<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i1e45573</article-id>
      <article-id pub-id-type="pmid">38214964</article-id>
      <article-id pub-id-type="doi">10.2196/45573</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Privacy Concerns About Sharing General and Specific Health Information on Twitter: Quantitative Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Abdalla</surname>
            <given-names>Mohamed</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zandesh</surname>
            <given-names>Zahra</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Li</surname>
            <given-names>Jingquan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kim</surname>
            <given-names>Young-Gab</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Wang</surname>
            <given-names>Zhong</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Esmaeilzadeh</surname>
            <given-names>Pouyan</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Information Systems and Business Analytics, College of Business</institution>
            <institution>Florida International University</institution>
            <addr-line>Modesto A. Maidique Campus 11200 S.W. 8th St</addr-line>
            <addr-line>RB 261 B</addr-line>
            <addr-line>Miami, FL, 33199</addr-line>
            <country>United States</country>
            <phone>1 3053483302</phone>
            <email>pesmaeil@fiu.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3885-8112</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Information Systems and Business Analytics, College of Business</institution>
        <institution>Florida International University</institution>
        <addr-line>Miami, FL</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Pouyan Esmaeilzadeh <email>pesmaeil@fiu.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>12</day>
        <month>1</month>
        <year>2024</year>
      </pub-date>
      <volume>8</volume>
      <elocation-id>e45573</elocation-id>
      <history>
        <date date-type="received">
          <day>7</day>
          <month>1</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>17</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>19</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>14</day>
          <month>12</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Pouyan Esmaeilzadeh. Originally published in JMIR Formative Research (https://formative.jmir.org), 12.01.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2024/1/e45573" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Twitter is a common platform for people to share opinions, discuss health-related topics, and engage in conversations with a wide audience. Twitter users frequently share health information related to chronic diseases, mental health, and general wellness topics. However, sharing health information on Twitter raises privacy concerns as it involves sharing personal and sensitive data on a web-based platform.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to adopt an interactive approach and develop a model consisting of privacy concerns related to web-based vendors and web-based peers. The research model integrates the 4 dimensions of concern for information privacy that express concerns related to the practices of companies and the 4 dimensions of peer privacy concern that reflect concerns related to web-based interactions with peers. This study examined how this interaction may affect individuals’ information-sharing behavior on Twitter.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Data were collected from 329 Twitter users in the United States using a web-based survey.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Results suggest that privacy concerns related to company practices might not significantly influence the sharing of general health information, such as details about hospitals and medications. However, privacy concerns related to companies and third parties can negatively shape the disclosure of specific health information, such as personal medical issues (β=−.43; <italic>P</italic>&#60;.001). Findings show that peer-related privacy concerns significantly predict sharing patterns associated with general (β=−.38; <italic>P</italic>&#60;.001) and specific health information (β=−.72; <italic>P</italic>&#60;.001). In addition, results suggest that people may disclose more general health information than specific health information owing to peer-related privacy concerns (<italic>t</italic><sub>165</sub>=4.72; <italic>P</italic>&#60;.001). The model explains 41% of the variance in general health information disclosure and 67% in specific health information sharing on Twitter.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The results can contribute to privacy research and propose some practical implications. The findings provide insights for developers, policy makers, and health communication professionals about mitigating privacy concerns in web-based health information sharing. It particularly underlines the importance of addressing peer-related privacy concerns. The study underscores the need to build a secure and trustworthy web-based environment, emphasizing the significance of peer interactions and highlighting the need for improved regulations, clear data handling policies, and users’ control over their own data.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>concern for information privacy</kwd>
        <kwd>CFIP</kwd>
        <kwd>peer privacy concern</kwd>
        <kwd>PrPC</kwd>
        <kwd>health information disclosure</kwd>
        <kwd>Twitter</kwd>
        <kwd>empirical study</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Reports and analyses highlight that approximately 60% of health-related tweets contain links to health-related websites [<xref ref-type="bibr" rid="ref1">1</xref>]. Twitter users frequently share health information related to chronic diseases, mental health, and general wellness topics [<xref ref-type="bibr" rid="ref2">2</xref>]. Twitter is a popular platform for health-related conversations because it allows users to share their thoughts, experiences, and information in real time [<xref ref-type="bibr" rid="ref3">3</xref>]. This platform can be particularly useful for sharing information about health events, such as disease outbreaks or public health campaigns. In addition, Twitter can be used to connect with others with similar health concerns or interests and to access information from health care professionals and organizations [<xref ref-type="bibr" rid="ref4">4</xref>]. Twitter is a social media platform with a character limit, which makes sharing detailed information about health issues difficult. Moreover, the information shared on Twitter may not always be accurate or reliable, as it is not always fact-checked or verified. However, Twitter is a common platform for people to share opinions, discuss health-related topics, and converse with a wide audience. According to a survey conducted by the Pew Research Center, 21% of Twitter users have used the platform to share information about a health condition [<xref ref-type="bibr" rid="ref5">5</xref>]. The survey also found that 20% of Twitter users have followed a health organization or medical professional on the platform, and 15% have searched for information about a health condition on Twitter. Users often express their views about health policies, medical breakthroughs, health care services, and public health issues [<xref ref-type="bibr" rid="ref6">6</xref>]. Health professionals, researchers, advocacy groups, and patients actively participate in these discussions, contributing diverse perspectives and sharing evidence-based information. This open and rapid exchange of ideas allows health information dissemination and facilitates conversations that can influence public opinion and policy decisions [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
        <p>Sharing health information on Twitter raises privacy concerns as it involves sharing personal and sensitive data on a public platform [<xref ref-type="bibr" rid="ref8">8</xref>]. Information privacy refers to individuals’ control over collecting, using, and disclosing their personal information. Regarding sharing personal health information, web-based information privacy refers to protecting sensitive health data from unauthorized access, secondary use, or disclosure [<xref ref-type="bibr" rid="ref9">9</xref>]. It involves ensuring that individuals can make informed decisions about how their health information is shared and used and that appropriate safeguards are in place to protect the confidentiality and security of this information. The potential privacy risks associated with sharing health information on Twitter can be grouped into 3 reasons. First, potential identification and disclosure of personal information—sharing health information on Twitter can inadvertently lead to disclosing personally identifiable information. A study found that anonymized data from health-related tweets could be reidentified to reveal the identity of users [<xref ref-type="bibr" rid="ref10">10</xref>]. Researchers were able to reconstruct personal health stories and connect them to specific individuals, highlighting the potential privacy risks involved. Second, data mining and analytics—third parties can analyze and use health-related tweets for various purposes, including targeted advertising or creating consumer profiles. Researchers analyzed tweets related to mental health and found that the content could be used to predict users’ self-reported diagnoses, medication use, and other personal information [<xref ref-type="bibr" rid="ref11">11</xref>]. This demonstrates the potential for extracting sensitive health-related data from Twitter. In addition, a study used deep neural networks to identify personal health experience tweets, highlighting the potential for using Twitter as a data source for health surveillance studies [<xref ref-type="bibr" rid="ref12">12</xref>]. Third, public disclosure of sensitive health information—sharing health information on Twitter might inadvertently expose individuals to public scrutiny and judgment. A study examined tweets related to mental health and found that users often disclosed personal experiences, symptoms, and treatments [<xref ref-type="bibr" rid="ref13">13</xref>]. Although this sharing can provide support, it can also expose individuals to potential stigma, discrimination, or unwanted attention.</p>
