<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v6i12e39947</article-id>
      <article-id pub-id-type="pmid">36515996</article-id>
      <article-id pub-id-type="doi">10.2196/39947</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Theoretical Approach and Scale Construction of Patient Privacy Protection Behavior of Doctors in Public Medical Institutions in China: Pilot Development Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Roguljić</surname>
            <given-names>Marija</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Fung</surname>
            <given-names>Sai-fu</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Xu</surname>
            <given-names>Jie</given-names>
          </name>
          <degrees>MPhil</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Shanghai Artificial Intelligence Laboratory</institution>
            <institution>West Bank International Artificial Intelligence Center</institution>
            <addr-line>701 Yunjin Road</addr-line>
            <addr-line>Shanghai, 200030</addr-line>
            <country>China</country>
            <phone>86 021 23537800</phone>
            <email>xujie@pjlab.org.cn</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9233-4363</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>Lu</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8834-1947</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Xing</surname>
            <given-names>Kaichen</given-names>
          </name>
          <degrees>BA</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1972-8379</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Shi</surname>
            <given-names>Huwei</given-names>
          </name>
          <degrees>MM</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6510-2153</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>Ruiyao</given-names>
          </name>
          <degrees>MEng</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2011-5556</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Yao</surname>
            <given-names>Yujun</given-names>
          </name>
          <degrees>MEng</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3526-341X</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Sichen</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3890-8941</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author">
          <name name-style="western">
            <surname>Xiao</surname>
            <given-names>Zhongzhou</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8423-1356</ext-link>
        </contrib>
        <contrib id="contrib9" contrib-type="author">
          <name name-style="western">
            <surname>Peng</surname>
            <given-names>Xinwei</given-names>
          </name>
          <degrees>MM</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9868-0136</ext-link>
        </contrib>
        <contrib id="contrib10" contrib-type="author">
          <name name-style="western">
            <surname>Luo</surname>
            <given-names>Shuqing</given-names>
          </name>
          <degrees>BM</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4872-3315</ext-link>
        </contrib>
        <contrib id="contrib11" contrib-type="author">
          <name name-style="western">
            <surname>Zhong</surname>
            <given-names>Yun</given-names>
          </name>
          <degrees>BBA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4572-4427</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Shanghai Artificial Intelligence Laboratory</institution>
        <institution>West Bank International Artificial Intelligence Center</institution>
        <addr-line>Shanghai</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Université de Montpellier</institution>
        <addr-line>Montpellier</addr-line>
        <country>France</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Jie Xu <email>xujie@pjlab.org.cn</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>12</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>14</day>
        <month>12</month>
        <year>2022</year>
      </pub-date>
      <volume>6</volume>
      <issue>12</issue>
      <elocation-id>e39947</elocation-id>
      <history>
        <date date-type="received">
          <day>29</day>
          <month>5</month>
          <year>2022</year>
        </date>
        <date date-type="rev-request">
          <day>1</day>
          <month>11</month>
          <year>2022</year>
        </date>
        <date date-type="rev-recd">
          <day>9</day>
          <month>11</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>21</day>
          <month>11</month>
          <year>2022</year>
        </date>
      </history>
      <copyright-statement>©Jie Xu, Lu Lu, Kaichen Xing, Huwei Shi, Ruiyao Chen, Yujun Yao, Sichen Liu, Zhongzhou Xiao, Xinwei Peng, Shuqing Luo, Yun Zhong. Originally published in JMIR Formative Research (https://formative.jmir.org), 14.12.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2022/12/e39947" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Considering the high incidence of medical privacy disclosure, it is of vital importance to study doctors’ privacy protection behavior and its influencing factors.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>We aim to develop a scale for doctors’ protection of patients’ privacy in Chinese public medical institutions, following construction of a theoretical model framework through grounded theory, and subsequently to validate the scale to measure this protection behavior.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Combined with the theoretical paradigm of protection motivation theory (PMT) and semistructured interview data, the grounded theory research method, followed by the Delphi expert and group discussion methods, a theoretical framework and initial scale for doctors in Chinese public medical institutions to protect patients' privacy was formed. The adjusted scale was collected online using a WeChat electronic survey measured using a 5-point Likert scale. Exploratory and confirmatory factor analysis (EFA and CFA) and tests to analyze reliability and validity were performed on the sample data. SPSS 19.0 and Amos 26.0 statistical analysis software were used for EFA and CFA of the sample data, respectively.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>According to the internal logic of PMT, we developed a novel theoretical framework of a “storyline,” which was a process from being unaware of patients' privacy to having privacy protection behavior, that affected doctors' cognitive intermediary and changed the development of doctors' awareness, finally affecting actual privacy protection behavior in Chinese public medical institutions. Ultimately, we created a scale to measure 18 variables in the theoretical model, comprising 63 measurement items, with a total of 208 doctors participating in the scaling survey, who were predominantly educated to the master’s degree level (n=151, 72.6%). The department distribution was relatively balanced. Prior to EFA, the Kaiser-Meyer-Olkin (KMO) value was 0.702, indicating that the study was suitable for factor analysis. The minimum value of Cronbach <italic>α</italic> for each study variable was .754, which met the internal consistency requirements of the scale. The standard factor loading value of each potential measurement item in CFA had scores greater than 0.5, which signified that all the items in the scale could effectively converge to the corresponding potential variables.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The theoretical framework and scale to assess doctors' patient protection behavior in public medical institutions in China ﬁlls a significant gap in the literature and can be used to further the current knowledge of physicians’ thought processes and adoption decisions.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>scale</kwd>
        <kwd>Chinese public medical institutions</kwd>
        <kwd>doctors’ protection behavior of patients’ privacy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Privacy disclosure [<xref ref-type="bibr" rid="ref1">1</xref>] refers to the release, transfer, access, or disclosure of information in any way to an individual or group outside of the entity holding the information. According to a Verizon data disclosure survey, the medical industry is the only industry with an internal threat higher than an external threat, considering that a significant number of medical data leaks are associated with internal medical staff [<xref ref-type="bibr" rid="ref2">2</xref>]. The high incidence of medical data [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref5">5</xref>] and patient information leakages may cause patient identity violations [<xref ref-type="bibr" rid="ref6">6</xref>] and financial losses [<xref ref-type="bibr" rid="ref7">7</xref>], alongside potentially more severe social effects. Currently, in China, organizations at all levels regulate the privacy protection behavior of medical staff by publishing relevant policies and setting privacy protection requirements for medical staff [<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>]. Generally, hospitals also have privacy disclosure restrictions medical practitioners must adhere to for patient privacy protection. However, even with multiple patient privacy protection requirements, the leakage of patient privacy remains frequent. Unfortunately, as those with direct contact with medical information, the negligence or improper behavior of doctors has become 1 of the primary reasons for this [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. Therefore, it is vital to study doctors' privacy protection behavior in the hospital setting. Public medical institutions, which are government interventions in the medical market, are of universal significance worldwide. They provide inexpensive welfare services for the public rather than high-priced private medical services. Current studies focus on the primary influencing factors affecting doctors' motivation to comply with data protection [<xref ref-type="bibr" rid="ref13">13</xref>], the influencing factors of electronic medical record (EMR) privacy protection by doctors [<xref ref-type="bibr" rid="ref7">7</xref>], and the reaction mechanism of doctors toward patients' privacy protection requirements [<xref ref-type="bibr" rid="ref14">14</xref>]. Furthermore, personal factors, including age, gender, educational background, professional title, working years, position, and understanding of laws and regulations [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>], alongside environmental factors, such as a strict patient privacy protection system, systematic training, sufficient materials for patient privacy protection, and demonstrations by managers [<xref ref-type="bibr" rid="ref17">17</xref>], all had an impact on doctors' privacy protection behavior toward patients. Currently, research into the privacy protection behavior of doctors, including the factors that influence behavior and intention, remains insufficient. Similarly, a theoretical basis and measurement scale of patient privacy protection behavior of doctors in public medical institutions in China are yet to be formed.</p>
        <p>Consequently, this study aims to use the method of grounded theory to construct a theoretical model framework of the patient privacy protection behavior of doctors in public medical institutions in China. The measurement items of each variable were defined in combination with the results of coding analysis. The measurement scale was created, and the data were analyzed by exploratory factor analysis (EFA) and confirmatory factor analysis (CFA).</p>
      </sec>
      <sec>
        <title>Theory</title>
        <p>Noar [<xref ref-type="bibr" rid="ref18">18</xref>] proposed that the selection of a theoretical framework requires comparisons of multiple theoretical frameworks. The theory of planned behavior [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref19">19</xref>], protection motivation theory (PMT) [<xref ref-type="bibr" rid="ref20">20</xref>], and the Health Belief Model [<xref ref-type="bibr" rid="ref7">7</xref>] are often included in the theoretical basis of privacy protection. Comparison of these 3 theories shows that for the privacy protection behavior of doctors, fear of negativity is an important motivation for behavior change. Threat appraisal (TA), coping appraisal (CA), social norms (SN), and ethical personal characteristics are supposed to influence the development of doctors' awareness of the protection of patient privacy, thus leading to modifications in the actual behavior of doctors. The criteria for designating the theoretical framework were the related behavioral theories adopted by the current studies on privacy protection, followed by domestic and international studies on the influence factors of health care workers’ privacy protection behavior, in which the main influence factors should be contained in the selected dimensions. Based on the fear of negativity, the privacy protection behavior of doctors in public medical institutions in China alters the motivation of protection behavior through obtaining relevant cognitive information and thus affects the individual’s protection behavior. Consequently, the framework of PMT is in line with the theoretical paradigm of this study. PMT was developed using Health Belief Model by Rogers et al [<xref ref-type="bibr" rid="ref21">21</xref>] in 1975. The factors affecting health-related behavior include perceived severity (PSE), perceived susceptibility (PSU), self-efficacy (SE), and response cost (RC), in addition to the object's perceived intrinsic rewards (IRE) and extrinsic rewards (ERE) [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. However, patients’ privacy protection by doctors in public medical institutions in China is the otherness behavior of non-right holders. The effect of social norms, attitudes, personal characteristics, and other factors on behavioral intentions are not considered in PMT. The mechanism of privacy protection by public medical institution doctors in China is yet to be fully explored. Exploratory research was required to construct a theoretical model of this study.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Theoretical Construction</title>
        <p>Considering the practical problem of how to promote the protection of patients' privacy in public medical institutions in China, we used the the theoretical paradigm of PMT. Through theoretical sampling, we selected representative interviewees and subsequently interviewed them using a semistructured interview. The interview period spanned from January 25 to February 25, 2022, which was a total of 32 days. The original data of grounded theory coding analysis was generated from the interviews. Subsequently, program-based grounded theory [<xref ref-type="bibr" rid="ref24">24</xref>] was used to analyze the coding based on the original interview data and refine the scope of the study, alongside discussing the logical relationship between them and building the theoretical model framework [<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref27">27</xref>].</p>
      </sec>
      <sec>
        <title>Scale Design and Optimization</title>
        <p>Drawing on the methodology for scale development proposed by Churchill [<xref ref-type="bibr" rid="ref28">28</xref>], a scale was designed based on the 3 principles of content, function, and overall uniformity. The process of scale construction is shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>. Combined with the coding analysis results of the grounded theory method in the previous section, the key concept of interviews from the records of public medical institution doctors in China were extracted and the measurement items of the variables in this study were processed and separated. Regarding the initial scale, we had to make some adjustments to the items of the scale following the Delphi method [<xref ref-type="bibr" rid="ref29">29</xref>] and a group discussion, including merging and deleting items with similar meanings in the scale, merging and adjusting items with an inclusion relationship, and adjusting the wording to ensure the semantic readability was concise and that the sentences were easy to understand to prevent misunderstandings.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>A Consolidated Standards of Reporting Trials (CONSORT) table of the process of the scale construction derived from Churchill's scale development.</p>
          </caption>
          <graphic xlink:href="formative_v6i12e39947_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Sample Preparation</title>
