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Location disclosure to social relations: why, when, &amp; what people want to share</article-title>
        <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>  
        <year>2005</year>  
        <conf-name>CHI'05</conf-name>
        <conf-date>March 29-April 01, 2015</conf-date>
        <conf-loc>Atlanta, USA</conf-loc>
        <fpage>81</fpage>  
        <lpage>90</lpage>  
        <pub-id pub-id-type="doi">10.1145/1054972.1054985</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>King</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>CyLab Usable Privacy and Security Laboratory</source>  
        <year>2009</year>  
        <access-date>2019-01-31</access-date>
        <comment>Taken Out of Context: An Empirical Analysis of Westin’s Privacy Scale
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://cups.cs.cmu.edu/soups/2014/workshops/privacy/s1p1.pdf">https://cups.cs.cmu.edu/soups/2014/workshops/privacy/s1p1.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75qEImNSt"/></comment> </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Woodruff</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Pihur</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Consolvo</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Schmidt</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Brandimarte</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Acquisti</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences</article-title>
        <source>Proceedings of the Tenth Symposium on Usable Privacy and Security</source>  
        <year>2014</year>  
        <conf-name>SOUPS 2014</conf-name>
        <conf-date>July 9-11, 2014</conf-date>
        <conf-loc>Menlo Park, USA</conf-loc></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dupree</surname>
            <given-names>JL</given-names>
          </name>
          <name name-style="western">
            <surname>Devries</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Berry</surname>
            <given-names>DM</given-names>
          </name>
          <name name-style="western">
            <surname>Lank</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Privacy personas: Clustering users via attitudes and behaviors toward security practices</article-title>
        <source>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</source>  
        <year>2016</year>  
        <conf-name>CHI'16</conf-name>
        <conf-date>May 7-12 2016</conf-date>
        <conf-loc>San Jose, USA</conf-loc>
        <fpage>5228</fpage>  
        <lpage>39</lpage>  
        <pub-id pub-id-type="doi">10.1145/2858036.2858214</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dupree</surname>
            <given-names>JL</given-names>
          </name>
          <name name-style="western">
            <surname>Lank</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Berry</surname>
            <given-names>DM</given-names>
          </name>
        </person-group>
        <article-title>A case study of using grounded analysis as a requirement engineering method: identifying personas that specify privacy and security tool users</article-title>
        <source>Sci Comput Program</source>  
        <year>2018</year>  
        <month>01</month>  
        <volume>152</volume>  
        <issue>C</issue>  
        <fpage>1</fpage>  
        <lpage>37</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.scico.2017.08.010</pub-id></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Morton</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Sasse</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Desperately seeking assurances: Segmenting users by their information-seeking preferences</article-title>
        <year>2014</year>  
        <conf-name>2014 Twelfth Annual International Conference on Privacy, Security and Trust</conf-name>
        <conf-date>July 23-24, 2014</conf-date>
        <conf-loc>Toronto, Canada</conf-loc>
        <fpage>102</fpage>  
        <lpage>11</lpage>  
        <pub-id pub-id-type="doi">10.1109/PST.2014.6890929</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Reinau</surname>
            <given-names>KH</given-names>
          </name>
          <name name-style="western">
            <surname>Harder</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Weber</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>The SMS–GPS-Trip method: a new method for collecting trip information in travel behavior research</article-title>
        <source>Telecomm Pol</source>  
        <year>2014</year>  
        <volume>39</volume>  
        <issue>3-4</issue>  
        <fpage>363</fpage>  
        <lpage>73</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.telpol.2014.05.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kojo</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Heiskala</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Virtanen</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Customer journey mapping of an experience-centric service by mobile self-reporting: Testing the Qualiwall tool</article-title>
        <year>2014</year>  
        <conf-name>16th International Conference on Human-Computer Interaction (HCII 2014)</conf-name>
        <conf-date>June 22-26, 2014</conf-date>