        <p>Previous studies suggest that individuals may be comfortable with sharing general information that is not sensitive on social media [<xref ref-type="bibr" rid="ref14">14</xref>]. However, people may not be likely to share personal information, especially health-related data, owing to privacy concerns [<xref ref-type="bibr" rid="ref15">15</xref>]. According to previous studies, privacy concerns can arise from companies’ information collection and use policies in the age of medical big data [<xref ref-type="bibr" rid="ref16">16</xref>] and web-based social interactions that may threaten information privacy [<xref ref-type="bibr" rid="ref17">17</xref>]. Twitter is reported as an important data set for vendors, researchers, and medical companies to collect health-related information [<xref ref-type="bibr" rid="ref18">18</xref>]. Many medical companies collect health information and patient experiences from Twitter for big data analysis to find patterns for public health management [<xref ref-type="bibr" rid="ref19">19</xref>]. Although big data collection and data mining techniques could help generate intelligence for monitoring public health issues, they can cause privacy concerns. Reports highlight that many Twitter users have experienced invasion of privacy owing to companies’ collection, sharing, and analytics practices that use information from their tweets, including private health information [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
        <p>Although there are various studies of vendor-related privacy concerns [<xref ref-type="bibr" rid="ref21">21</xref>] and peer-related privacy concerns [<xref ref-type="bibr" rid="ref22">22</xref>], little is known about whether these 2 aspects of privacy concerns may collectively influence information-sharing behaviors. As privacy violations can be related to peers (such as inappropriate comments and unauthorized retweeting) and companies (sharing personal information with third parties), more studies are required to examine whether information-sharing disclosure can be affected equally by vendor-related and peer-related privacy concerns. In this study, we aimed to determine whether both aspects of privacy concerns (ie, concern for information privacy [CFIP] and peer privacy concern [PrPC]) can mutually change health-related information-sharing decisions or whether one’s effects can dominate or overshadow the impact of the other. For instance, whether the nature of the relationships and contexts with 2 different information trustees (ie, vendors and peers) can influence information dissemination behavior. Thus, we argue that both aspects of privacy concerns should be considered in a model to better characterize information privacy on social media. Investigating the importance of privacy concerns related to companies and vendors (such as Twitter analytics) and web-based peers (such as retweeting a focal user’s health information without permission) in case of disclosing public and private health information on Twitter would be the main contribution that makes this study different from others.</p>
        <p>This argument is built based on 4 reasons. First, although the main interactions on social media are mainly peer oriented, vendors can still collect a lot of personal data (such as health information) without authorization and use it for unconsented purposes [<xref ref-type="bibr" rid="ref23">23</xref>]. There have been instances of social media platforms, including Twitter, being used by organizations for health-related data mining and analysis [<xref ref-type="bibr" rid="ref24">24</xref>]. Twitter data can provide valuable insights into health-related trends for health care organizations through analytics [<xref ref-type="bibr" rid="ref25">25</xref>]. Researchers and companies (such as pharmaceutical manufacturers) have used Twitter data to track and analyze health-related trends, including disease outbreaks, medication use, and public health concerns [<xref ref-type="bibr" rid="ref26">26</xref>]. For example, a study found that Twitter data could be used to track the spread of influenza and predict outbreaks [<xref ref-type="bibr" rid="ref27">27</xref>]. Another study uncovered that Twitter data could be used to monitor adverse drug reactions and identify potential safety concerns [<xref ref-type="bibr" rid="ref28">28</xref>]. Pharmaceutical companies have also used Twitter data to monitor medication use and patient experiences. For example, a study reported that Twitter data could be used to monitor patient experiences with antidepressant medications [<xref ref-type="bibr" rid="ref29">29</xref>]. Moreover, it is common for organizations and vendors, including those in the health care industry, to monitor social media platforms to gather insights about consumer opinions, preferences, and trends [<xref ref-type="bibr" rid="ref30">30</xref>]. Twitter, as a popular social media platform, has been used for these purposes [<xref ref-type="bibr" rid="ref31">31</xref>]. Health care organizations and vendors may collect health-related information, such as discussions about medical conditions, treatment experiences, and patient preferences, from public Twitter profiles [<xref ref-type="bibr" rid="ref19">19</xref>]. These insights can be valuable for marketing and market research purposes.</p>
        <p>Second, although the primary purpose of peer-to-peer (P2P) interactions on social media is to maintain social connections with peers and there are no explicit business-to-consumer interactions, companies can still use social media analytics to investigate published health information. Companies can leverage various analytics tools to gather and find meaning and patterns in data collected from social channels to support business decisions (such as predicting the risk factors to manage public health) [<xref ref-type="bibr" rid="ref32">32</xref>]. Third, individuals share a variety of information (such as about lifestyle, health status, chronic issues, and medication) on social media, which can be more sensitive than conventional e-commerce information (such as transaction records). Disclosing a wide range of information across social media platforms could raise concerns about whether companies and peers misuse the shared data (eg, health information). Fourth, Web 2.0, a fundamental technology supporting social media, mainly focuses on bilateral relationships between peers. However, it does not remove traffic between companies and social media users. Thus, peers can comment on conversations about a user’s health condition and share others’ personal health information on their own channels. In contrast, companies can use big data analytical tools to collect, use, or share users’ personal health data with third parties.</p>
      </sec>
      <sec>
        <title>Study Objectives</title>
        <p>The main objective of this study was to investigate the concept of information privacy concerns in the context of social media based on both vendor-related and peer-related aspects. To do so, we used the survey research methodology and Twitter as the empirical context. We also relied on theories discussing 2 dimensions of information privacy (ie, CFIP and PrPC) as the theoretical foundation of our proposed model. In this study, CFIP, emphasizing both consumer perspectives and company responsibilities, represented privacy concerns related to web-based practices of companies and vendors (such as collection and sharing of self-shared information), and PrPC referred to privacy concerns about losing control over digital communications and web-based interactions with peers. Thus, we suggest that information privacy on social media can be multidimensional, focusing on privacy violations associated with companies’ (vendors’) practices and sharing behaviors of peers. The integration of CFIP and PrPC can comprehensively present the entirety of privacy concerns about web-based health information. This study contributes to both theory and practice. We shed more light on information privacy conceptualization in the context of social media. This study also provides an interactive outlook and practical recommendations for handling privacy issues by explaining how web-based vendors and peers may cause privacy violations when dealing with health information (general and specific) shared over the web.</p>
      </sec>
      <sec>
        <title>Variable Conceptualization, Theoretical Foundation, and Research Hypotheses</title>
        <sec>
          <title>General and Specific Health Information</title>
          <p>Individuals can use web-based channels to share general health information, such as information about treatments, medications, side effects, hospitals, medical costs, and healthy behaviors [<xref ref-type="bibr" rid="ref33">33</xref>]. For instance, people are likely to tweet about general obesity-related topics, such as the relationship between fast food and weight gain [<xref ref-type="bibr" rid="ref34">34</xref>]. Another study identifies general tobacco-related tweets (such as information about smoking, cigarette risks, and quitting) as the primary conversational data sets for health-related topics on Twitter [<xref ref-type="bibr" rid="ref35">35</xref>]. Moreover, people can use tools such as Twitter to share specific health-related information, including past medical history, allergies, personal medications, private health issues, and signs and symptoms. For example, a study indicates that people disseminate information about diagnoses, advice based on personal experience, use of specific medications, side effects, negative reactions, and treatments on Twitter [<xref ref-type="bibr" rid="ref31">31</xref>]. Another study highlights that people use Twitter to share their COVID-19–related symptoms and personal health issues during the early stages of the pandemic [<xref ref-type="bibr" rid="ref36">36</xref>].</p>
          <p>Sharing public and private health information can be valuable for web-based peers and affect their health-related decisions. General information can enable web-based users to find some facts about hospitals, physicians, and diseases. Disseminating specific information can share important insights and advice based on personal health conditions, medical treatments, care planning, and medical experiences with chronic diseases. General health information can be publicly available regardless of personal experiences. However, specific health information can be unpleasant to share because it may contain more private information. As health information dissemination has 2 sides, questions still remain as to what dimensions of information privacy may strongly affect sharing behaviors on Twitter.</p>