        <p>The criteria for recruitment of doctors to be interviewed were as follows: (1) serving public medical institutions in China, (2) definition of “doctors” corresponding to the indicators of the <italic>China Health Statistical Yearbook</italic>, and (3) voluntary participation in this study. The survey adopted convenience and snowball sampling and was sent in the form of an electronic survey scale through WeChat. Data collection ran from April 1 to 25, 2022. In this study, the explicative items of threat, coping, support, and ethical appraisal were measured in the form of a 5-point Likert scale [<xref ref-type="bibr" rid="ref30">30</xref>]: 1=completely disagree, 2=disagree, 3=uncertain, 4=agree, and 5=fully agree. In addition, IRE, ERE, and RC were inversely assigned. The explained variables, such as consciousness formation, body privacy, information privacy, and related privacy, were measured and assigned “yes” or “no” using binary variables, corresponding to 1 or 0, respectively.</p>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>First, we conducted EFA, including a reliability evaluation using Cronbach <italic>α</italic>, which was the optimum method to evaluate the reliability of internal consistency. It is generally accepted that a Cronbach <italic>α</italic> score above .8 indicates excellent internal consistency, .6-.8 implies good consistency, and below .6 suggests poor internal consistency [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. To ensure that the items involved in the measurement comprehensively and accurately measured the corresponding variables, we used EFA to assess the content validity of the scale. Although EFA is not an accurate method to test theoretical assumptions, it allowed us to draw conclusions regarding the construct validity of the proposed scale [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Prior to EFA, the Kaiser-Meyer-Olkin (KMO) and Bartlett sphericity test was conducted on the scale to determine whether the scale is suitable for factor analysis. According to the judgment standard of KMO values, when the KMO value is above 0.6, the scale can be subject to factor analysis, while if it is above 0.8, the scale is suitable for factor analysis [<xref ref-type="bibr" rid="ref35">35</xref>]. The variance maximization rotation for principal component analysis of the measurement scale and the Kaiser normalization maximum variance method for rotation were used in the EFA of this study. The rotation was confirmed to have converged following 7 iterations. In this study, SPSS 19.0 statistical analysis software was used for EFA of the sample data.</p>
        <p>CFA was helpful to verify whether the subordinate relationship between the items in the scale and the extracted factors were correct or whether there were any wrong attributions to dimension problems [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. Concerning the CFA result, if the standardized factor load of the item is greater than 0.5, it is accepted that the item can converge to its corresponding latent variable. The maximum likelihood was used in the model estimation. The <italic>χ</italic><sup>2</sup> (<italic>df</italic>) value, the root-mean-square error of approximation (RMSEA), the standardized root-mean-square residual (SRMR), the Tucker-Lewis index (TLI), and the comparative ﬁt index (CFI) were calculated to evaluate the model ﬁt [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. A model with good ﬁt is achieved if <italic>χ</italic><sup>2</sup> (<italic>df</italic>) is lower than 3 [<xref ref-type="bibr" rid="ref40">40</xref>]. An RMSEA value below 0.05 indicates that the model is good [<xref ref-type="bibr" rid="ref40">40</xref>]. SRMR values below 0.1 suggest that the model is acceptable [<xref ref-type="bibr" rid="ref41">41</xref>]. The CFI and TLI values should be greater than 0.95 [<xref ref-type="bibr" rid="ref42">42</xref>]. In addition, we evaluated the reliability of the scale by calculating the comprehensive reliability score [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>] and analyzed both the convergence and discrimination effectiveness by comparing the average variance extracted (AVE) and the square correlation value [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. If the variance of potential structure interpretation is greater than the variance according to measurement error (if the AVE value is higher than 0.5), the convergence effectiveness is clear [<xref ref-type="bibr" rid="ref46">46</xref>]. If the AVE value is greater than the square correlation value, the discrimination effectiveness is obvious [<xref ref-type="bibr" rid="ref46">46</xref>]. In conclusion, aggregate validity and discriminant validity are powerful indicators of structural validity [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref47">47</xref>]. Throughout this research, Amos 26.0 statistical analysis software was used for CFA of the samples.</p>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>Survey recipients were informed that participation was anonymous and voluntary, that all responses would be kept confidential, and that the collected data would be used for academic research only. The survey was approved by the Institutional Review Board at Huadong Sanatorium (approval no. (2022)13 of the Ethic Committee), and all participants provided written informed consent.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Theoretical Model</title>
        <p>In total, 26 public medical institution doctors in China were selected, 10 (38.5%) of whom had personal, in-depth interviews, while the remaining 16 (61.5%) had 2 online focus group interviews according to their time arrangement. Finally, we obtained 12 interview records of over 50,000 words. Based on coding analysis and the theoretical saturation test, the results are detailed in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. According to the internal logic of PMT, the cognitive intermediary of doctors in public medical institutions in China regarding patient privacy protection would affect the doctors' behavior by altering the development of their awareness of the protection of patient privacy. The protection of patients’ privacy under the awareness of public medical institutions would lead to modifications in the actual behavior of doctors. Consequently, in this study, we considered doctors in public medical institutions in China to move through a process, from being unaware of patients' privacy to having privacy protection behavior. We regarded that this process affected doctors' cognitive intermediary and changed the development of their awareness of patients' privacy protection in public medical institutions in China in order to affect actual privacy protection behavior. According to the logical relationship of this “storyline,” we developed a novel theoretical framework, which is the theoretical model framework of the mechanism of doctors' protection of patients' privacy in public medical institutions in China, as illustrated in <xref rid="figure2" ref-type="fig">Figure 2</xref>.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The theoretical model framework of doctors' privacy protection behavior for patients in public medical institutions in China.</p>
          </caption>
          <graphic xlink:href="formative_v6i12e39947_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Optimization of the Initial Scale</title>
        <p>The results of the initial scale are displayed in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>. A total of 15 items were corrected. Following the aforementioned correction and adjustment of measurement items, an initial scale to measure 18 direct measurement variables in the theoretical model of doctors' behavior mechanism of protecting patients' privacy in public medical institutions in China was formed. This also included 63 measurement items, which were coded. <xref ref-type="table" rid="table1">Tables 1</xref>-<xref ref-type="table" rid="table5">5</xref> illustrates the specific codes and corresponding measurement items.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Item setting of the initial scale for TA<sup>a</sup>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="70"/>
            <col width="900"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Variable and code</td>
                <td>Item</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>PSE<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE1</td>
                <td>I think it is very serious and dangerous that the disclosure of patient privacy information will incur punishment by laws and regulations.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE2</td>
                <td>I think it is very serious and dangerous that the disclosure of patient privacy information will protect patients' rights and deepen the contradiction between doctors and patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE3</td>
                <td>I think it is very serious and dangerous that the disclosure of patient privacy information will incur punishment according to the hospital standard system.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PSU<sup>c</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU1</td>
                <td>I think that laws and regulations pay increasing attention to the protection of patients' privacy and have the tendency to make mandatory punishment measures for privacy disclosure.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU2</td>
                <td>I think that patients’ awareness of protecting rights is progressively becoming stronger, and the protection of personal privacy is paid increasing attention. The leakage of patient privacy will further deepen the contradiction between doctors and patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU3</td>
                <td>I think hospitals pay increasing attention to the privacy protection of patients, and the standards and systems will be more and more rigorous, and privacy disclosure incidents will be punishable.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>IRE<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE1</td>
                <td>I think that the disclosure of patients' privacy can be exchanged for certain financial returns.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE2</td>
                <td>I think it is inevitable that patient privacy will be leaked in the process of scientific research output.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE3</td>
                <td>I think meeting celebrities or attending new events at work will ‘get out’ on personal social platforms.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>ERE<sup>e</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE1</td>
                <td>I've heard about the exchange of property through patient privacy information.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE2</td>
                <td>I hear that the easier it is for individuals or institutions to get patient data, the greater the output of scientific research.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE3</td>
                <td>I have heard that doctors have exposed some medical information or personal information about celebrities and related people on social platforms.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>TA: threat appraisal.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>PSE: perceived severity.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>PSU: perceived susceptibility.</p>
            </fn>
            <fn id="table1fn4">
              <p><sup>d</sup>IRE: intrinsic rewards.</p>
            </fn>
            <fn id="table1fn5">
              <p><sup>e</sup>ERE: extrinsic rewards.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Item setting of the initial scale for CA<sup>a</sup>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="70"/>
            <col width="0"/>
            <col width="900"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variable and code</td>
                <td>Item</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>SE<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE1</td>
                <td colspan="2">I think it's easy for me to protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE2</td>
                <td colspan="2">I think it's convenient for me to protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE3</td>
                <td colspan="2">I have the ability to protect the privacy of patients from being disclosed.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>RE<sup>c</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE1</td>
                <td colspan="2">I think the doctors' protection measures to ensure the privacy of patients can effectively prevent the leakage of patients' privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE2</td>
                <td colspan="2">I think the privacy protection measures of doctors can keep patients' privacy in a safe environment.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE3</td>
                <td colspan="2">I think the privacy protection measures of doctors for patients can better protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>RC<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC1</td>
                <td colspan="2">I think that paying attention to the protection of patients' privacy will affect the output of my overall scientific research results.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC2</td>
                <td colspan="2">I think that paying attention to the privacy protection of patients will affect the development and efficiency of my clinical work and teaching.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC3</td>
                <td colspan="2">I think that paying attention to the privacy protection of patients will increase my work pressure.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>CA: coping appraisal.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>SE: self-efficacy.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>RE: response efficacy.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>RC: response cost.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Item setting of the initial scale for SA<sup>a</sup>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="70"/>
            <col width="0"/>
            <col width="900"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variable and code</td>
                <td>Item</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>SS<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS1</td>
                <td colspan="2">I think the protection of patients' privacy needs the full-time supervision and management of a hospital department.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS2</td>
                <td colspan="2">I think it is necessary for the hospital to regularly organize training and assessment according to the laws and regulations related to patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS3</td>
                <td colspan="2">I think it is necessary for the hospital to regularly organize training and assessment for the hospital system related to patient privacy protection and other contents related to patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>IS<sup>c</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS1</td>
                <td colspan="2">I think it is necessary to use information technology, artificial intelligence, and other technologies to improve the information construction level of hospitals for patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS2</td>
                <td colspan="2">I think it is necessary to carry out reasonable authority management on the information system to protect the patient's private information.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS3</td>
                <td colspan="2">I think it is necessary to impose reasonable data transmission restrictions on the information system to protect patients' private information.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>NS<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS1</td>
                <td colspan="2">I think it is necessary to build a patient privacy protection system and carry it out effectively to ensure the rationalization process of patient privacy protection in doctors' work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS2</td>
                <td colspan="2">I think it is necessary to combine the patient privacy protection system with the doctor's daily work, so that the doctor's behavior of protecting the patient's privacy becomes a daily aspect of the work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS3</td>
                <td colspan="2">I think it is necessary to formulate a reasonable scientific research application system and conduct scientific research efficiently on the basis of legal and compliant patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>ES<sup>e</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES1</td>
                <td colspan="2">I think improving the medical environment (such as independent consulting room, sound insulation treatment of consulting room) can better protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES2</td>
                <td colspan="2">I think it is necessary to maintain the order of medical treatment (for example, prevent irrelevant patients from gathering in the consulting room), which can better protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES3</td>
                <td colspan="2">I think facilities that provide patient privacy protection (such as curtains and privacy processing of bedside card information) can better protect patient privacy.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>SA: support appraisal.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>SS: supervision support.</p>
            </fn>
            <fn id="table3fn3">
              <p><sup>c</sup>IS: information support.</p>
            </fn>
            <fn id="table3fn4">
              <p><sup>d</sup>NS: norm support.</p>
            </fn>
            <fn id="table3fn5">
              <p><sup>e</sup>ES: environment support.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Item setting of the initial scale for EA<sup>a</sup>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="70"/>
            <col width="0"/>
            <col width="900"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variable and code</td>
                <td>Item</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>RS<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS1</td>
                <td colspan="2">I think it is the duty of doctors to protect patients' privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS2</td>
                <td colspan="2">I believe that doctors should protect patients' privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS3</td>
                <td colspan="2">I think my sense of responsibility urges me to protect patients' privacy in my daily work.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>PM<sup>c</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM1</td>