        <conf-loc>Crete, Greece</conf-loc></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Guest</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Bunce</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Johnson</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>How many interviews are enough? An experiment with data saturation and variability</article-title>
        <source>Field Methods</source>  
        <year>2006</year>  
        <month>02</month>  
        <day>1</day>  
        <volume>18</volume>  
        <issue>1</issue>  
        <fpage>59</fpage>  
        <lpage>82</lpage>  
        <pub-id pub-id-type="doi">10.1177/1525822X05279903</pub-id></nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Morse</surname>
            <given-names>JM</given-names>
          </name>
        </person-group>
        <article-title>Determining sample size</article-title>
        <source>Qual Health Res</source>  
        <year>2000</year>  
        <volume>10</volume>  
        <issue>1</issue>  
        <fpage>3</fpage>  
        <lpage>5</lpage>  
        <pub-id pub-id-type="doi">10.1177/104973200129118183</pub-id></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
        <source>Metricwire Inc</source>  
        <access-date>2018-01-23</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.metricwire.com/">https://www.metricwire.com/</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6wh0n1Nxe"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Beatty</surname>
            <given-names>PC</given-names>
          </name>
          <name name-style="western">
            <surname>Willis</surname>
            <given-names>GB</given-names>
          </name>
        </person-group>
        <article-title>Research synthesis: the practice of cognitive interviewing</article-title>
        <source>Public Opin Q</source>  
        <year>2007</year>  
        <month>06</month>  
        <day>5</day>  
        <volume>71</volume>  
        <issue>2</issue>  
        <fpage>287</fpage>  
        <lpage>311</lpage>  
        <pub-id pub-id-type="doi">10.1093/poq/nfm006</pub-id>
        <pub-id pub-id-type="pii">S0308-8146(15)00613-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sandelowski</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Reembodying qualitative inquiry</article-title>
        <source>Qual Health Res</source>  
        <year>2002</year>  
        <month>01</month>  
        <volume>12</volume>  
        <issue>1</issue>  
        <fpage>104</fpage>  
        <lpage>15</lpage>  
        <pub-id pub-id-type="doi">10.1177/1049732302012001008</pub-id>
        <pub-id pub-id-type="medline">11797919</pub-id></nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fereday</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Muir-Cochrane</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Demonstrating rigor using thematic analysis: a hybrid approach of inductive and deductive coding and theme development</article-title>
        <source>Int J Qual Methods</source>  
        <year>2016</year>  
        <month>11</month>  
        <day>29</day>  
        <volume>5</volume>  
        <issue>1</issue>  
        <fpage>80</fpage>  
        <lpage>92</lpage>  
        <pub-id pub-id-type="doi">10.1177/160940690600500107</pub-id>
        <pub-id pub-id-type="pii">10.1002/1096-8628(20000612)96:3&lt;278::AID-AJMG8&gt;3.0.CO;2-R</pub-id></nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Corbin</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Strauss</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <source>Basics Of Qualitative Research: Techniques And Procedures For Developing Grounded Theory</source>  
        <year>2015</year>  
        <publisher-loc>Thousand Oaks, USA</publisher-loc>
        <publisher-name>Sage Publications</publisher-name></nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Creswell</surname>
            <given-names>JW</given-names>
          </name>
        </person-group>
        <source>Research Design: Qualitative, Quantitative and Mixed Methods Approaches</source>  
        <year>2003</year>  
        <publisher-loc>Thousand Oaks, California</publisher-loc>
        <publisher-name>Sage Publications Inc</publisher-name></nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gkioulos</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Wangen</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Katsikas</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Kavallieratos</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Kotzanikolaou</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Security awareness of the digital natives</article-title>
        <source>Information</source>  
        <year>2017</year>  
        <month>04</month>  
        <day>8</day>  
        <volume>8</volume>  
        <issue>2</issue>  
        <fpage>42</fpage>  
        <pub-id pub-id-type="doi">10.3390/info8020042</pub-id></nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Martínez-Pérez</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>de la Torre-Díez</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>López-Coronado</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Privacy and security in mobile health apps: a review and recommendations</article-title>