        </sec>
        <sec>
          <title>CFIP Constructs</title>
          <p>There is evidence suggesting that companies use tweets to collect health information. For example, reports show that public health researchers use Twitter data to study the world’s health. A recent study indicates that the amount of textual health-related data, which could be personal, collected by various organizations is growing (especially during the COVID-19 pandemic) [<xref ref-type="bibr" rid="ref37">37</xref>]. Another study argues that health care researchers and research companies have used social media data sources such as Twitter to study public health [<xref ref-type="bibr" rid="ref19">19</xref>]. Owing to the importance of the Twitter database, the Centers for Disease Control and Prevention (CDC) designed a document to guide employees and contractors on using Twitter to disseminate health information and engage with individuals and partners [<xref ref-type="bibr" rid="ref38">38</xref>]. A study indicates that companies increasingly use Twitter to share public health information and collect real-time health data using crowdsourcing methods [<xref ref-type="bibr" rid="ref39">39</xref>]. Information privacy, which refers to people’s ability to control their information, is essential in e-commerce and social media [<xref ref-type="bibr" rid="ref40">40</xref>]. Several studies explain the privacy concerns specific to the mobility data collection context [<xref ref-type="bibr" rid="ref41">41</xref>]. Thanks to emerging technology (such as Web 2.0), protecting personal information has become a growing concern for web-based users. CFIP is a general concern about how organizations can use and protect consumers’ information [<xref ref-type="bibr" rid="ref21">21</xref>]. CFIP explains concerns about organizations’ information collection practices, use policies, and access to consumers’ personal information [<xref ref-type="bibr" rid="ref42">42</xref>]. Previous studies indicate that examining consumers’ concerns about how companies (vendors) may use their personal information significantly affects their willingness to engage in web-based transactions actively [<xref ref-type="bibr" rid="ref43">43</xref>].</p>
          <p>In this study, following most previous studies, CFIP is posited as a multidimensional construct with 4 dimensions to measure individuals’ concerns about organizations’ information privacy practices [<xref ref-type="bibr" rid="ref44">44</xref>]. Collection pertains to individuals’ concerns about what web-based information is collected and whether such information is stored properly. Unauthorized secondary use explains individuals’ concerns about whether the information collected for a consented purpose may be unethically and illegally used for other purposes without obtaining authorization. Improper access implies individuals’ concerns about whether unauthorized people (entities) can access, view, and share their information. Finally, concerns about errors reflect whether individuals’ information is appropriately protected to minimize accidental or intentional errors [<xref ref-type="bibr" rid="ref44">44</xref>]. Therefore, the multidimensional scale of CFIP reflects the complexity of individuals’ privacy concerns [<xref ref-type="bibr" rid="ref21">21</xref>]. According to Stewart and Segars [<xref ref-type="bibr" rid="ref40">40</xref>], CFIP is developed as a second-order construct with 4 reflective first-order factors. In this study, we also considered CFIP as a high-order construct with reflective factors. The logic behind conceptualizing this construct as reflective was that the privacy concerns related to companies are reflective of the 4 dimensions (ie, collection, unauthorized access, errors, and secondary use) and the expected interactions among them. Therefore, these dimensions can reflect the same theme and may covary.</p>
          <p>Although sharing information on Twitter is more oriented toward interactions with web-based peers, privacy concerns about the collection and misuse of digitized health information by vendors and companies still remain significant. Previous studies provide strong evidence suggesting that web-based users of Twitter are concerned about several aspects of their information privacy, from collection of a lot of data to misuse [<xref ref-type="bibr" rid="ref45">45</xref>]. Our study focused on individuals’ perceptions about general CFIP owing to policies and practices of vendors and organizations that may collect, access, and use health information shared on Twitter rather than concerns about a particular vendor. According to the four dimensions of the CFIP construct, individuals who demonstrate high privacy concerns believe that (1) a lot of health information is collected by organizations from users’ Twitter accounts, (2) such health information is not appropriately protected against possible errors, (3) various organizations may use health-related information on Twitter for other purposes without authorization (such as data mining, surveillance, research, and business intelligence), and (4) there is lack of visibility into accurate security measures to control who can access and use health information from tweets.</p>
          <p>Thus, the CFIP construct can be extended to privacy concerns about a wide range of vendors and companies accessing and using tweets containing health information. This concern is not the same as privacy issues owing to interactions with a specific vendor in the context of e-commerce (such as retail platforms). In these conventional interactions, privacy concerns may focus on personal, factual information shared in web-based transactions and services (such as demographic information). However, CFIP in the social media domain deals with concerns associated with the following uncertainty: which organizations collect personal posts, which unauthorized entities can view and share information, why and how the information is used (for instance, data mining), and how the information is protected from internal and external errors and misuse. Therefore, we argue that CFIP cannot be ignored in examining information privacy in social media because users may not have direct relationships with organizations on these digital platforms, but they are still concerned about how their posts can be collected and misused by various companies.</p>
          <p>Sharing general health information could indicate a user’s rich medical information and wealth of medical knowledge. In contrast, sharing specific health information can show that the user may want to contribute or seek informational and emotional support by disseminating personal experiences and medical history. However, when privacy concerns about the collection and misuse of shared data by organizations are not addressed, users are not likely to disseminate general or specific health information on Twitter. Moreover, we can expect that because specific health information is more sensitive and private, web-based users may generally become more cautious about sharing it. Therefore, we hypothesized the following:</p>
          <list list-type="bullet">
            <list-item>
              <p>Hypothesis 1A (H1A): CFIP negatively influences general health information dissemination on Twitter.</p>
            </list-item>
            <list-item>
              <p>Hypothesis 1B (H1B): CFIP negatively influences specific health information dissemination on Twitter.</p>
            </list-item>
            <list-item>
              <p>Hypothesis 1C (H1C): CFIP has a more negative effect on specific health information dissemination than on general health information sharing on Twitter.</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>PrPC Constructs</title>
          <p>Owing to the nature of Web 2.0, users can communicate, create content, and share it via communities, social networks, and virtual worlds [<xref ref-type="bibr" rid="ref46">46</xref>]. Web-based users can share a wide range of information and experiences on social media. The information can be objective (based on factual data) or subjective (based on personal interpretation, feelings, tastes, or opinions) [<xref ref-type="bibr" rid="ref47">47</xref>]. The range can start with demographic information (eg, age, gender, and race); continue with political views, humanitarian opinions, and health information; and end with comments on others’ posts [<xref ref-type="bibr" rid="ref48">48</xref>]. People can use different formats, such as text, pictures, and videos, to disseminate information. Peers are important components of social networks; however, they can threaten information privacy through inappropriate sharing behaviors and unintended consequences of web-based interactions [<xref ref-type="bibr" rid="ref49">49</xref>].</p>
          <p>Web-based transactions with peers on social media affect users’ decisions about whether they want to reveal their personal information (such as feelings and likes) and create an image consistent with their personal identity [<xref ref-type="bibr" rid="ref50">50</xref>]. In this study, peers could be web-based friends who may have long-lasting and affect-laden connections with a user and any web-based users who interact through social media channels. Previous studies highlight the importance of PrPCs in the context of web-based interpersonal relationships where other peers can access and view a user’s web-based information [<xref ref-type="bibr" rid="ref51">51</xref>]. Peer-related privacy refers to possible risks of privacy invasion because of direct and indirect web-based interactions with peers [<xref ref-type="bibr" rid="ref17">17</xref>]. Social bots and fake and spam accounts can also raise privacy violation risks by potentially exposing several peers to a focal user’s posts using machine learning algorithms [<xref ref-type="bibr" rid="ref52">52</xref>]. Previous studies indicate the threat of using social bots on social networks, increasing the likelihood of privacy breaches where even more private user data are exposed [<xref ref-type="bibr" rid="ref53">53</xref>]. Understanding who can access web-based information (such as a post related to signs and symptoms of depression) and with whom such information is shared can significantly raise privacy concerns. For example, a study shows that sharing information with only selected friends in social networking services perceived higher control than sharing information with all friends [<xref ref-type="bibr" rid="ref54">54</xref>].</p>