                <td colspan="2">I think doctors' protection of patients' privacy is a requirement of their own professional ethics.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM2</td>
                <td colspan="2">I think my sense of professional ethics urges me to protect patients' privacy in my daily work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM3</td>
                <td colspan="2">From education to work, the protection of patients' private information is a professional ethic repeatedly emphasized by doctors.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>EH<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH1</td>
                <td colspan="2">I think doctors should consider the harm of privacy information disclosure from the perspective of patients, to become more aware of protecting the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH2</td>
                <td colspan="2">I have had a personal information disclosure experience as a patient, so I am more aware of protecting the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH3</td>
                <td colspan="2">I think that I can ‘push myself to others’ to protect my patients' privacy in my daily work.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>EA: ethical appraisal.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>RS: responsibility.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>PM: professional moral.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>EH: empathy heart.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Item setting of the initial scale for CF<sup>a</sup>, BP<sup>b</sup>, IP<sup>c</sup>, and RP<sup>d</sup>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="70"/>
            <col width="0"/>
            <col width="900"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variable and code</td>
                <td>Item</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>CF</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF1</td>
                <td colspan="2">I think I have developed a sense of privacy protection in my clinical work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF2</td>
                <td colspan="2">I think I have formed a sense of privacy protection in my teaching.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF3</td>
                <td colspan="2">I think I have formed a sense of privacy protection in my own research work.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>BP</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP1</td>
                <td colspan="2">Protect the patient's privacy during surgery or examination, such as curtain pulling and preventing a third party from breaking in.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP2</td>
                <td colspan="2">Effectively block the privacy of patients during live operations.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP3</td>
                <td colspan="2">Medical observation or teaching requires the consent of the patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP4</td>
                <td colspan="2">No illegal touch or peek at the patient's privacy.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>IP</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP1</td>
                <td colspan="2">In the situations of outpatient, ward check, case discussion, medical education and observation, the patient shall obtain the consent of the patient himself and take confidentiality measures. The privacy information of the patient shall not be publicized or publicly discussed orally, including the personal information and disease information with identifiable characteristics, such as avoiding calling the full name of the patient loudly, avoiding ‘listening’ or ‘breaking in’ by people other than patients without the consent of the patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP2</td>
                <td colspan="2">In the face of the condition inquiry, strictly confirm and ask the status of the patient’s condition personnel, confirm as me or with my consent.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP3</td>
                <td colspan="2">For patients with special conditions (for example infectious diseases involving privacy), it is necessary to talk to the patients individually.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP4</td>
                <td colspan="2">Deliberately disclose and disseminate the privacy of patients without using their duties, such as taking the bedside card test sheets of celebrities to the internet.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP5</td>
                <td colspan="2">Protect medical documents such as inspection and medical records without random placing, damage, loss, and prevent theft and being wrongly picked up.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP6</td>
                <td colspan="2">Under the unnecessary diagnosis and treatment process, without the consent of the patient, the medical documents shall not be checked, copied, or borrowed during the hospitalization of the patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP7</td>
                <td colspan="2">Use personal information system account number as required, and login to view patient information without borrowing non-authorised people.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP8</td>
                <td colspan="2">Not disclose the privacy information of the patient for any benefit reasons to obtain business, advertise or defraud.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP9</td>
                <td colspan="2">When leaving the office seat, protect the pages with patient privacy information and lock the screen of the computer.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP10</td>
                <td colspan="2">Scientific research, including the mining of electronic medical record information, whether it is the steps of data acquisition, viewing, processing or analysis, is strictly done to de privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP11</td>
                <td colspan="2">In the form of talks or written (case discussion, writing medical treatises, scientific research papers), for example, when communicating and learning on medical social network platform to share typical cases, do well in privacy treatment.</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>RP</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP1</td>
                <td colspan="2">Do not disclose information about family members and other personal relationships of any patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP2</td>
                <td colspan="2">Do not disclose family members and other personal relationship information of any patient on social platforms.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP3</td>
                <td colspan="2">Do not verbally promote or publicly discuss family members and other personal relationship information of any patient.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table5fn1">
              <p><sup>a</sup>CF: consciousness formation.</p>
            </fn>
            <fn id="table5fn2">
              <p><sup>b</sup>BP: body privacy.</p>
            </fn>
            <fn id="table5fn3">
              <p><sup>c</sup>IP: information privacy.</p>
            </fn>
            <fn id="table5fn4">
              <p><sup>d</sup>RP: related privacy.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Descriptive Analysis Results</title>
        <p>The survey we issued was scanned a total of 278 times, and 208 valid questionnaires were identified following recovery; thus, the effective recovery rate was 74.8%. The gender ratio of men to women was relatively balanced, with 46.6% (n=97) of the participants being men. The majority of the respondents were 26-35 years old, accounting for 63.9% (n=133) of the total sample. The respondents were predominantly educated to the master’s degree level, accounting for 72.6% (n=151), which was consistent with the general education background of doctors. The department distribution was relatively balanced. Regarding urban distribution, Shanghai accounted for the highest proportion (n=131, 63.0%) due to convenience sampling. The detailed characteristics of the pretest samples are displayed in <xref ref-type="table" rid="table6">Table 6</xref>.</p>
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Statistical results of sample characteristics.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="620"/>
            <col width="0"/>
            <col width="350"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Sample characteristics and measurement items</td>
                <td>Sample size (N=208), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Gender</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td colspan="2">97 (46.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td colspan="2">111 (53.4)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Age (years)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>18-25</td>
                <td colspan="2">9 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>26-35</td>
                <td colspan="2">133 (63.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>36-50</td>
                <td colspan="2">61 (29.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#62;50</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Educational background</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Undergraduate</td>
                <td colspan="2">41 (19.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Master</td>
                <td colspan="2">151 (72.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Doctor</td>
                <td colspan="2">16 (7.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Department</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Otorhinolaryngology</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Infectious diseases</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Pulmonology</td>
                <td colspan="2">16 (7.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Severe medicine</td>
                <td colspan="2">9 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Clinical laboratory</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Endocrinology</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Anesthesiology</td>
                <td colspan="2">24 (11.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Pediatrics</td>
                <td colspan="2">23 (11.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Internal medicine</td>
                <td colspan="2">23 (11.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Burns and plastic surgery</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Internal medicine: cardiovascular</td>
                <td colspan="2">16 (7.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Surgery</td>
                <td colspan="2">9 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Ophthalmology</td>
                <td colspan="2">9 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Medical service</td>
                <td colspan="2">9 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Imaging</td>
                <td colspan="2">18 (8.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Oncology</td>
                <td colspan="2">9 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Dental</td>
                <td colspan="2">18 (8.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>City</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Beijing</td>
                <td colspan="2">20 (9.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Changzhou, Jiangsu Province</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Huai'an, Jiangsu Province</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Nanjing, Jiangsu Province</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Nantong, Jiangsu Province</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Wuxi, Jiangsu Province</td>
                <td colspan="2">32 (15.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Zhenjiang, Jiangsu Province</td>
                <td colspan="2">5 (2.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Shanghai</td>
                <td colspan="2">131 (63.0)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Exploratory and Verifiable Analysis</title>
        <p>The Cronbach <italic>α</italic> of the whole scale was determined to be .768 by calculating the consistency coefficient of the scale, which was between 0.6 and 0.8, indicating that the scale possessed good internal consistency. According to the results illustrated in <xref ref-type="table" rid="table7">Table 7</xref>, the KMO value was greater than 0.6, indicating that the study is suitable for factor analysis, theoretically.</p>
        <p>Following the factor analysis operation, 18 common factors were screened. The cumulative interpretation total variance of factor analysis was 71.49%, implying that this research had good explanatory ability. The contribution of single-factor variance was less than 40%, demonstrating that this scale could exclude any possible homologous deviation [<xref ref-type="bibr" rid="ref48">48</xref>]. In general, this scale conformed to the preassumed theoretical structure and possessed good content validity. From the factor loading of each dimension, it was clear that the measurement items were independent of common factors, and the load was above 0.7, far greater than the standard of 0.4. Conversely, the absolute value of the load of the 18-factor measurement items on other factors was below 0.4. This indicates that the items of variables in this study could both effectively converge on their own common factors and effectively be different from other common factors. The minimum value of the Cronbach <italic>α</italic> for each study variable was .754; thus, the coefficients for each study variable were between 0.6 and 0.8, which met the internal consistency requirements of the scale. Consequently, the scale in this study could be considered to have good convergence validity and internal consistency [<xref ref-type="bibr" rid="ref49">49</xref>]. The results are stated in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
        <p>According to the fitting results of the model data in <xref ref-type="table" rid="table8">Table 8</xref>, most of the fitting indexes met the requirements of a critical value, indicating that the confirmatory factor model was well fit. According to the results of CFA in <xref ref-type="table" rid="table9">Table 9</xref>, the standard factor loading value of each potential measurement item in this study had scores greater than 0.5. The critical ratio (CR) values were greater than 7, and all had statistical significance levels within the range of <italic>P</italic>&#60;.001. All the composite reliability (CPR) values were greater than 0.7, and the value of AVE scores were in excess of 0.5. These indexes were in accordance with the standards, which signified that all the items in the scale can effectively converge to the corresponding potential variables. The data displayed in <xref ref-type="table" rid="table10">Table 10</xref> show that the value of the square root of the AVE of each variable was greater than 0.7. The score was significantly greater than the correlation value of the row and column in which it was located, namely the value below the diagonal. This demonstrated that there were significant differences among variables and confirmed that the scale in this study has good discriminative validity.</p>
        <table-wrap position="float" id="table7">
          <label>Table 7</label>
          <caption>
            <p>Results of KMO<sup>a</sup> and Bartlett sphericity test.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="400"/>
            <col width="0"/>
            <col width="570"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variable</td>
                <td>Value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">KMO metric for sufficient sampling</td>
                <td>0.702</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Bartlett sphericity test</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Approximate <italic>χ</italic><sup>2</sup> (<italic>df</italic>)</td>
                <td colspan="2">6130.640 (1953)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Significance</td>
                <td colspan="2">0.000</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table7fn1">
              <p><sup>a</sup>KMO: Kaiser-Meyer-Olkin.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table8">
          <label>Table 8</label>
          <caption>
            <p>Judgment of fitting indexes of the CFA<sup>a</sup> model.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="240"/>
            <col width="200"/>
            <col width="260"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Model fitting index</td>
                <td>Critical value</td>
                <td>Model fitting index value</td>
                <td>Model fit judgment</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td><italic>χ</italic><sup>2</sup>/<italic>df</italic></td>
                <td>&#60;3</td>
                <td>1.138</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>RMSEA<sup>b</sup></td>
                <td>&#60;0.08</td>
                <td>0.026</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>SRMR<sup>c</sup></td>
                <td>&#60;0.1</td>
                <td>0.0474</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>CFI<sup>d</sup></td>
                <td>&#62;0.95</td>
                <td>0.951</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>TLI<sup>e</sup></td>
                <td>＞0.95</td>
                <td>0.945</td>
                <td> Yes</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table8fn1">
              <p><sup>a</sup>CFA: confirmatory factor analysis.</p>