        <source>J Med Syst</source>  
        <year>2015</year>  
        <month>01</month>  
        <volume>39</volume>  
        <issue>1</issue>  
        <fpage>181</fpage>  
        <pub-id pub-id-type="doi">10.1007/s10916-014-0181-3</pub-id>
        <pub-id pub-id-type="medline">25486895</pub-id></nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Braun</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Catalani</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Wimbush</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Israelski</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Community health workers and mobile technology: a systematic review of the literature</article-title>
        <source>PLoS One</source>  
        <year>2013</year>  
        <volume>8</volume>  
        <issue>6</issue>  
        <fpage>e65772</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0065772"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0065772</pub-id>
        <pub-id pub-id-type="medline">23776544</pub-id>
        <pub-id pub-id-type="pii">PONE-D-13-00075</pub-id>
        <pub-id pub-id-type="pmcid">PMC3680423</pub-id></nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Free</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Phillips</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Galli</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Watson</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Felix</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Edwards</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Patel</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Haines</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>The effectiveness of mobile-health technology-based health behaviour change or disease management interventions for health care consumers: a systematic review</article-title>
        <source>PLoS Med</source>  
        <year>2013</year>  
        <volume>10</volume>  
        <issue>1</issue>  
        <fpage>e1001362</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pmed.1001362"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pmed.1001362</pub-id>
        <pub-id pub-id-type="medline">23349621</pub-id>
        <pub-id pub-id-type="pii">PMEDICINE-D-12-00520</pub-id>
        <pub-id pub-id-type="pmcid">PMC3548655</pub-id></nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ashar</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Lewis</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Blazes</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Chretien</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Applying information and communications technologies to collect health data from remote settings: a systematic assessment of current technologies</article-title>
        <source>J Biomed Inform</source>  
        <year>2010</year>  
        <month>04</month>  
        <volume>43</volume>  
        <issue>2</issue>  
        <fpage>332</fpage>  
        <lpage>41</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(09)00155-5"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2009.11.009</pub-id>
        <pub-id pub-id-type="medline">19961957</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(09)00155-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Boulos</surname>
            <given-names>MG</given-names>
          </name>
          <name name-style="western">
            <surname>Wheeler</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Tavares</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Jones</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX</article-title>
        <source>Biomed Eng Online</source>  
        <year>2011</year>  
        <month>04</month>  
        <day>5</day>  
        <volume>10</volume>  
        <fpage>24</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://biomedical-engineering-online.biomedcentral.com/articles/10.1186/1475-925X-10-24"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1475-925X-10-24</pub-id>
        <pub-id pub-id-type="medline">21466669</pub-id>
        <pub-id pub-id-type="pii">1475-925X-10-24</pub-id>
        <pub-id pub-id-type="pmcid">PMC3080339</pub-id></nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bryce</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Fraser</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions</article-title>
        <source>Comput Human Behav</source>  
        <year>2014</year>  
        <month>01</month>  
        <volume>30</volume>  
        <fpage>299</fpage>  
        <lpage>306</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.chb.2013.09.012</pub-id></nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mirkovic</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>DUO Research Archive</source>  
        <year>2012</year>  
        <month>1</month>  
        <access-date>2019-01-31</access-date>
        <comment>Usability, security and mobility for mobile devices in healthcare information systems
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.duo.uio.no/handle/10852/35700">https://www.duo.uio.no/handle/10852/35700</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75qGL5XjE"/></comment> </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Becker</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Understanding users' health information privacy concerns for health wearables</article-title>