          <p>Thus, information-sharing behaviors on social media may erode the ability of users to control their virtual space and personal boundaries. Leaving an inappropriate comment for a user who posted about <italic>seeking ways to lose weight</italic>, can increase privacy concerns about lack of control to maintain the privacy of their Twitter space. A study posits that managing the privacy of virtual territory refers to defining the level of access to and interaction others can have within a user’s territory (eg, allowing peers to see or comment on the post) [<xref ref-type="bibr" rid="ref55">55</xref>]. Peers can also play a bilateral role in web-based social interactions. They can intentionally or unintentionally share a user’s personal health information with others and expose the user to others’ personal information that they might not like to view. The user may think that if others’ personal health information has been shared with me, my posts can also be revealed to others. Thus, communication privacy can significantly affect how individuals and relational parties share private information on social media [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
          <p>A recent study defines PrPC as the sense of inability to control personal boundaries in web-based interactions owing to web-based peers’ behaviors [<xref ref-type="bibr" rid="ref22">22</xref>]. They describe this term using 4 reflective dimensions: peer-related information privacy, psychological privacy, virtual territory privacy, and communication privacy. Peer-related information privacy denotes concerns about who can see what type of information and when and how such information is disclosed to other web-based peers. For posts shared by a user, the main concern is unauthorized access and secondary use of data by other peers. On Twitter, this can happen through retweeting and commenting. Peers can also initiate posts or conversation threads to disclose a user’s personal information without authorization. A privacy concern is about the accuracy of personal information shared by peers. Thus, peers’ sharing can be a source of private information leaks.</p>
          <p>Psychological privacy explains the control over input information coming from others to shape feelings, opinions, and beliefs. Information sharing is 2-way traffic in social media (ie, from a user to peers and from peers to a user) [<xref ref-type="bibr" rid="ref57">57</xref>]. As people are exposed to posts shared by celebrities, business magnates, politicians, and other web-based users, their behaviors and opinions are increasingly affected by input information from peers. Peers on social media can influence users’ behavior by applying social influence through public comments on posts [<xref ref-type="bibr" rid="ref58">58</xref>]. Privacy concerns become more intense when users’ opinions and psychological independence are intentionally manipulated by social bots [<xref ref-type="bibr" rid="ref59">59</xref>]. In this situation, users are not able to make a decision independent of other web-based peers’ ideas. Moreover, receiving a lot of unwanted information from peers may influence value systems, attitudes, identities, and choices.</p>
          <p>Virtual territory privacy represents concerns about an individual’s inability to achieve control over other peers’ interactions with their virtual properties (such as Twitter accounts) and shared conversations (postings). Previous studies suggest that the sense of ownership and emotional attachment to personal territory can be generalized to the social media domain [<xref ref-type="bibr" rid="ref60">60</xref>]. Similar to other personal belongings, virtual properties are seen as private. Thus, any unwanted addition to or revision of personal information can be considered as an intrusion, which may increase privacy violation risks [<xref ref-type="bibr" rid="ref45">45</xref>]. Finally, communication privacy reflects an individual’s lack of control over how and when other peers can make direct web-based conversations. For example, peers may use various communication tools to engage individuals in a group conversation about potentially embarrassing or stigmatic health-related topics. Then, users may feel pressured by being involved in such undesirable conversations with unfamiliar people.</p>
          <p>Individuals may become more likely to share general or specific health information on Twitter when they think it is useful for other web-based peers (eg, they can make better medical decisions). However, peer-related concerns may prevent them from disseminating such information. Peers are participants in social media and can freely collect and share information that is sometimes considered as unwanted interference. For instance, if peers retweet a post containing personal information about postsurgery recovery plans without authorization or tag a user who posted general educational content about HIV, these web-based interactions may violate privacy needs and raise privacy concerns. In return, users may change the pattern of health information dissemination and become more cautious in sharing medical facts or personal experiences. Thus, we formulated the following hypotheses:</p>
          <list list-type="bullet">
            <list-item>
              <p>Hypothesis 2A (H2A): PrPC negatively influences general health information dissemination on Twitter.</p>
            </list-item>
            <list-item>
              <p>Hypothesis 2B (H2B): PrPC negatively influences specific health information dissemination on Twitter.</p>
            </list-item>
            <list-item>
              <p>Hypothesis 2C (H2C): PrPC has a more negative effect on specific health information dissemination than on general health information sharing on Twitter.</p>
            </list-item>
          </list>
        </sec>
      </sec>
      <sec>
        <title>CFIP and PrPC Are Privacy Concerns for Twitter Users</title>
        <p>Although tweets are publicly accessible by default, users likely expect some degree of privacy and control over their personal health information shared on the platform. Previous literature has found that even when posting content publicly on social media, individuals still have privacy interests and concerns about how their data might be used or accessed [<xref ref-type="bibr" rid="ref61">61</xref>]. General health information shared publicly on Twitter, such as mentions of hospitals, physicians, and common diseases, is not considered protected or private. However, more specific personal health details, such as past medical history, allergies, medications, and current symptoms, could reveal private information about an individual’s health status. Although these details may be shared publicly by default on Twitter, users likely still have privacy concerns about this content being widely disseminated or used without their consent.</p>
        <p>The concepts of CFIP and PrPC capture these types of privacy concerns. Although users are voluntarily sharing health information publicly on Twitter, they may still desire control over how these data are accessed and used. CFIP reflects concerns about using or sharing personal health data by third parties such as researchers or companies without the user’s knowledge or permission. Even if users willingly post health information publicly, they may still desire control over how that data are collected, analyzed, or shared by entities such as researchers, pharmacies, insurance companies, and so on. PrPC represents concerns about controlling boundaries around health disclosures and limiting exposure to certain audiences, such as employers or insurers, who could misuse the information. Users must balance sharing personal details with managing social risks if the information reaches unintended viewers such as employers, family members, or friends. Thus, although Twitter data are technically public, users are likely to have nuanced privacy interests surrounding their health disclosures. Therefore, concepts such as CFIP and PrPC are useful for quantifying expectations regarding control, anonymity, and audience boundaries that persist even when posting health care–related content openly over the web.</p>
      </sec>
      <sec>
        <title>Difference Between the Conceptualization of CFIP and PrPC</title>
        <sec>
          <title>Overview</title>
          <p>We used an interactive approach to provide a holistic view of information privacy in the context of sharing health information on Twitter. Using this approach, this study actively engaged with the 2 aspects of privacy concerns (CFIP and PrPC) in a dynamic way, considering the interplay between them, as opposed to treating them as isolated, independent factors. Therefore, we examined how these 2 aspects of privacy concerns interact with each other and how this interaction affects individuals’ behavior on Twitter. It should be mentioned that the dimensions used for CFIP and PrPC may differ because of the different nature of the relationships and contexts involved. Although the underlying concept of privacy concerns remains the same, the specific dimensions or factors that contribute to CFIP and PrPC may vary owing to the distinct characteristics of vendors and peers as information trustees.</p>
        </sec>
        <sec>
          <title>Role and Control</title>
          <p>Vendors typically have a professional or business relationship with individuals, where they are entrusted with handling personal information for specific purposes (eg, health care providers and web-based retailers). In this context, individuals may be concerned about vendors’ control over their information; how it is collected, used, and shared; and the potential for data breaches or unauthorized access.</p>
        </sec>
        <sec>
          <title>Trust and Reputation</title>