            </fn>
            <fn id="table8fn2">
              <p><sup>b</sup>RMSEA: root-mean-square error of approximation.</p>
            </fn>
            <fn id="table8fn3">
              <p><sup>c</sup>SRMR: standardized root-mean-square residual.</p>
            </fn>
            <fn id="table8fn4">
              <p><sup>d</sup>CFI: comparative fit index.</p>
            </fn>
            <fn id="table8fn5">
              <p><sup>e</sup>TLI: Tucker-Lewis index.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table9">
          <label>Table 9</label>
          <caption>
            <p>Results of validation factor analysis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="250"/>
            <col width="210"/>
            <col width="140"/>
            <col width="140"/>
            <col width="230"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Variable and item</td>
                <td>Standard factor load</td>
                <td>SE</td>
                <td>CR<sup>a</sup></td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="6">
                  <bold>PSE<sup>b</sup> (AVE<sup>c</sup>=0.301, CPR<sup>d</sup>=0.819)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE1</td>
                <td>0.760</td>
                <td>N/A<sup>e</sup></td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE2</td>
                <td>0.794</td>
                <td>0.095</td>
                <td>9.997</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE3</td>
                <td>0.771</td>
                <td>0.095</td>
                <td>9.869</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>PSU<sup>f</sup> (AVE=0.580, CPR=0.805)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU1</td>
                <td>0.720</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU2</td>
                <td>0.752</td>
                <td>0.112</td>
                <td>9.199</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU3</td>
                <td>0.810</td>
                <td>0.119</td>
                <td>9.454</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>IRE<sup>g</sup> (AVE=0.567, CPR=0.797)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE1</td>
                <td>0.778</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE2</td>
                <td>0.708</td>
                <td>0.101</td>
                <td>8.951</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE3</td>
                <td>0.770</td>
                <td>0.130</td>
                <td>9.341</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>ERE<sup>h</sup> (AVE=0.541, CPR=0.780)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE1</td>
                <td>0.706</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE2</td>
                <td>0.747</td>
                <td>0.149</td>
                <td>8.513</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE3</td>
                <td>0.753</td>
                <td>0.133</td>
                <td>8.535</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>SE<sup>i</sup> (AVE=0.603, CPR=0.819)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE1</td>
                <td>0.697</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE2</td>
                <td>0.841</td>
                <td>0.122</td>
                <td>9.699</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE3</td>
                <td>0.784</td>
                <td>0.111</td>
                <td>9.515</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>RE<sup>j</sup> (AVE=0.569, CPR=0.798)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE1</td>
                <td>0.799</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE2</td>
                <td>0.792</td>
                <td>0.110</td>
                <td>9.441</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE3</td>
                <td>0.665</td>
                <td>0.100</td>
                <td>8.641</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>RC<sup>k</sup> (AVE=0.567, CPR=0.796)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC1</td>
                <td>0.702</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC2</td>
                <td>0.731</td>
                <td>0.137</td>
                <td>8.753</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC3</td>
                <td>0.820</td>
                <td>0.145</td>
                <td>9.048</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>SS<sup>l</sup> (AVE=0.532, CPR=0.773)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS1</td>
                <td>0.719</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS2</td>
                <td>0.769</td>
                <td>0.132</td>
                <td>8.670</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS3</td>
                <td>0.699</td>
                <td>0.125</td>
                <td>8.290</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>IS<sup>m</sup> (AVE=0.568, CPR=0.797)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS1</td>
                <td>0.719</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS2</td>
                <td>0.783</td>
                <td>0.118</td>
                <td>9.266</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS3</td>
                <td>0.757</td>
                <td>0.108</td>
                <td>9.124</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>NS<sup>n</sup> (AVE=0.586, CPR=0.809)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS1</td>
                <td>0.770</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS2</td>
                <td>0.768</td>
                <td>0.104</td>
                <td>9.694</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS3</td>
                <td>0.758</td>
                <td>0.100</td>
                <td>9.630</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>ES<sup>o</sup> (AVE=0.567, CPR=0.797)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES1</td>
                <td>0.768</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES2</td>
                <td>0.737</td>
                <td>0.098</td>
                <td>9.329</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES3</td>
                <td>0.753</td>
                <td>0.095</td>
                <td>9.448</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>RS<sup>p</sup> (AVE=0.547, CPR=0.784)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS1</td>
                <td>0.719</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS2</td>
                <td>0.770</td>
                <td>0.108</td>
                <td>8.685</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS3</td>
                <td>0.729</td>
                <td>0.120</td>
                <td>8.524</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>PM<sup>q</sup> (AVE=0.545, CPR=0.782)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM1</td>
                <td>0.695</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM2</td>
                <td>0.776</td>
                <td>0.131</td>
                <td>8.427</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM3</td>
                <td>0.742</td>
                <td>0.122</td>
                <td>8.350</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>EH<sup>r</sup> (AVE=0.539, CPR=0.778)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH1</td>
                <td>0.722</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH2</td>
                <td>0.748</td>
                <td>0.094</td>
                <td>8.471</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH3</td>
                <td>0.732</td>
                <td>0.097</td>
                <td>8.407</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>CF<sup>s</sup> (AVE=0.513, CPR=0.757)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF1</td>
                <td>0.801</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF2</td>
                <td>0.610</td>
                <td>0.10</td>
                <td>7.074</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF3</td>
                <td>0.724</td>
                <td>0.122</td>
                <td>7.480</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>BP<sup>t</sup> (AVE=0.552, CPR=0.831)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP1</td>
                <td>0.701</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP2</td>
                <td>0.736</td>
                <td>0.111</td>
                <td>9.072</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP3</td>
                <td>0.792</td>
                <td>0.119</td>
                <td>9.539</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP4</td>
                <td>0.740</td>
                <td>0.116</td>
                <td>9.110</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>IP<sup>u</sup> (AVE=0.532, CPR=0.926)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP1</td>
                <td>0.743</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP2</td>
                <td>0.718</td>
                <td>0.094</td>
                <td>10.391</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP3</td>
                <td>0.717</td>
                <td>0.094</td>
                <td>10.381</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP4</td>
                <td>0.723</td>
                <td>0.094</td>
                <td>10.468</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP5</td>
                <td>0.744</td>
                <td>0.090</td>
                <td>10.796</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP6</td>
                <td>0.806</td>
                <td>0.095</td>
                <td>11.802</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP7</td>
                <td>0.733</td>
                <td>0.094</td>
                <td>10.632</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP8</td>
                <td>0.67</td>
                <td>0.091</td>
                <td>9.703</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP9</td>
                <td>0.765</td>
                <td>0.091</td>
                <td>11.136</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP10</td>
                <td>0.704</td>
                <td>0.093</td>
                <td>10.171</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP11</td>
                <td>0.689</td>
                <td>0.089</td>
                <td>9.942</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>RP<sup>v</sup> (AVE=0.574, CPR=0.802)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP1</td>
                <td>0.736</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP2</td>
                <td>0.781</td>
                <td>0.116</td>
                <td>9.043</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP3</td>
                <td>0.756</td>
                <td>0.110</td>
                <td>8.984</td>
                <td>&#60;.001</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table9fn1">
              <p><sup>a</sup>CR: critical ratio.</p>
            </fn>
            <fn id="table9fn2">
              <p><sup>b</sup>PSE: perceived severity.</p>
            </fn>
            <fn id="table9fn3">
              <p><sup>c</sup>AVE: average variance extracted.</p>
            </fn>
            <fn id="table9fn4">
              <p><sup>d</sup>CPR: composite reliability.</p>
            </fn>
            <fn id="table9fn5">
              <p><sup>e</sup>N/A: not applicable.</p>
            </fn>
            <fn id="table9fn6">
              <p><sup>f</sup>PSU: perceived susceptibility.</p>
            </fn>
            <fn id="table9fn7">
              <p><sup>g</sup>IRE: intrinsic rewards.</p>
            </fn>
            <fn id="table9fn8">
              <p><sup>h</sup>ERE: extrinsic rewards.</p>
            </fn>
            <fn id="table9fn9">
              <p><sup>i</sup>SE: self-efficacy.</p>
            </fn>
            <fn id="table9fn10">
              <p><sup>j</sup>RE: response efficacy.</p>
            </fn>
            <fn id="table9fn11">
              <p><sup>k</sup>RC: response cost.</p>
            </fn>
            <fn id="table9fn12">
              <p><sup>l</sup>SS: supervision support.</p>
            </fn>
            <fn id="table9fn13">
              <p><sup>m</sup>IS: information support.</p>
            </fn>
            <fn id="table9fn14">
              <p><sup>n</sup>NS: norm support.</p>
            </fn>
            <fn id="table9fn15">
              <p><sup>o</sup>ES: environment support.</p>
            </fn>
            <fn id="table9fn16">
              <p><sup>p</sup>RS: responsibility.</p>
            </fn>
            <fn id="table9fn17">
              <p><sup>q</sup>PM: professional moral.</p>
            </fn>
            <fn id="table9fn18">
              <p><sup>r</sup>EH: empathy heart.</p>
            </fn>
            <fn id="table9fn19">
              <p><sup>s</sup>CF: consciousness formation.</p>
            </fn>
            <fn id="table9fn20">
              <p><sup>t</sup>BP: body privacy.</p>
            </fn>
            <fn id="table9fn21">
              <p><sup>u</sup>IP: information privacy.</p>
            </fn>
            <fn id="table9fn22">
              <p><sup>v</sup>RP: related privacy.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table10">
          <label>Table 10</label>
          <caption>
            <p>Results of validity test.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="60"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <col width="50"/>
            <thead>
              <tr valign="top">
                <td>Variables</td>
                <td>RP<sup>a</sup></td>
                <td>IP<sup>b</sup></td>
                <td>BP<sup>c</sup></td>
                <td>CF<sup>d</sup></td>
                <td>EH<sup>e</sup></td>
                <td>PM<sup>f</sup></td>
                <td>RS<sup>g</sup></td>
                <td>ES<sup>h</sup></td>
                <td>NS<sup>i</sup></td>
                <td>IS<sup>j</sup></td>
                <td>SS<sup>k</sup></td>
                <td>RC<sup>l</sup></td>
                <td>RE<sup>m</sup></td>
                <td>SE<sup>n</sup></td>
                <td>ERE<sup>o</sup></td>
                <td>IRE<sup>p</sup></td>
                <td>PSU<sup>q</sup></td>
                <td>PSE<sup>r</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>RP</td>
                <td>
                  <italic>0.758<sup>s</sup></italic>
                </td>
                <td>N/A<sup>t</sup></td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>IP</td>
                <td>0.046</td>
                <td>
                  <italic>0.730<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>BP</td>
                <td>–0.145</td>
                <td>0.015</td>
                <td>
                  <italic>0.743<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>CF</td>
                <td>–0.110</td>
                <td>–0.069</td>
                <td>0.045</td>
                <td>
                  <italic>0.716<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>EH</td>
                <td>0.010</td>
                <td>–0.006</td>
                <td>0.105</td>
                <td>–0.001</td>
                <td>
                  <italic>0.734<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>PM</td>
                <td>–0.021</td>
                <td>0.079</td>
                <td>–0.029</td>
                <td>–0.041</td>
                <td>0.336</td>
                <td>
                  <italic>0.738<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>RS</td>
                <td>0.058</td>
                <td>–0.038</td>
                <td>0.034</td>
                <td>–0.034</td>
                <td>0.436</td>
                <td>0.357</td>
                <td>
                  <italic>0.740<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>ES</td>
                <td>0.066</td>
                <td>0.044</td>
                <td>–0.026</td>
                <td>–0.027</td>
                <td>–0.062</td>
                <td>–0.032</td>
                <td>–0.056</td>
                <td>
                  <italic>0.753<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>NS</td>
                <td>–0.036</td>
                <td>–0.010</td>
                <td>–0.047</td>
                <td>–0.053</td>
                <td>–0.107</td>
                <td>0.028</td>
                <td>–0.116</td>
                <td>0.425</td>
                <td>
                  <italic>0.765<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>IS</td>
                <td>–0.104</td>
                <td>–0.012</td>
                <td>0.047</td>
                <td>–0.154</td>
                <td>0.055</td>
                <td>0.002</td>
                <td>–0.013</td>
                <td>0.489</td>
                <td>0.408</td>
                <td>
                  <italic>0.753<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>SS</td>
                <td>0.008</td>
                <td>–0.019</td>
                <td>–0.009</td>
                <td>–0.014</td>
                <td>–0.075</td>
                <td>0.038</td>
                <td>–0.160</td>
                <td>0.482</td>
                <td>0.396</td>
                <td>0.451</td>
                <td>
                  <italic>0.730<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>RC</td>
                <td>–0.073</td>
                <td>–0.010</td>
                <td>0.062</td>
                <td>0.025</td>
                <td>–0.021</td>
                <td>0.035</td>
                <td>0.060</td>
                <td>–0.054</td>
                <td>0.060</td>
                <td>–0.013</td>
                <td>0.008</td>
                <td>
                  <italic>0.753<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>RE</td>