        <source>Proceedings of the 51st Hawaii International Conference on System Sciences</source>  
        <year>2018</year>  
        <conf-name>HCISS 2018</conf-name>
        <conf-date>January 3-6, 2018</conf-date>
        <conf-loc>Hawaii, USA</conf-loc>
        <fpage>3261</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarspace.manoa.hawaii.edu/bitstream/10125/50301/1/paper0414.pdf"/>
        </comment>  
        <pub-id pub-id-type="doi">10.24251/hicss.2018.413</pub-id></nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gefen</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Karahanna</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Straub</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Trust and TAM in online shopping: an integrated model</article-title>
        <source>MIS Q</source>  
        <year>2003</year>  
        <volume>27</volume>  
        <issue>1</issue>  
        <fpage>90</fpage>  
        <pub-id pub-id-type="doi">10.2307/30036519</pub-id></nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>DJ</given-names>
          </name>
          <name name-style="western">
            <surname>Ferrin</surname>
            <given-names>DL</given-names>
          </name>
          <name name-style="western">
            <surname>Rao</surname>
            <given-names>HR</given-names>
          </name>
        </person-group>
        <article-title>A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents</article-title>
        <source>Decis Support Syst</source>  
        <year>2008</year>  
        <month>01</month>  
        <volume>44</volume>  
        <issue>2</issue>  
        <fpage>544</fpage>  
        <lpage>64</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.dss.2007.07.001</pub-id></nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tene</surname>
            <given-names>O</given-names>
          </name>
          <name name-style="western">
            <surname>Polonetsky</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>Stanford Law Review</source>  
        <year>2010</year>  
        <access-date>2019-01-31</access-date>
        <comment>Privacy in the age of big data: a time for big decisions
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.stanfordlawreview.org/online/privacy-paradox-privacy-and-big-data/">https://www.stanfordlawreview.org/online/privacy-paradox-privacy-and-big-data/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75qLo5lC9"/></comment> </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Barkuhus</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Dey</surname>
            <given-names>AD</given-names>
          </name>
        </person-group>
        <article-title>Location-Based Services for Mobile Telephony: A Study of Users' Privacy Concerns</article-title>
        <year>2003</year>  
        <conf-name>IFIP TC13 International Conference on Human-Computer Interaction</conf-name>
        <conf-date>September 1-5, 2003</conf-date>
        <conf-loc>Zurich, Switzerland</conf-loc>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.10.527&amp;rep=rep1&amp;type=pdf"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>FD</given-names>
          </name>
        </person-group>
        <article-title>A theoretical extension of the technology acceptance model: four longitudinal field studies</article-title>
        <source>Manage Sci</source>  
        <year>2000</year>  
        <month>02</month>  
        <volume>46</volume>  
        <issue>2</issue>  
        <fpage>186</fpage>  
        <lpage>204</lpage>  
        <pub-id pub-id-type="doi">10.1287/mnsc.46.2.186.11926</pub-id></nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Morris</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>User acceptance of information technology: toward a unified view</article-title>
        <source>MIS Q</source>  
        <year>2003</year>  
        <volume>27</volume>  
        <issue>1</issue>  
        <fpage>18</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://canvas.utwente.nl/courses/1550/files/136468/download?verifier...wrap=1"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2307/30036540</pub-id></nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="web">
        <source>Canadian Institute for Health Information</source>  
        <year>2014</year>  
        <access-date>2019-01-31</access-date>
        <comment>National Health Expenditure Trends, 1975 to 2014
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.cihi.ca/web/resource/en/nhex_2014_report_en.pdf">http://www.cihi.ca/web/resource/en/nhex_2014_report_en.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75qCdxf6C"/></comment> </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="web">
        <source>Pew Research Center</source>  
        <year>2018</year>  
        <access-date>2018-11-02</access-date>
        <comment>Mobile Fact Sheet Internet
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.pewinternet.org/fact-sheet/mobile/">http://www.pewinternet.org/fact-sheet/mobile/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="73dV8SG8t"/></comment> </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