          <p>CFIP dimensions often include factors related to trust and reputation, such as trustworthiness, perceived reliability, and credibility of vendors. As individuals rely on vendors to handle their personal information responsibly, dimensions related to trust and reputation become important for CFIP measurement.</p>
        </sec>
        <sec>
          <title>Legal and Ethical Considerations</title>
          <p>CFIP dimensions may also include factors related to legal and ethical considerations, such as compliance with privacy laws, informed consent, and transparency in data practices. Individuals may be concerned about whether vendors meet the legal requirements and ethical standards in protecting their health information.</p>
          <p>In contrast, peers, who are individuals within an individual’s social network or community, may have different dimensions of privacy concerns. Social interactions, trust, reciprocity, and the potential for social consequences typically characterize peer relationship dynamics. Some factors that could influence PrPC dimensions include the following.</p>
        </sec>
        <sec>
          <title>Social Norms and Expectations</title>
          <p>PrPC dimensions may reflect concerns about social norms and expectations related to privacy within the peer group. Individuals may worry about how their health information might be perceived, shared, or used by their peers and the potential impact on their social relationships or reputation.</p>
        </sec>
        <sec>
          <title>Social Influence and Peer Pressure</title>
          <p>PrPC dimensions may capture the influence of peer pressure or the fear of negative social consequences. Individuals may be concerned about potential judgment, stigma, or discrimination based on their health information within their peer group.</p>
        </sec>
        <sec>
          <title>Personal Boundaries and Intimacy</title>
          <p>PrPC dimensions may include factors related to personal boundaries and the level of intimacy within peer relationships. Individuals may be concerned about the extent to which personal health information should be shared with peers and the potential impact on their privacy, autonomy, and self-disclosure.</p>
          <p>Although the underlying concept of privacy concerns is present in both CFIP and PrPC, the dimensions may differ owing to the distinct characteristics and dynamics of the relationships involved. Thus, considering these differences when developing measurement instruments is important to accurately capture individuals’ concerns regarding privacy in different trust relationships.</p>
        </sec>
      </sec>
      <sec>
        <title>Research Model</title>
        <p>The model focuses on health information and Twitter (as the research context). There are a few critical differences in the privacy concerns around health information compared with other types of information. First, health information is considered to be very sensitive and private. It can reveal details about medical conditions, treatments, prescriptions, family history, and so on. Other types of information, such as social media posts or shopping habits, are generally not as sensitive. Second, health information has strict legal protections such as Health Insurance Portability and Accountability Act in the United States and General Data Protection Regulation in the European Union. These laws place restrictions on how health data can be collected, shared, and used. Other information does not have the same level of legal safeguards. Third, health information could potentially be used to discriminate against people in areas such as employment, insurance, and so on. This type of discrimination is legally prohibited, but the risk remains owing to the sensitive nature of the data. Other data, such as social media posts, have less potential for this type of discrimination. Finally, breach of health information is considered very serious, given the sensitivity of the data. Strong security protections are needed, and breaches can carry heavy penalties. Breaches of other types of data may not have the same level of severity.</p>
        <p>Regarding privacy on social media, there are some key characteristics of the concerns around Twitter compared with other platforms. First, most Twitter content is public by default, whereas other platforms such as Facebook allow more privacy controls. This can raise concerns about a lack of control over dissemination. Second, tweets are often archived and searchable indefinitely; therefore, there are concerns about permanent availability even for “deleted” content. Other platforms may have more ephemeral sharing. Third, the open nature of Twitter makes it easy for tweets to spread rapidly and become viral compared with platforms such as Instagram, where sharing can be more controlled. This raises concerns about loss of context and lack of containment. Finally, the ability to create anonymous accounts on Twitter is greater than that on platforms such as Facebook that require real identities. This raises concerns about harmful speech, misinformation, and so on.</p>
        <p>We proposed the following research framework for disclosing general and specific health information on Twitter by integrating 2 aspects of information privacy concerns (<xref rid="figure1" ref-type="fig">Figure 1</xref>). As several studies may have found empirical evidence for the hypotheses proposed in this study, we need to clarify what is new in our study. First, this study integrated both aspects of privacy concerns for the first time in a model. Previous studies examined either privacy concerns related to companies’ practices with web-based information (CFIP) [<xref ref-type="bibr" rid="ref62">62</xref>] or concerns related to the web-based behaviors of peers (PrPC) [<xref ref-type="bibr" rid="ref63">63</xref>]. However, as mentioned in the previous section, individuals may be concerned about disseminating their health information on Twitter because companies’ collection practices and web-based peers’ behaviors could violate their privacy. In this study, we wanted to examine whether both aspects of privacy concerns (ie, CFIP and PrPC) can collectively change health-related information-sharing decisions or whether one can dominate the other. For instance, whether the nature of the relationships and contexts with 2 different information trustees (ie, vendors and peers) can shape information dissemination behavior. Second, as Twitter is considered as a rich database for collecting individual health-related information to examine sentiments and manage public health [<xref ref-type="bibr" rid="ref64">64</xref>] and reports highlight that individuals may be concerned about web-based interactions with peers [<xref ref-type="bibr" rid="ref65">65</xref>], Twitter would be the best research context to meet the goals of this study. Third, this study distinguished between general and specific health information. Thus, we could offer more insights about privacy concern levels and disclosure behaviors related to the 2 types of health information on Twitter. These 3 reasons can make our study different from previous studies in the privacy literature.</p>
        <p>In addition, we controlled for several variables such as age, gender, education, Twitter experience, privacy violation experience, and misrepresentation of identity on Twitter. According to previous studies in the privacy concern domain, some demographics, such as age [<xref ref-type="bibr" rid="ref66">66</xref>], gender [<xref ref-type="bibr" rid="ref67">67</xref>], and education level [<xref ref-type="bibr" rid="ref68">68</xref>], can affect people’s intention to disclose information on social media. Moreover, the impacts of these variables have been examined in previous studies investigating individuals’ perceptions about sharing eHealth-related information [<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. The effects of these variables are often controlled in previous studies in the field of information privacy threats [<xref ref-type="bibr" rid="ref71">71</xref>]. Thus, we assumed that individuals of different ages, genders, and educational levels engage in various disclosure behaviors because they have diverse backgrounds, individual characteristics, and personal differences. Therefore, we considered these demographics to be control variables in the proposed research model.</p>
        <p>Moreover, the effects of misrepresentation of identity, experience with technology, and privacy violation experiences are controlled in previous studies examining relationships between privacy concerns and self-disclosure [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Thus, it is believed that individuals with different privacy violation experiences, previous identity misrepresentation, and experiences with Twitter are more likely to demonstrate various disclosure behaviors. Therefore, we treated these experience-related variables as control variables in our model.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Research model. 1A: hypothesis 1A; 1B: hypothesis 1B; 2A: hypothesis 2A; 2B: hypothesis 2B.</p>
          </caption>
          <graphic xlink:href="formative_v8i1e45573_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Research Approach and Survey Development</title>
        <p>We administered a web-based survey questionnaire to achieve the defined objectives and test the proposed model and research hypotheses. The survey consists of 4 sections. In the first part, the purpose of the study is described clearly, and a qualifying question is used to select respondents. The question for filtering respondents attempts to screen individuals with a Twitter account. Thus, individuals without a Twitter account are excluded from data collection and analysis. In the second section, respondents are asked to express their perceptions about privacy concerns associated with companies and third parties, peer-related privacy concerns, and health information dissemination behaviors. In the third section, demographic questions (ie, age, gender, education, income, and race) are asked. Finally, the last section focuses on personal privacy experiences (ie, Twitter experience, privacy violation experience, and misrepresentation of identity).</p>