                <td>–0.056</td>
                <td>0.053</td>
                <td>0.035</td>
                <td>0.011</td>
                <td>–0.041</td>
                <td>0.027</td>
                <td>0.009</td>
                <td>–0.017</td>
                <td>0.108</td>
                <td>0.058</td>
                <td>0.104</td>
                <td>0.355</td>
                <td>
                  <italic>0.755<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>SE</td>
                <td>–0.046</td>
                <td>0.005</td>
                <td>–0.012</td>
                <td>–0.043</td>
                <td>0.013</td>
                <td>0.078</td>
                <td>–0.014</td>
                <td>–0.051</td>
                <td>0.001</td>
                <td>0.038</td>
                <td>0.112</td>
                <td>0.458</td>
                <td>0.350</td>
                <td>
                  <italic>0.776<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>ERE</td>
                <td>0.043</td>
                <td>0.012</td>
                <td>0.106</td>
                <td>–0.068</td>
                <td>0.039</td>
                <td>0.053</td>
                <td>0.076</td>
                <td>0.014</td>
                <td>–0.020</td>
                <td>0.028</td>
                <td>–0.001</td>
                <td>–0.022</td>
                <td>0.001</td>
                <td>–0.080</td>
                <td>
                  <italic>0.736<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>IRE</td>
                <td>0.049</td>
                <td>0.068</td>
                <td>0.103</td>
                <td>0.071</td>
                <td>–0.017</td>
                <td>0.083</td>
                <td>–0.021</td>
                <td>0.060</td>
                <td>0.035</td>
                <td>0.007</td>
                <td>0.076</td>
                <td>–0.029</td>
                <td>0.010</td>
                <td>–0.124</td>
                <td>0.392</td>
                <td>
                  <italic>0.753<sup>s</sup></italic>
                </td>
                <td>N/A</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>PSU</td>
                <td>0.118</td>
                <td>0.017</td>
                <td>0.066</td>
                <td>–0.002</td>
                <td>–0.081</td>
                <td>0.056</td>
                <td>0.002</td>
                <td>–0.003</td>
                <td>–0.028</td>
                <td>0.023</td>
                <td>–0.065</td>
                <td>0.030</td>
                <td>0.079</td>
                <td>–0.041</td>
                <td>0.438</td>
                <td>0.369</td>
                <td>
                  <italic>0.762<sup>s</sup></italic>
                </td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>PSE</td>
                <td>0.108</td>
                <td>0.050</td>
                <td>0.060</td>
                <td>–0.032</td>
                <td>–0.071</td>
                <td>0.047</td>
                <td>0.008</td>
                <td>–0.008</td>
                <td>0.001</td>
                <td>–0.014</td>
                <td>0.028</td>
                <td>0.030</td>
                <td>0.020</td>
                <td>0.036</td>
                <td>0.395</td>
                <td>0.335</td>
                <td>0.372</td>
                <td>
                  <italic>0.775<sup>s</sup></italic>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table10fn1">
              <p><sup>a</sup>RP: related privacy.</p>
            </fn>
            <fn id="table10fn2">
              <p><sup>b</sup>IP: information privacy.</p>
            </fn>
            <fn id="table10fn3">
              <p><sup>c</sup>BP: body privacy.</p>
            </fn>
            <fn id="table10fn4">
              <p><sup>d</sup>CF: consciousness formation.</p>
            </fn>
            <fn id="table10fn5">
              <p><sup>e</sup>EH: empathy heart.</p>
            </fn>
            <fn id="table10fn6">
              <p><sup>f</sup>PM: professional moral.</p>
            </fn>
            <fn id="table10fn7">
              <p><sup>g</sup>RS: responsibility.</p>
            </fn>
            <fn id="table10fn8">
              <p><sup>h</sup>ES: environment support.</p>
            </fn>
            <fn id="table10fn9">
              <p><sup>i</sup>NS: norm support.</p>
            </fn>
            <fn id="table10fn10">
              <p><sup>j</sup>IS: information support.</p>
            </fn>
            <fn id="table10fn11">
              <p><sup>k</sup>SS: supervision support.</p>
            </fn>
            <fn id="table10fn12">
              <p><sup>l</sup>RC: response cost.</p>
            </fn>
            <fn id="table10fn13">
              <p><sup>m</sup>RE: response efficacy.</p>
            </fn>
            <fn id="table10fn14">
              <p><sup>n</sup>SE: self-efficacy.</p>
            </fn>
            <fn id="table10fn15">
              <p><sup>o</sup>ERE: extrinsic rewards.</p>
            </fn>
            <fn id="table10fn16">
              <p><sup>p</sup>IRE: intrinsic rewards.</p>
            </fn>
            <fn id="table10fn17">
              <p><sup>q</sup>PSU: perceived susceptibility.</p>
            </fn>
            <fn id="table10fn18">
              <p><sup>r</sup>PSE: perceived severity.</p>
            </fn>
            <fn id="table10fn19">
              <p><sup>s</sup>Italicized values are significant.</p>
            </fn>
            <fn id="table10fn20">
              <p><sup>t</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Scale Determination</title>
        <p>We ultimately designed a scale with high reliability and validity and a correct subordination structure between factors. The scale determined 63 measurement items around 18 direct measurement variables in the theoretical model of this study to create a formal scale for this study. The specific contents are illustrated in <xref ref-type="table" rid="table11">Table 11</xref>.</p>
        <table-wrap position="float" id="table11">
          <label>Table 11</label>
          <caption>
            <p>Measurement items of the formal scale of this study.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="120"/>
            <col width="850"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Variable and code</td>
                <td>Measurement item</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>PSE<sup>a</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE1</td>
                <td>I think it is very serious and dangerous that the disclosure of patient privacy information will incur punishment by laws and regulations.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE2</td>
                <td>I think it is very serious and dangerous that the disclosure of patient privacy information will protect patients' rights and deepen the contradiction between doctors and patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSE3</td>
                <td>I think it is very serious and dangerous that the disclosure of patient privacy information will incur punishment according to the hospital standard system.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PSU<sup>b</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU1</td>
                <td>I think that laws and regulations pay increasing attention to the protection of patients' privacy and have the tendency to make mandatory punishment measures for privacy disclosure.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU2</td>
                <td>I think that patients’ awareness of protecting rights is progressively becoming stronger, and the protection of personal privacy is paid increasing attention. The leakage of patient privacy will further deepen the contradiction between doctors and patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PSU3</td>
                <td>I think hospitals pay increasing attention to the privacy protection of patients, and the standards and systems will be more and more rigorous, and privacy disclosure incidents will be punishable.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>IRE<sup>c</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE1</td>
                <td>I think that the disclosure of patients' privacy can be exchanged for certain financial returns.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE2</td>
                <td>I think it is inevitable that patient privacy will be leaked in the process of scientific research output.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IRE3</td>
                <td>I think meeting celebrities or attending new events at work will ‘get out’ on personal social platforms.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>ERE<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE1</td>
                <td>I've heard about the exchange of property through patient privacy information.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE2</td>
                <td>I hear that the easier it is for individuals or institutions to get patient data, the greater the output of scientific research.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ERE3</td>
                <td>I have heard that doctors have exposed some medical information or personal information about celebrities and related people on social platforms.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>SE<sup>e</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE1</td>
                <td>I think it's easy for me to protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE2</td>
                <td>I think it's convenient for me to protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SE3</td>
                <td>I have the ability to protect the privacy of patients from being disclosed.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>RE<sup>f</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE1</td>
                <td>I think the doctors' protection measures to ensure the privacy of patients can effectively prevent the leakage of patients' privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE2</td>
                <td>I think the privacy protection measures of doctors can keep patients' privacy in a safe environment.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RE3</td>
                <td>I think the privacy protection measures of doctors for patients can better protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>RC<sup>g</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC1</td>
                <td>I think that paying attention to the protection of patients' privacy will affect the output of my overall scientific research results.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC2</td>
                <td>I think that paying attention to the privacy protection of patients will affect the development and efficiency of my clinical work and teaching.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RC3</td>
                <td>I think that paying attention to the privacy protection of patients will increase my work pressure.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>SS<sup>h</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS1</td>
                <td>I think the protection of patients' privacy needs the full-time supervision and management of a hospital department.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS2</td>
                <td>I think it is necessary for the hospital to regularly organize training and assessment according to the laws and regulations related to patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>SS3</td>
                <td>I think it is necessary for the hospital to regularly organize training and assessment for the hospital system related to patient privacy protection and other contents related to patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>IS<sup>i</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS1</td>
                <td>I think it is necessary to use information technology, artificial intelligence, and other technologies to improve the information construction level of hospitals for patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS2</td>
                <td>I think it is necessary to carry out reasonable authority management on the information system to protect the patient's private information.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IS3</td>
                <td>I think it is necessary to impose reasonable data transmission restrictions on the information system to protect patients’ private information.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>NS<sup>j</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS1</td>
                <td>I think it is necessary to build a patient privacy protection system and carry it out effectively to ensure the rationalization process of patient privacy protection in doctors' work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS2</td>
                <td>I think it is necessary to combine the patient privacy protection system with the doctor's daily work, so that the doctor's behavior of protecting the patient's privacy becomes a daily aspect of the work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>NS3</td>
                <td>I think it is necessary to formulate a reasonable scientific research application system and conduct scientific research efficiently on the basis of legal and compliant patient privacy protection.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>ES<sup>k</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES1</td>
                <td>I think improving the medical environment (such as independent consulting room, sound insulation treatment of consulting room) can better protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES2</td>
                <td>I think it is necessary to maintain the order of medical treatment (for example, prevent irrelevant patients from gathering in the consulting room), which can better protect the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>ES3</td>
                <td>I think facilities that provide patient privacy protection (such as curtains and privacy processing of bedside card information) can better protect patient privacy.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>RS<sup>l</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS1</td>
                <td>I think it is the duty of doctors to protect patients' privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS2</td>
                <td>I believe that doctors should protect patients' privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RS3</td>
                <td>I think my sense of responsibility urges me to protect patients' privacy in my daily work.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>PM<sup>m</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM1</td>
                <td>I think doctors' protection of patients' privacy is a requirement of their own professional ethics.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM2</td>
                <td>I think my sense of professional ethics urges me to protect patients' privacy in my daily work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>PM3</td>
                <td>From education to work, the protection of patients' private information is a professional ethic repeatedly emphasized by doctors.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>EH<sup>n</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH1</td>
                <td>I think doctors should consider the harm of privacy information disclosure from the perspective of patients, to become more aware of protecting the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH2</td>
                <td>I have had a personal information disclosure experience as a patient, so I am more aware of protecting the privacy of patients.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>EH3</td>
                <td>I think that I can ‘push myself to others’ to protect my patients' privacy in my daily work.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>CF<sup>o</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF1</td>
                <td>I think I have developed a sense of privacy protection in my clinical work.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF2</td>
                <td>I think I have formed a sense of privacy protection in my teaching.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>CF3</td>
                <td>I think I have formed a sense of privacy protection in my own research work.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>BP<sup>p</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP1</td>
                <td>Protect the patient's privacy during surgery or examination, such as curtain pulling and preventing a third party from breaking in.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP2</td>
                <td>Effectively block the privacy of patients during live operations.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP3</td>
                <td>Medical observation or teaching requires the consent of the patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>BP4</td>
                <td>No illegal touch or peek at the patient's privacy.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>IP<sup>q</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP1</td>
                <td>In the situations of outpatient, ward check, case discussion, medical education and observation, the patient shall obtain the consent of the patient himself and take confidentiality measures. The privacy information of the patient shall not be publicized or publicly discussed orally, including the personal information and disease information with identifiable characteristics, such as avoiding calling the full name of the patient loudly, avoiding ‘listening’ or ‘breaking in’ by people other than patients without the consent of the patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP2</td>