        <p>Questions to measure each construct were adapted from validated instruments available in the existing literature. Slight changes in the wording were made to fit the context of this study. We adapted items to measure CFIP (as a second-order construct with 4 dimensions) from the study by Stewart and Segars [<xref ref-type="bibr" rid="ref40">40</xref>]. Following Zhang et al [<xref ref-type="bibr" rid="ref22">22</xref>], we also conceptualized and measured PrPC as a second-order reflective construct with 4 dimensions. Previously defined scales to measure general and specific health information disclosure were adapted from the study by Hsu et al [<xref ref-type="bibr" rid="ref72">72</xref>]. Respondents rated all the measuring items included in the survey using a 5-point Likert scale ranging from 1 (strongly disagree) to 5 (strongly agree). <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> shows the questions used in the web-based survey.</p>
      </sec>
      <sec>
        <title>Data Collection and Data Analysis</title>
        <p>Data were collected in April 2022 by uploading the questionnaire to Amazon’s Mechanical Turk (MTurk). MTurk is a crowdsourcing platform that enables researchers to access data from potential target samples to conduct a study. MTurk has been recognized as an acceptable web-based means for collecting individual-level data. Literature about health care analytics shows a growing number of studies using MTurk for health-related research [<xref ref-type="bibr" rid="ref73">73</xref>]. Previous studies highlight that MTurk can measure individual perceptions in various domains, such as social media [<xref ref-type="bibr" rid="ref74">74</xref>]. As the target population of this study was US citizens who use Twitter for web-based interactions, we limited the respondents’ location to the United States. Moreover, 2 attention-check questions were used to remove participants who chose answers without correctly replying to reverse-coded filler items [<xref ref-type="bibr" rid="ref75">75</xref>]. The filtering questions were as follows: (1) It does not bother me that my peers may try to influence me through comments on my health-related postings on Twitter and (2) I am not concerned that I have little control over who can start a health-related conversation with me on Twitter. We received 364 questionnaires and excluded 35 (9.6%) that were either incomplete or failed the response quality questions, resulting in 329 (90.4%) valid and usable responses. The average response time to complete the questionnaire was 12 minutes. The descriptive statistics for demographics were performed using SPSS (version 26; IBM). The research model was tested using AMOS (version 26; IBM) within the structural equation model framework.</p>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>The institutional review board of Florida International University reviewed and approved the study (approval 112755). According to the institutional review board approval, written informed consent to participate in the study was obtained from all participants. Moreover, the data collected in this study were anonymous. We considered US $1 as an incentive for each respondent to participate in the study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Instrument Validation</title>
        <p>We used confirmatory factor analysis to assess convergent and discriminant validity. <xref ref-type="table" rid="table1">Table 1</xref> shows the results of the convergent validity test. The standardized factor loadings for all constructs exceeded 0.7, which is the acceptable range for factor loadings [<xref ref-type="bibr" rid="ref76">76</xref>]. The composite reliability values and Cronbach α values were above the recommended value of .7, demonstrating the adequate reliability of the constructs [<xref ref-type="bibr" rid="ref77">77</xref>]. All the values of average variance extracted (AVE) exceeded 0.5, which is the cutoff value [<xref ref-type="bibr" rid="ref78">78</xref>]. These measures indicated the acceptability of the measurement model’s convergent validity.</p>
        <p><xref ref-type="table" rid="table2">Table 2</xref> shows the discriminant validity of the constructs. All diagonal values (square roots of the AVEs) were &#62;0.7 and greater than off-diagonal values (correlations) between any pair of constructs [<xref ref-type="bibr" rid="ref79">79</xref>]. Thus, the discriminant validity requirements were satisfied for the research model.</p>
        <p>Moreover, we checked the convergent and discriminant validity of the second-order constructs. The composite reliability, Cronbach α, and AVE values for CFIP were 0.91, .88, and 0.64, respectively, and these measures for PrPC were 0.94, .89, and 0.72, respectively. The correlation between the second-order variables (eg, CFIP and PrPC) was 0.58. Finally, the square roots of the AVEs for both constructs were &#62;0.7 and higher than the correlations between the constructs. These results confirm an acceptable convergent and discriminant validity for both second-order constructs in the model.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Results of the convergent validity test.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="30"/>
            <col width="190"/>
            <col width="0"/>
            <col width="250"/>
            <col width="0"/>
            <col width="200"/>
            <col width="0"/>
            <col width="160"/>
            <col width="0"/>
            <col width="140"/>
            <thead>
              <tr valign="top">
                <td colspan="4">Constructs, subdimensions, and items</td>
                <td colspan="2">Standardized factor loading (&#62;0.7)</td>
                <td colspan="2">Composite reliability (&#62;0.7)</td>
                <td colspan="2">Cronbach α (&#62;.7)</td>
                <td>AVE<sup>a</sup> (&#62;0.5)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="11">
                  <bold>Concern for information privacy</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>COLL<sup>b</sup></bold>
                </td>
                <td colspan="2">0.89</td>
                <td colspan="2">.75</td>
                <td>0.66</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>COLL1</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>COLL2</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>COLL3</td>
                <td colspan="2">0.81</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>COLL4</td>
                <td colspan="2">0.84</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>USU<sup>c</sup></bold>
                </td>
                <td colspan="2">0.90</td>
                <td colspan="2">.79</td>
                <td>0.70</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>USU1</td>
                <td colspan="2">0.86</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>USU2</td>
                <td colspan="2">0.84</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>USU3</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>USU4</td>
                <td colspan="2">0.85</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>IAC<sup>d</sup></bold>
                </td>
                <td colspan="2">0.86</td>
                <td colspan="2">.79</td>
                <td>0.67</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>IAC1</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>IAC2</td>
                <td colspan="2">0.84</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>IAC3</td>
                <td colspan="2">0.83</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>ERR<sup>e</sup></bold>
                </td>
                <td colspan="2">0.89</td>
                <td colspan="2">.84</td>
                <td>0.66</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>ERR1</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>ERR2</td>
                <td colspan="2">0.84</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>ERR3</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>ERR4</td>
                <td colspan="2">0.81</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="11">
                  <bold>Peer privacy concern</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>PPC<sup>f</sup></bold>
                </td>
                <td colspan="2">0.88</td>
                <td colspan="2">.84</td>
                <td>0.66</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PPC1</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PPC2</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PPC3</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PPC4</td>
                <td colspan="2">0.81</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>CPC<sup>g</sup></bold>
                </td>
                <td colspan="2">0.89</td>
                <td colspan="2">.88</td>
                <td>0.67</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>CPC1</td>
                <td colspan="2">0.85</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>CPC2</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>CPC3</td>
                <td colspan="2">0.81</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>CPC4</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>VTPC<sup>h</sup></bold>
                </td>
                <td colspan="2">0.89</td>
                <td colspan="2">.87</td>
                <td>0.68</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>VTPC1</td>
                <td colspan="2">0.85</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>VTPC2</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>VTPC3</td>
                <td colspan="2">0.84</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>VTPC4</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>Peer-related information privacy concern–SSIPC<sup>i</sup></bold>
                </td>
                <td colspan="2">0.87</td>
                <td colspan="2">.82</td>
                <td>0.63</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SSIPC1</td>
                <td colspan="2">0.79</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SSIPC2</td>
                <td colspan="2">0.78</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SSIPC3</td>
                <td colspan="2">0.81</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SSIPC4</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>Peer-related information privacy concern–PSIPC<sup>j</sup></bold>
                </td>
                <td colspan="2">0.89</td>