                <td>In the face of the condition inquiry, strictly confirm and ask the status of the patient’s condition personnel, confirm as me or with my consent.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP3</td>
                <td>For patients with special conditions (for example infectious diseases involving privacy), it is necessary to talk to the patients individually.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP4</td>
                <td>Deliberately disclose and disseminate the privacy of patients without using their duties, such as taking the bedside card test sheets of celebrities to the internet.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP5</td>
                <td>Protect medical documents such as inspection and medical records without random placing, damage, loss, and prevent theft and being wrongly picked up.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP6</td>
                <td>Under the unnecessary diagnosis and treatment process, without the consent of the patient, the medical documents shall not be checked, copied, or borrowed during the hospitalization of the patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP7</td>
                <td>Use personal information system account number as required, and login to view patient information without borrowing non-authorised people.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP8</td>
                <td>Not disclose the privacy information of the patient for any benefit reasons to obtain business, advertise or defraud.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP9</td>
                <td>When leaving the office seat, protect the pages with patient privacy information and lock the screen of the computer.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP10</td>
                <td>Scientific research, including the mining of electronic medical record information, whether it is the steps of data acquisition, viewing, processing or analysis, is strictly done to de privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>IP11</td>
                <td>In the form of talks or written (case discussion, writing medical treatises, scientific research papers), for example, when communicating and learning on medical social network platform to share typical cases, do well in privacy treatment.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>RP<sup>r</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP1</td>
                <td>Do not disclose information about family members and other personal relationships of any patient.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP2</td>
                <td>Do not disclose family members and other personal relationship information of any patient on social platforms.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>RP3</td>
                <td>Do not verbally promote or publicly discuss family members and other personal relationship information of any patient.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table11fn1">
              <p><sup>a</sup>PSE: pperceived severity.</p>
            </fn>
            <fn id="table11fn2">
              <p><sup>b</sup>PSU: perceived susceptibility.</p>
            </fn>
            <fn id="table11fn3">
              <p><sup>c</sup>IRE: intrinsic rewards.</p>
            </fn>
            <fn id="table11fn4">
              <p><sup>d</sup>ERE: extrinsic rewards.</p>
            </fn>
            <fn id="table11fn5">
              <p><sup>e</sup>SE: self-efficacy.</p>
            </fn>
            <fn id="table11fn6">
              <p><sup>f</sup>RE: response efficacy.</p>
            </fn>
            <fn id="table11fn7">
              <p><sup>g</sup>RC: response cost.</p>
            </fn>
            <fn id="table11fn8">
              <p><sup>h</sup>SS: supervision support.</p>
            </fn>
            <fn id="table11fn9">
              <p><sup>i</sup>IS: information support.</p>
            </fn>
            <fn id="table11fn10">
              <p><sup>j</sup>NS: norm support.</p>
            </fn>
            <fn id="table11fn11">
              <p><sup>k</sup>ES: environment support.</p>
            </fn>
            <fn id="table11fn12">
              <p><sup>l</sup>RS: responsibility.</p>
            </fn>
            <fn id="table11fn13">
              <p><sup>m</sup>PM: professional moral.</p>
            </fn>
            <fn id="table11fn14">
              <p><sup>n</sup>EH: empathy heart.</p>
            </fn>
            <fn id="table11fn15">
              <p><sup>o</sup>CF: consciousness formation.</p>
            </fn>
            <fn id="table11fn16">
              <p><sup>p</sup>BP: body privacy.</p>
            </fn>
            <fn id="table11fn17">
              <p><sup>q</sup>IP: information privacy.</p>
            </fn>
            <fn id="table11fn18">
              <p><sup>r</sup>RP: related privacy.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The results of both EFA and CFA revealed the development of awareness and the behavior of public medical institutions in China regarding patients’ privacy protection behavior, which could be measured by the scale proposed in this research. The scale consisted of 18 diverse dimensions, which were theoretically meaningful.</p>
        <p>We suggest that the threat assessment process involves 4 dimensions: PSE, PSU, IRE, and ERE. Rogers [<xref ref-type="bibr" rid="ref21">21</xref>] defines PSE as the judgment of the degree of harmfulness caused by a threat event. PSU refers to the probability of feeling as though a threat event will occur. IRE and ERE both represent the “benefits” introduced by considering hazard factors from the researcher’s own feelings and from the outside world, respectively [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. In this study, PSE included the punishments faced by doctors who disclosed patients’ private information in line with laws and regulations, in addition to the punishment related to hospital norms and the threat of patients’ rights protection. PSU includes the possibility of introducing laws and regulations to punish doctors for disclosing patients’ private information, the possibility of hospitals penalizing doctors for disclosing patients’ private information, and the possibility of patients safeguarding their own rights. IRE includes obtaining financial returns and scientific research achievements, in addition to satisfying vanity by divulging patients’ private information. ERE refers to information doctors hear from the outside world. CA is the assessment of doctors’ ability to protect patients’ privacy, including SE, RE, and RC [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Throughout this study, SE refers to doctors’ cognition regarding whether they are capable of protecting patients’ privacy. RE refers to the judgment of whether the privacy protection measures undertaken by doctors can protect patient information to an effective degree. RC refers to the cost that doctors are required to pay when taking protective actions, spanning the impact on scientific research and clinical work, that is, doctors’ protection of patients’ privacy will hinder their scientific research work or clinical work.</p>
        <p>PMT is used to explain the way in which individuals seek self-protection from a harmful or stressful life [<xref ref-type="bibr" rid="ref50">50</xref>]. Doctors do not protect patients’ privacy of their own accord. Based on the results of grounded theory, 2 cognitive evaluation processes applicable to this study are summarized: support evaluation and ethical evaluation. Various doctors in the interview revealed that, “…for clinical work, doctors are too busy to notice so much, if possible, hospitals should improve information construction and better protect patient information. In fact, we can make a proposition on how to protect patient privacy in the data flow process...” Throughout this study, support evaluation was predominantly in the context of hospitals. All aspects of hospital support are greatly significant for doctors to successfully carry out patient privacy protection, which can be summarized as SS, IS, NS, and ES. SS means that the hospital must designate a department to perform full-time supervision of patients' privacy protection by doctors, as well as providing training and assessments on privacy protection laws and regulations. IS refers to the improvement in the overall information construction of the hospital and ensuring the privacy and safety of patients are protected. NS includes the establishment and development of a patient privacy protection system, determining the privacy protection process and a reasonable scientific research application system, and carrying out scientific research efficiently on the basis of legal and compliant patient privacy protection. ES refers to improving the medical environment, maintaining the medical order, and providing facilities to prevent patient privacy leakage, for example, curtains, and privacy processing of bedside card information. EA means to analyze and extract relevant factors that promote doctors’ privacy protection behavior according to medical ethics, including RS, PM, and EH. Previous studies have demonstrated that to protect medical privacy, all medical staff who protect others have the responsibility to protect medical privacy. Responsibility ethics is a form of moral thinking that includes other thinking. The lack of moral quality in data application subjects is 1 of the primary subjective factors of anomie of data privacy ethics [<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. The original interview stated that “...the main responsibility of doctors is to treat and save patients...” In this study, RS determined that protecting patients’ privacy is both the doctor’s job and social responsibility. The medical ethics of doctors is mentioned in the norms and implementation measures for medical ethics of medical personnel, according to the Ministry of Health [<xref ref-type="bibr" rid="ref8">8</xref>] issued on December 15, 1988. It discusses the ideological qualities that medical personnel should possess and the sum of the relationship between medical personnel, patients, and society. The implication of medical ethics is to attempt to do everything within your means to be good for patients [<xref ref-type="bibr" rid="ref53">53</xref>]. “Keeping medical secrets for patients and not divulging patients’ privacy and secrets” is 1 of the provisions mentioned in the code of medical ethics. Similarly, the international code of medical ethics stipulates that “due to the trust of patients, a doctor must absolutely keep patients' privacy” [<xref ref-type="bibr" rid="ref54">54</xref>]. The original interview stated that “…for my own consideration of professional ethics, I try my best to protect patients’ privacy in clinical and scientific research work...” In this study, the protection of the privacy of patients is a requirement of the doctors’ PM. It is repeatedly emphasized that patients’ private information must be protected by doctors from the educational stage to the work stage. Empathy was first introduced to the field of psychology by the humanistic psychologist Rogers. This refers to an individual understanding of the experience and emotional state of others [<xref ref-type="bibr" rid="ref55">55</xref>]. Empathetic doctors will convey their understanding to patients [<xref ref-type="bibr" rid="ref56">56</xref>] and even map the patient’s experience, transforming the patient’s point of view to become a self-centered point of view [<xref ref-type="bibr" rid="ref57">57</xref>]. According to the analysis of the interview data, a conclusion of this study on empathy was formed, including that doctors can consider the harm of disclosing private information from the perspective of patients and the experience of privacy information disclosure when doctors are patients. Referring to the original text “…imagine that your information will be leaked, commercial and public. Isn't it terrible...do multi-centre research, and I especially emphasize whether the information is desensitized...lack of empathy to protect the patient’s privacy. It's different after thinking about yourself...”</p>
        <p>The motivation for protection in PMT has typical characteristics of motivation, which can cause, maintain, and guide activities. Generally, the results of cognitive assessment cause individuals to display greater intention of protective behavior [<xref ref-type="bibr" rid="ref58">58</xref>]. The concept of protection motivation, in combination with various research scenarios, has evolved into individual intentions of protection behavior, for example, the intention of hot-spring tourists to revisit [<xref ref-type="bibr" rid="ref59">59</xref>], the intention regarding self-care of elderly patients with chronic diseases [<xref ref-type="bibr" rid="ref60">60</xref>], and the intention of self-management of diabetic retinopathy [<xref ref-type="bibr" rid="ref61">61</xref>]. The original interview data discussed that “...the doctors’ work is too busy, and the awareness of patients’ privacy protection is not strong...” Throughout this study, the meaning of doctors’ motivation for patients’ privacy protection in public medical institutions in China is whether doctors develop an awareness of the importance of patient privacy protection.</p>
        <p>According to the results of the coding analysis, the privacy protection behavior of doctors includes protecting the private space of patients (BP), protecting the patients’ data (IP), and protecting family members and other personal relations (RP). The protection of BP refers to the protection of the patient’s body privacy by the doctor. Meanwhile, the protection of patient IP refers to the doctor’s protection of the patient’s information privacy. Finally, the protection of patient RP refers to the doctor’s protection of the patient’s associated privacy, including not disclosing or promoting the family members and other personal relationship information about any patient.</p>
        <p>Our interviews and scales were created with input from the expected target population, that is, Chinese medical institutions. EFA revealed a unified structure of factor loads without cross loads, allowing a clear interpretation of all potential configurations. CFA confirmed the structure of the scale, meaning the subordinate relationship between each item and the extracted factors was correct. The primary fitting indexes met the requirements of the critical value, and the fitting of CFA was acceptable. It is known that model ﬁt assessment is challenging, considering a small sample size [<xref ref-type="bibr" rid="ref42">42</xref>], and thus, we agree that further goodness-of-ﬁt assessments with a larger sample size will be necessary in future studies.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>This study was subject to various limitations. First, the sample size used was small. Although a general minimum sample size is yet to be deﬁned [<xref ref-type="bibr" rid="ref34">34</xref>], the authors recommended a sample size at least 5-10 times that of the items [<xref ref-type="bibr" rid="ref30">30</xref>]. Another limitation was the poor representativeness of samples. In the process of selecting interviewees, the feasibility of obtaining interview samples was considered. Due to the full nature of doctors’ schedules, it was challenging to coordinate a time and place, especially when conducting focus group interviews. Thus, the overall sampling was concentrated in East China. The scale survey was also predominantly based on the principle of convenience sampling, and the regions from which samples were taken mainly included East and North China. Considering the understanding of doctors’ privacy protection behavior by interviewees and respondents, hospitals in different regions have different norms and requirements for doctors’ privacy protection behavior, which would lead to a certain selection bias. In addition, doctors’ privacy protection for patients was not merely a problem of doctors’ behavior but was also due to hospital management. Furthermore, when doctors were interviewed, they might have reservations regarding their true ideas.</p>
      </sec>
      <sec>
        <title>Implications for Future Research</title>
        <p>First, we must sample public medical institutions across all 7 regions of China to further verify the reliability and validity of the scale and of doctors’ privacy protection behavior. Subsequently, under the influence of various cognitive mediating factors, doctors’ awareness of patient privacy protection will be affected, resulting in actual privacy protection behavior. The variables will be measured using the scale proposed in this research, and the key factors to promote doctors’ privacy protection behavior will be identified, with the aim of improving it from the perspective of management. In addition to the theoretical model factors, personal factors, including age, gender, educational background, professional title, religious belief, and working years, as well as the environmental policy factors of the region and department of hospitals, also affect doctors’ privacy protection behavior. Nevertheless, to gain additional insights into these relationships and the relative importance of different factors, further research including the scale is needed.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>The theoretical framework and the scale of doctors’ protective behavior of patients’ privacy in public medical institutions fill a crucial gap in the literature and can be used to further the current knowledge of physicians' thought processes and decisions regarding patients’ privacy protection.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>The coding results of qualitative research.</p>
        <media xlink:href="formative_v6i12e39947_app1.docx" xlink:title="DOCX File , 75 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>The overall cognitive intermediary measurement scale.</p>
        <media xlink:href="formative_v6i12e39947_app2.docx" xlink:title="DOCX File , 46 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Results of EFA. EFA: exploratory factor analysis.</p>
        <media xlink:href="formative_v6i12e39947_app3.docx" xlink:title="DOCX File , 39 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">BP</term>
          <def>
            <p>body privacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CA</term>
          <def>
            <p>coping appraisal</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">CF</term>
          <def>
            <p>consciousness formation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">CFA</term>
          <def>
            <p>confirmatory factor analysis</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">CFI</term>
          <def>
            <p>comparative ﬁt index</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">CPR</term>
          <def>
            <p>composite reliability</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">CR</term>
          <def>
            <p>critical ratio</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">EA</term>
          <def>
            <p>ethical appraisal</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">EFA</term>
          <def>
            <p>exploratory factor analysis</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">EH</term>
          <def>
            <p>empathy heart</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">ERE</term>
          <def>
            <p>extrinsic rewards</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">ES</term>
          <def>
            <p>environment support</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">IP</term>
          <def>
            <p>information privacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">IRE</term>
          <def>
            <p>intrinsic rewards</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb16">IS</term>
          <def>
            <p>information support</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb17">KMO</term>
          <def>
            <p>Kaiser-Meyer-Olkin</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb18">NS</term>
          <def>
            <p>norm support</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb19">PM</term>
          <def>
            <p>professional moral</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb20">PMT</term>
          <def>
            <p>protection motivation theory</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb21">PSE</term>
          <def>
            <p>perceived severity</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb22">PSU</term>
          <def>
            <p>perceived susceptibility</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb23">RC</term>
          <def>
            <p>response cost</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb24">RE</term>
          <def>
            <p>response efficacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb25">RMSEA</term>
          <def>
            <p>root-mean-square error of approximation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb26">RP</term>
          <def>
            <p>related privacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb27">RS</term>
          <def>
            <p>responsibility</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb28">SA</term>
          <def>
            <p>support appraisal</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb29">SE</term>
          <def>
            <p>self-efficacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb30">SRMR</term>
          <def>
            <p>standardized root-mean-square residual</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb31">SS</term>
          <def>
            <p>supervision support</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb32">TA</term>
          <def>
            <p>threat appraisal</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb33">TLI</term>
          <def>
            <p>Tucker-Lewis index</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kloss</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Brodnik</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rinehart-Thompson</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Access and disclosure of personal health information: a challenging privacy landscape in 2016-2018</article-title>
          <source>Yearb Med Inform</source>
          <year>2018</year>
          <month>08</month>
          <day>29</day>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>60</fpage>
          <lpage>66</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.thieme-connect.com/DOI/DOI?10.1055/s-0038-1667071"/>
          </comment>
          <pub-id pub-id-type="doi">10.1055/s-0038-1667071</pub-id>
          <pub-id pub-id-type="medline">30157506</pub-id>
          <pub-id pub-id-type="pmcid">PMC6115206</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Verizon</collab>
          </person-group>
          <source>2021 Data Breach Investigations Report</source>
          <access-date>2022-02-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.verizon.com/business/resources/reports/2021/2021-data-breach-investigations-report.pdf">https://www.verizon.com/business/resources/reports/2021/2021-data-breach-investigations-report.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ware</surname>
              <given-names>SG</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>Intentionality and conflict in the best laid plans interactive narrative virtual environment</article-title>
          <source>IEEE Trans Comput Intell AI Games</source>
          <year>2016</year>
          <month>12</month>
          <volume>8</volume>
          <issue>4</issue>
          <fpage>402</fpage>
          <lpage>411</lpage>
          <pub-id pub-id-type="doi">10.1109/tciaig.2015.2489159</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>SY</given-names>
            </name>
            <name name-style="western">
              <surname>Wenbin</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Investigation on the current situation and demand of patients' medical information privacy protection</article-title>
          <source>Chin J Hospital Manag</source>
          <year>2018</year>
          <volume>34</volume>
          <issue>1</issue>
          <fpage>4</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>PB</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Investigation on privacy status of emergency patients and analysis of influencing factors</article-title>
          <source>Chin J Modern Nurs</source>
          <year>2014</year>
          <volume>9</volume>
          <fpage>3</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hou</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Qian</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Xiaoqing</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lei</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Zhaorong</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yuxiu</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Ethical issues in the construction of health care big data</article-title>
          <source>J PLA Hospital Manag</source>
          <year>2020</year>
          <volume>27</volume>
          <issue>06</issue>
          <fpage>552</fpage>
          <lpage>554</lpage>
          <pub-id pub-id-type="doi">10.16770/J.cnki.1008-9985.2020.06.016</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Talley</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kuo</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments</article-title>
          <source>Health Inf Manag</source>
          <year>2017</year>
          <month>05</month>
          <day>04</day>
          <volume>46</volume>
          <issue>2</issue>
          <fpage>87</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1177/1833358316671264</pub-id>
          <pub-id pub-id-type="medline">27702792</pub-id>
          <pub-id pub-id-type="pii">1833358316671264</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Ministry of Health</collab>
          </person-group>
          <article-title>Norms and implementation measures of medical ethics of medical personnel</article-title>
          <source>Chin J Hospital Manag</source>
          <year>1989</year>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>8</fpage>
          <lpage>8</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>RL</given-names>
            </name>
          </person-group>
          <source>Medical Ethics (Vol 33)</source>
          <year>2003</year>
          <publisher-loc>Changsha, China</publisher-loc>
          <publisher-name>Central South University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>China PsGotpsRo</collab>
          </person-group>
          <source>Law of the People's Republic of China on Licensed Doctors (2005)</source>
          <access-date>2022-02-22</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.gov.cn/banshi/2005-08/01/content_18970.htm">http://www.gov.cn/banshi/2005-08/01/content_18970.htm</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sichun</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Meiping</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Survey and analysis on the current status of privacy preservation for urological patients</article-title>
          <source>J Tradit Chin Med Manag</source>
          <year>2015</year>
          <volume>23</volume>
          <issue>16</issue>
          <fpage>2</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jianjun</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yue</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ping</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Survey on awareness and protection of patient privacy among clinical trainees</article-title>
          <source>J Hospital Admin of PLA</source>
          <year>2020</year>
          <volume>27</volume>
          <issue>5</issue>
          <fpage>5</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Foth</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence</article-title>
          <source>EurJ Inf Syst</source>
          <year>2017</year>
          <month>12</month>
          <day>19</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>91</fpage>
          <lpage>109</lpage>
          <pub-id pub-id-type="doi">10.1057/ejis.2015.9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ting</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <source>Study on the Behavioral Mechanism of Medical Staff's Protection of Patients' Privacy</source>
          <year>2020</year>
          <publisher-loc>Dalian, China</publisher-loc>
          <publisher-name>Dalian University of Technology</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Analysis on the current situation and influencing factors of nurses' privacy protection behavior towards patients</article-title>
          <source>Nurs Manag China</source>
          <year>2018</year>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>6</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehua</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Rongmei</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Yuyang</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Investigation on nurses' cognition of privacy protection of electronic medical record</article-title>
          <source>China Health Admin</source>
          <year>2017</year>
          <volume>5</volume>
          <fpage>3</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jingya</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yawen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chunyan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Xia</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Study on the current situation and influencing factors of hemodialysis nurses' protection of patients' privacy</article-title>
          <source>J Nurs</source>
          <year>2019</year>
          <volume>34</volume>
          <issue>11</issue>
          <fpage>4</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noar</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>A health educator's guide to theories of health behavior</article-title>
          <source>Int Q Community Health Educ</source>
          <year>2005</year>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.2190/DALP-3F95-GCT3-M922</pub-id>
          <pub-id pub-id-type="medline">17690053</pub-id>
          <pub-id pub-id-type="pii">DALP3F95GCT3M922</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ho</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Lwin</surname>
              <given-names>MO</given-names>
            </name>
            <name name-style="western">
              <surname>Yee</surname>
              <given-names>AZ</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>EW</given-names>
            </name>
          </person-group>
          <article-title>Understanding factors associated with Singaporean adolescents' intention to adopt privacy protection behavior using an extended theory of planned behavior</article-title>
          <source>Cyberpsychol Behav Soc Netw</source>
          <year>2017</year>
          <month>09</month>
          <volume>20</volume>
          <issue>9</issue>
          <fpage>572</fpage>
          <lpage>579</lpage>
          <pub-id pub-id-type="doi">10.1089/cyber.2017.0061</pub-id>
          <pub-id pub-id-type="medline">28876967</pub-id>
          <pub-id pub-id-type="pii">10.1089/cyber.2017.0061</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Health information privacy concerns, antecedents, and information disclosure intention in online health communities</article-title>
          <source>Inf Manag</source>
          <year>2018</year>
          <month>06</month>
          <volume>55</volume>
          <issue>4</issue>
          <fpage>482</fpage>
          <lpage>493</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2017.11.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xiangyun</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Guiling</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Haixia</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Research progress of protection motivation theory and its application</article-title>
          <source>Chin J Modern Nurs</source>
          <year>2012</year>
          <volume>18</volume>
          <issue>4</issue>
          <fpage>3</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>A protection motivation theory of fear appeals and attitude change</article-title>
          <source>J Psychol</source>
          <year>1975</year>
          <month>09</month>
          <day>02</day>
          <volume>91</volume>
          <issue>1</issue>
          <fpage>93</fpage>
          <lpage>114</lpage>
          <pub-id pub-id-type="doi">10.1080/00223980.1975.9915803</pub-id>
          <pub-id pub-id-type="medline">28136248</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Prentice-Dunn</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Gochman</surname>
              <given-names>DS</given-names>
            </name>
          </person-group>
          <article-title>Protection motivation theory</article-title>
          <source>Handbook of Health Behavior Research 1: Personal and Social Determinants</source>
          <year>1997</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Plenum Press</publisher-name>
          <fpage>113</fpage>
          <lpage>132</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kenny</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fourie</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Contrasting classic, Straussian, and constructivist grounded theory: methodological and philosophical conflicts</article-title>
          <source>TQR</source>
          <year>2015</year>
          <month>8</month>
          <day>17</day>
          <volume>20</volume>
          <issue>8</issue>
          <fpage>1270</fpage>
          <lpage>1289</lpage>
          <pub-id pub-id-type="doi">10.46743/2160-3715/2015.2251</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eich</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>grounded theory of high-quality programs in higher education: perspectives from student leadership development programs in higher education</article-title>
          <source>J Leadersh Organ Stud</source>
          <year>2008</year>
          <month>06</month>
          <day>30</day>
          <volume>15</volume>
          <issue>2</issue>
          <fpage>176</fpage>
          <lpage>187</lpage>
          <pub-id pub-id-type="doi">10.1177/1548051808324099</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Anyuan</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <source>Research on the Influencing Factors and Mechanism of Psychological Contract Breach Based on Grounded Theory</source>
          <year>2015</year>
          <publisher-loc>Wuhan, China</publisher-loc>
          <publisher-name>Wuhan University</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yanbo</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yixue</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Conceptual model and operation mechanism of tourism market order: an exploratory study based on grounded theory</article-title>
          <source>Tourism Tribune</source>
          <year>2019</year>
          <volume>34</volume>
          <issue>5</issue>
          <fpage>14</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Churchill</surname>
              <given-names>GA</given-names>
            </name>
          </person-group>
          <article-title>A paradigm for developing better measures of marketing constructs</article-title>
          <source>J Mark Res</source>
          <year>2018</year>