                <td colspan="2">.87</td>
                <td>0.67</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PSIPC5</td>
                <td colspan="2">0.83</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PSIPC6</td>
                <td colspan="2">0.79</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PSIPC7</td>
                <td colspan="2">0.80</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>PSIPC8</td>
                <td colspan="2">0.86</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="11">
                  <bold>GHID<sup>k</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>N/A<sup>l</sup></bold>
                </td>
                <td colspan="2">0.87</td>
                <td colspan="2">.84</td>
                <td>0.64</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>GHID1</td>
                <td colspan="2">0.81</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>GHID2</td>
                <td colspan="2">0.78</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>GHID3</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>GHID4</td>
                <td colspan="2">0.79</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="11">
                  <bold>SHID<sup>m</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="5">
                  <bold>N/A</bold>
                </td>
                <td colspan="2">0.90</td>
                <td colspan="2">.88</td>
                <td>0.69</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SHID1</td>
                <td colspan="2">0.84</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SHID2</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SHID3</td>
                <td colspan="2">0.82</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SHID4</td>
                <td colspan="2">0.85</td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>AVE: average variance extracted.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>COLL: collection.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>USU: unauthorized secondary use.</p>
            </fn>
            <fn id="table1fn4">
              <p><sup>d</sup>IAC: improper access.</p>
            </fn>
            <fn id="table1fn5">
              <p><sup>e</sup>ERR: error.</p>
            </fn>
            <fn id="table1fn6">
              <p><sup>f</sup>PPC: psychological privacy concern.</p>
            </fn>
            <fn id="table1fn7">
              <p><sup>g</sup>CPC: communication privacy concern.</p>
            </fn>
            <fn id="table1fn8">
              <p><sup>h</sup>VTPC: virtual territory privacy concern.</p>
            </fn>
            <fn id="table1fn9">
              <p><sup>i</sup>SSIPC: self-shared information privacy concern.</p>
            </fn>
            <fn id="table1fn10">
              <p><sup>j</sup>PSIPC: peer-shared information privacy concern.</p>
            </fn>
            <fn id="table1fn11">
              <p><sup>k</sup>GHID: general health information disclosure.</p>
            </fn>
            <fn id="table1fn12">
              <p><sup>l</sup>N/A: not applicable.</p>
            </fn>
            <fn id="table1fn13">
              <p><sup>m</sup>SHID: specific health information disclosure.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Results of the discriminant validity test.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="120"/>
            <col width="90"/>
            <col width="90"/>
            <col width="70"/>
            <col width="70"/>
            <col width="70"/>
            <col width="80"/>
            <col width="80"/>
            <col width="80"/>
            <col width="90"/>
            <col width="80"/>
            <col width="80"/>
            <thead>
              <tr valign="top">
                <td>Construct</td>
                <td>Score, mean (SD)</td>
                <td>CFIP-COLL<sup>a</sup></td>
                <td>CFIP-USU<sup>b</sup></td>
                <td>CFIP-IAC<sup>c</sup></td>
                <td>CFIP-ERR<sup>d</sup></td>
                <td>PrPC-PPC<sup>e</sup></td>
                <td>PrPC-CPC<sup>f</sup></td>
                <td>PrPC-VTPC<sup>g</sup></td>
                <td>PrPC-PRIPC<sup>h</sup></td>
                <td>GHID<sup>i</sup></td>
                <td>SHID<sup>j</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>CFIP-COLL</td>
                <td>4.03 (0.66)</td>
                <td>
                  <italic>0.81</italic>
                  <sup>k</sup>
                </td>
                <td>—<sup>l</sup></td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>CFIP-USU</td>
                <td>4.01 (0.67)</td>
                <td>0.71</td>
                <td>
                  <italic>0.83</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>CFIP-IAC</td>
                <td>3.94 (0.77)</td>
                <td>0.62</td>
                <td>0.66</td>
                <td>
                  <italic>0.81</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>CFIP-ERR</td>
                <td>3.85 (0.82)</td>
                <td>0.67</td>
                <td>0.69</td>
                <td>0.75</td>
                <td>
                  <italic>0.81</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>PrPC-PPC</td>
                <td>3.92 (0.78)</td>
                <td>0.32</td>
                <td>0.35</td>
                <td>0.17</td>
                <td>0.43</td>
                <td>
                  <italic>0.81</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>PrPC-CPC</td>
                <td>3.86 (0.88)</td>
                <td>0.24</td>
                <td>0.39</td>
                <td>0.33</td>
                <td>0.36</td>
                <td>0.68</td>
                <td>
                  <italic>0.81</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>PrPC-VTPC</td>
                <td>3.83 (0.86)</td>
                <td>0.30</td>
                <td>0.28</td>
                <td>0.32</td>
                <td>0.31</td>
                <td>0.74</td>
                <td>0.72</td>
                <td>
                  <italic>0.82</italic>
                </td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>PrPC-PRIPC</td>
                <td>3.87 (0.81)</td>
                <td>0.19</td>
                <td>0.36</td>
                <td>0.31</td>
                <td>0.33</td>
                <td>0.69</td>
                <td>0.70</td>
                <td>0.74</td>
                <td>
                  <italic>0.80</italic>
                </td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>GHID</td>
                <td>3.84 (0.85)</td>
                <td>0.34</td>
                <td>0.32</td>
                <td>0.42</td>
                <td>0.36</td>
                <td>0.35</td>
                <td>0.42</td>
                <td>0.30</td>
                <td>0.49</td>
                <td>
                  <italic>0.80</italic>
                </td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>SHID</td>
                <td>3.81 (0.91)</td>
                <td>0.30</td>
                <td>0.30</td>
                <td>0.38</td>
                <td>0.31</td>
                <td>0.37</td>
                <td>0.38</td>
                <td>0.41</td>
                <td>0.41</td>
                <td>0.53</td>
                <td>
                  <italic>0.83</italic>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>CFIP-COLL: concern for information privacy–collection.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>CFIP-USU: concern for information privacy–unauthorized secondary use.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>CFIP-IAC: concern for information privacy–improper access.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>CFIP-ERR: concern for information privacy–error.</p>
            </fn>
            <fn id="table2fn5">
              <p><sup>e</sup>PrPC-PPC: peer privacy concern–psychological privacy concern.</p>
            </fn>
            <fn id="table2fn6">
              <p><sup>f</sup>PrPC-CPC: peer privacy concern–communication privacy concern.</p>
            </fn>
            <fn id="table2fn7">
              <p><sup>g</sup>PrPC-VTPC: peer privacy concern–virtual territory privacy concern.</p>
            </fn>
            <fn id="table2fn8">
              <p><sup>h</sup>PrPC-PRIPC: peer privacy concern–peer-related information privacy concern.</p>
            </fn>
            <fn id="table2fn9">
              <p><sup>i</sup>GHID: general health information disclosure.</p>
            </fn>
            <fn id="table2fn10">
              <p><sup>j</sup>SHID: specific health information disclosure.</p>
            </fn>
            <fn id="table2fn11">
              <p><sup>k</sup>Italicization represents the square roots of the average variance extracted.</p>
            </fn>
            <fn id="table2fn12">
              <p><sup>l</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Respondents’ Characteristics</title>
        <p><xref ref-type="table" rid="table3">Table 3</xref> shows the participants’ characteristics. The descriptive statistics demonstrate that respondents were fairly distributed across gender, where 52.9% (174/329) were men and 47.1% (155/329) were women. The age range was positively skewed, indicating that most participants were young, with a range between 25 and 34 years (155/329, 47.1%) being high, followed by the range between 35 and 44 years (102/329, 31%). Approximately half (178/329, 54.1%) of the respondents had undergraduate or graduate education levels, which aligns with previous studies highlighting that people with high education levels tend to search more often for web-based health information [<xref ref-type="bibr" rid="ref80">80</xref>]. The annual income was fairly distributed, with income between US $60,000 and US $79,999 showing a high range (135/329, 41%) among the provided categories. Most respondents were White (174/329, 52.9%), followed by Hispanic and African American individuals. Approximately half (174/329, 52.9%) of the respondents reported using Twitter for 4 to 6 years. Overall, 52% (171/329) of the respondents indicated that they had a privacy violation experience at least once (for instance, their account was hacked), and 38.9% (128/329) mentioned that they tried to use a fake account on Twitter (at least once).</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Descriptive statistics (N=329).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="490"/>