          <month>11</month>
          <day>28</day>
          <volume>16</volume>
          <issue>1</issue>
          <fpage>64</fpage>
          <lpage>73</lpage>
          <pub-id pub-id-type="doi">10.1177/002224377901600110</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Côrte-Real</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ruivo</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Oliveira</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Popovič</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Unlocking the drivers of big data analytics value in firms</article-title>
          <source>J Bus Res</source>
          <year>2019</year>
          <month>04</month>
          <volume>97</volume>
          <fpage>160</fpage>
          <lpage>173</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2018.12.072</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Likert</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A technique for the measurement of attitudes</article-title>
          <source>Arch Psychol</source>
          <year>1932</year>
          <volume>22</volume>
          <fpage>140</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gliem</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gliem</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Calculating, interpreting, and reporting Cronbach's alpha reliability coefficient for Likert-type scales</article-title>
          <year>2003</year>
          <conf-name>Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education</conf-name>
          <conf-date>2003</conf-date>
          <conf-loc>Columbus, Ohio</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Bo</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The reliability and validity of the questionnaire and how to analyze it with SAS software</article-title>
          <source>China Health Stat</source>
          <year>2000</year>
          <volume>17</volume>
          <issue>6</issue>
          <fpage>364</fpage>
          <lpage>365</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Leary-Kelly</surname>
              <given-names>SW</given-names>
            </name>
            <name name-style="western">
              <surname>Vokurka</surname>
              <given-names>RJ</given-names>
            </name>
          </person-group>
          <article-title>The empirical assessment of construct validity</article-title>
          <source>J Oper Manag</source>
          <year>1998</year>
          <month>11</month>
          <day>25</day>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>387</fpage>
          <lpage>405</lpage>
          <pub-id pub-id-type="doi">10.1016/s0272-6963(98)00020-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Onsman</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Exploratory factor analysis: a five-step guide for novices</article-title>
          <source>Australas J Paramed</source>
          <year>2010</year>
          <month>08</month>
          <day>02</day>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.33151/ajp.8.3.93</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Steiger</surname>
              <given-names>JH</given-names>
            </name>
          </person-group>
          <article-title>Structural model evaluation and modification: an interval estimation approach</article-title>
          <source>Multivariate Behav Res</source>
          <year>1990</year>
          <month>04</month>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>173</fpage>
          <lpage>180</lpage>
          <pub-id pub-id-type="doi">10.1207/s15327906mbr2502_4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Qi</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wannian</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Qun</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Structural equation model and its application</article-title>
          <source>China Health Stat</source>
          <year>2004</year>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>70</fpage>
          <lpage>74</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bo</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Haiqiang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Jiping</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Structural equation model and its application</article-title>
          <source>China Health Stat</source>
          <year>2005</year>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>405</fpage>
          <lpage>407</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Gillaspy</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Purc-Stephenson</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Reporting practices in confirmatory factor analysis: an overview and some recommendations</article-title>
          <source>Psychol Methods</source>
          <year>2009</year>
          <month>03</month>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>6</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1037/a0014694</pub-id>
          <pub-id pub-id-type="medline">19271845</pub-id>
          <pub-id pub-id-type="pii">2009-02702-005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmitt</surname>
              <given-names>TA</given-names>
            </name>
          </person-group>
          <article-title>Current methodological considerations in exploratory and confirmatory factor analysis</article-title>
          <source>J Psychoeduc Assess</source>
          <year>2011</year>
          <month>08</month>
          <day>10</day>
          <volume>29</volume>
          <issue>4</issue>
          <fpage>304</fpage>
          <lpage>321</lpage>
          <pub-id pub-id-type="doi">10.1177/0734282911406653</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fabrigar</surname>
              <given-names>LR</given-names>
            </name>
            <name name-style="western">
              <surname>Wegener</surname>
              <given-names>DT</given-names>
            </name>
            <name name-style="western">
              <surname>MacCallum</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Strahan</surname>
              <given-names>EJ</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the use of exploratory factor analysis in psychological research</article-title>
          <source>Psychol Methods</source>
          <year>1999</year>
          <month>09</month>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>272</fpage>
          <lpage>299</lpage>
          <pub-id pub-id-type="doi">10.1037/1082-989x.4.3.272</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Worthington</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Whittaker</surname>
              <given-names>TA</given-names>
            </name>
          </person-group>
          <article-title>Scale development research: a content analysis and recommendations for best practices</article-title>
          <source>Counsel Psychol</source>
          <year>2016</year>
          <month>06</month>
          <day>30</day>
          <volume>34</volume>
          <issue>6</issue>
          <fpage>806</fpage>
          <lpage>838</lpage>
          <pub-id pub-id-type="doi">10.1177/0011000006288127</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bentler</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <article-title>Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives</article-title>
          <source>Struct Equ Modeling</source>
          <year>1999</year>
          <month>01</month>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1080/10705519909540118</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Geldhof</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Preacher</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Zyphur</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Reliability estimation in a multilevel confirmatory factor analysis framework</article-title>
          <source>Psychol Methods</source>
          <year>2014</year>
          <month>03</month>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>72</fpage>
          <lpage>91</lpage>
          <pub-id pub-id-type="doi">10.1037/a0032138</pub-id>
          <pub-id pub-id-type="medline">23646988</pub-id>
          <pub-id pub-id-type="pii">2013-15544-001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Werts</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Linn</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Jöreskog</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Intraclass reliability estimates: testing structural assumptions</article-title>
          <source>Educ Psychol Meas</source>
          <year>2016</year>
          <month>07</month>
          <day>02</day>
          <volume>34</volume>
          <issue>1</issue>
          <fpage>25</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1177/001316447403400104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DeVon</surname>
              <given-names>HA</given-names>
            </name>
            <name name-style="western">
              <surname>Block</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Moyle-Wright</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ernst</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Hayden</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Lazzara</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Savoy</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Kostas-Polston</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>A psychometric toolbox for testing validity and reliability</article-title>
          <source>J Nurs Scholarsh</source>
          <year>2007</year>
          <month>06</month>
          <volume>39</volume>
          <issue>2</issue>
          <fpage>155</fpage>
          <lpage>164</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1547-5069.2007.00161.x</pub-id>
          <pub-id pub-id-type="medline">17535316</pub-id>
          <pub-id pub-id-type="pii">JNU161</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bagozzi</surname>
              <given-names>RP</given-names>
            </name>
          </person-group>
          <article-title>Evaluating structural equation models with unobservable variables and measurement error: a comment</article-title>
          <source>J Mark Res</source>
          <year>1981</year>
          <month>08</month>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>375</fpage>
          <pub-id pub-id-type="doi">10.2307/3150979</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Daniel</surname>
              <given-names>LG</given-names>
            </name>
          </person-group>
          <article-title>Factor analytic evidence for the construct validity of scores: a historical overview and some guidelines</article-title>
          <source>Educ Psychol Meas</source>
          <year>2016</year>
          <month>07</month>
          <day>02</day>
          <volume>56</volume>
          <issue>2</issue>
          <fpage>197</fpage>
          <lpage>208</lpage>
          <pub-id pub-id-type="doi">10.1177/0013164496056002001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Podsakoff</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>MacKenzie</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Podsakoff</surname>
              <given-names>NP</given-names>
            </name>
          </person-group>
          <article-title>Common method biases in behavioral research: a critical review of the literature and recommended remedies</article-title>
          <source>J Appl Psychol</source>
          <year>2003</year>
          <month>10</month>
          <volume>88</volume>
          <issue>5</issue>
          <fpage>879</fpage>
          <lpage>903</lpage>
          <pub-id pub-id-type="doi">10.1037/0021-9010.88.5.879</pub-id>
          <pub-id pub-id-type="medline">14516251</pub-id>
          <pub-id pub-id-type="pii">2003-08045-010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ming Long</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <source>Statistical Analysis of Survey Practices: SPSS Operation and Application (Chinese Edition)</source>
          <year>2010</year>
          <publisher-loc>China</publisher-loc>
          <publisher-name>Chongqing University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maddux</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change</article-title>
          <source>J Exp Soc Psychol</source>
          <year>1983</year>
          <month>9</month>
          <volume>19</volume>
          <issue>5</issue>
          <fpage>469</fpage>
          <lpage>479</lpage>
          <pub-id pub-id-type="doi">10.1016/0022-1031(83)90023-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>KL</given-names>
            </name>
          </person-group>
          <article-title>Research on big data privacy ethics</article-title>
          <source>Stud Ethics</source>
          <year>2016</year>
          <volume>6</volume>
          <fpage>5</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chenglong</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Ethical analysis of privacy in the era of big data</article-title>
          <source>Popular Literature Art</source>
          <year>2021</year>
          <volume>4</volume>
          <fpage>215</fpage>
          <lpage>216</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nanshan</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Brief discussion on the connotation of medical ethics</article-title>
          <source>Chin Med Ethics</source>
          <year>2006</year>
          <volume>19</volume>
          <issue>3</issue>
          <fpage>3</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kun</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Brief discussion on medical confidentiality</article-title>
          <source>Chin Med Ethics</source>
          <year>1999</year>
          <volume>4</volume>
          <fpage>3</fpage>
          <pub-id pub-id-type="doi">10.1136/jme.10.1.3</pub-id>
          <pub-id pub-id-type="medline">6708061</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shamay-Tsoory</surname>
              <given-names>SG</given-names>
            </name>
          </person-group>
          <article-title>The neural bases for empathy</article-title>
          <source>Neuroscientist</source>
          <year>2011</year>
          <month>02</month>
          <day>11</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>18</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.1177/1073858410379268</pub-id>
          <pub-id pub-id-type="medline">21071616</pub-id>
          <pub-id pub-id-type="pii">1073858410379268</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nightingale</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Yarnold</surname>
              <given-names>PR</given-names>
            </name>
            <name name-style="western">
              <surname>Greenberg</surname>
              <given-names>MS</given-names>
            </name>
          </person-group>
          <article-title>Sympathy, empathy, and physician resource utilization</article-title>
          <source>J Gen Intern Med</source>
          <year>1991</year>
          <month>9</month>
          <volume>6</volume>
          <issue>5</issue>
          <fpage>420</fpage>
          <lpage>423</lpage>
          <pub-id pub-id-type="doi">10.1007/bf02598163</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jensen</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The empathic physician</article-title>
          <source>Arch Intern Med</source>
          <year>1994</year>
          <volume>154</volume>
          <issue>1</issue>
          <fpage>106a</fpage>
          <pub-id pub-id-type="doi">10.1001/archinte.154.1.106a</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boss</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Galletta</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Lowry</surname>
              <given-names>PB</given-names>
            </name>
            <name name-style="western">
              <surname>Moody</surname>
              <given-names>GD</given-names>
            </name>
            <name name-style="western">
              <surname>Polak</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors</article-title>
          <source>MIS Quarterly</source>
          <year>2015</year>
          <month>4</month>
          <day>4</day>
          <volume>39</volume>
          <issue>4</issue>
          <fpage>837</fpage>
          <lpage>864</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2015/39.4.5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>WL</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A study on the evaluation of the theoretical model of hot spring tourists' willingness to revisit: from the perspective of conservation motivation theory</article-title>
          <source>Tourism Tribune</source>
          <year>2021</year>
          <volume>36</volume>
          <issue>06</issue>
          <fpage>133</fpage>
          <lpage>142</lpage>
          <pub-id pub-id-type="doi">10.19765/j.cnki.1002-5006.2021.06.014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aihong</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Effect of nursing intervention based on protective motivation theory in elderly patients with chronic diseases</article-title>
          <source>J Nurs</source>
          <year>2021</year>
          <volume>28</volume>
          <issue>16</issue>
          <fpage>5</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sujing</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Qin</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Study on self-management of patients with diabetes retinopathy by standard health education based on protective motivation theory</article-title>
          <source>China Standardiz</source>
          <year>2021</year>
          <volume>10</volume>
          <fpage>2</fpage>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