            <col width="0"/>
            <col width="480"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variables</td>
                <td>Participants, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Gender</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Men</td>
                <td colspan="2">174 (52.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Women</td>
                <td colspan="2">155 (47.1)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Age group (y)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>18-24</td>
                <td colspan="2">13 (4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>25-34</td>
                <td colspan="2">155 (47.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>35-44</td>
                <td colspan="2">102 (31)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>45-54</td>
                <td colspan="2">33 (10)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>55-64</td>
                <td colspan="2">20 (6.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>≥65</td>
                <td colspan="2">7 (2.1)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Education level</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Elementary</td>
                <td colspan="2">10 (3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>High school</td>
                <td colspan="2">66 (20.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>College</td>
                <td colspan="2">76 (23.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Undergraduate</td>
                <td colspan="2">105 (31.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Graduate</td>
                <td colspan="2">72 (21.9)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Annual income (US $)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#60;20,000</td>
                <td colspan="2">23 (7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>20,000-39,999</td>
                <td colspan="2">59 (17.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>40,000-59,999</td>
                <td colspan="2">49 (14.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>60,000-79,999</td>
                <td colspan="2">135 (41)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>80,000-99,999</td>
                <td colspan="2">46 (14)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>≥100,000</td>
                <td colspan="2">16 (4.9)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Race</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>African American</td>
                <td colspan="2">36 (10.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Asian</td>
                <td colspan="2">23 (7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Hispanic</td>
                <td colspan="2">66 (20.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Native American</td>
                <td colspan="2">13 (4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>White</td>
                <td colspan="2">174 (52.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Mixed</td>
                <td colspan="2">16 (4.9)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Twitter experience (y)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>1-3</td>
                <td colspan="2">63 (19.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>4-6</td>
                <td colspan="2">174 (52.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>7-9</td>
                <td colspan="2">66 (20.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>10-12</td>
                <td colspan="2">20 (6.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#62;12</td>
                <td colspan="2">7 (2.1)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Privacy violation experience (eg, being hacked)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td colspan="2">171 (52)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td colspan="2">158 (48)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Identity misrepresentation (eg, using fake accounts)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td colspan="2">201 (61.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td colspan="2">128 (38.9)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Analysis of the Dimensions</title>
        <p>When implementing second-order variables in a measurement model, there are 2 common approaches: the repeated items approach and the 2-step approach [<xref ref-type="bibr" rid="ref81">81</xref>]. This study used a repeated items approach to measure reflective second-order constructs. In the repeated items approach, the indicators used to measure the second-order construct are included in the measurement model twice: once as indicators of the second-order construct and once as indicators of the corresponding first-order constructs [<xref ref-type="bibr" rid="ref82">82</xref>]. This approach allows for a direct assessment of both the second-order and underlying first-order constructs in a single measurement model. The repeated items approach provides a holistic view of the measurement model by simultaneously assessing the second-order construct and its underlying dimensions [<xref ref-type="bibr" rid="ref83">83</xref>]. Using the repeated items approach provides a more integrated perspective about how CFIP and PrPC are influenced by their respective first-order constructs. It allows for a direct examination of the relationships between the second-order construct and its underlying factors.</p>
        <p>Both CFIP and PrPC are conceptualized as second-order reflective constructs, consistent with existing literature. A reflectively measured construct shares a common theme across subdimensions; the dimensions are expected to be highly correlated [<xref ref-type="bibr" rid="ref84">84</xref>]. <xref ref-type="table" rid="table2">Table 2</xref> shows that, consistent with reflective measurement, the 4 dimensions of CFIP (ie, collection, unauthorized secondary use, improper access, and errors) are highly correlated with each other. As expected, the 4 dimensions of PrPC (ie, psychological, communication, virtual territory, and peer-related information privacy concerns) are also highly correlated. Results show that the 4 dimensions of CFIP, as first-order factors, load significantly on the second-order construct. The loadings were 0.91 for collection, 0.80 for unauthorized secondary use, 0.95 for improper access, and 0.88 for errors. Therefore, the interaction among 4 dimensions reflects CFIP, which shares a common theme of losing control over information privacy owing to companies’ sharing behaviors. Furthermore, the 4 dimensions of PrPC also load significantly on the second-order construct. The loadings were 0.90 for psychological privacy concerns, 0.92 for communication privacy concerns, 0.86 for virtual territory privacy concerns, and 0.95 for peer-related information privacy concerns. Thus, interactions among these 4 dimensions represent PrPC, which exhibits a shared theme of privacy concerns about losing personal control owing to web-based peer behaviors.</p>
      </sec>
      <sec>
        <title>Structural Model and Path Analysis</title>
        <p>Consistent with privacy literature, we controlled variables such as age, gender, education, years of experience, privacy violation experience, and misrepresentation of identity in the structural model [<xref ref-type="bibr" rid="ref42">42</xref>]. Findings demonstrate that when the control variables are present, the coefficients and <italic>R</italic><sup>2</sup> change significantly. Specifically, when age (β=−.12; <italic>P</italic>=.01, education (β=.19; <italic>P</italic>=.003), and privacy violation experience (β=−.58; <italic>P=</italic>.008) are present in the model, they significantly influence health information disclosure. Thus, the findings confirm that young people with high education levels who have not experienced privacy violations are more likely to disclose health information on Twitter. However, no effects of gender, years of experience, and misrepresentation of identity were found on health information–sharing behaviors. We used the structural equation model technique<bold> </bold>to analyze the factors affecting health information disclosure on Twitter. The results of model fit indexes exhibit a good fit with the goodness-of-fit indexes (<italic>χ</italic><sup>2</sup><sub>353</sub>=2.2; goodness-of-fit index=0.84; adjusted goodness-of-fit index=0.81; comparative fit index=0.90; normed fit index=0.91; incremental fit index=0.90; standardized root mean square residual=0.03; and root mean square error of approximation=0.04) where all indexes meet their recommended cutoff values [<xref ref-type="bibr" rid="ref85">85</xref>]. <xref ref-type="table" rid="table4">Table 4</xref> depicts the summary of path analysis for 4 hypotheses (ie, H1A, H1B, H2A, and H2B).</p>
        <p><xref rid="figure2" ref-type="fig">Figure 2</xref> shows the standardized path coefficients of the structural model. Support is not found for H1A, which proposes that CFIP significantly influences general health information disclosure on Twitter (β=−.07; <italic>P</italic>=0.16). In contrast, the findings support H1B by confirming that CFIP significantly attenuates sharing behaviors when disclosing specific health information on Twitter (β=−.43; <italic>P</italic>&#60;.001). H2A, which posits that PrPC would directly affect the disclosure of general health information on Twitter, is supported (β=−.38; <italic>P</italic>&#60;.001). The analysis also exhibits that PrPC negatively shapes the sharing of specific health information on Twitter (β=−.72; <italic>P</italic>&#60;.001), and this significant relationship supports H2B.</p>
        <p>Regarding H1C and H2C, an alternative model was created for each hypothesis, and the 2 relationships in that hypothesis were constrained [<xref ref-type="bibr" rid="ref86">86</xref>]. Next, a 2-tailed <italic>t</italic> test was used to compare the difference between the alternative and the original model. H1C posits a significant difference between the impact of CFIP on general and specific information–sharing behaviors. As the <italic>t</italic> value was significant (<italic>t</italic><sub>165</sub>=3.45; <italic>P</italic>&#60;.001), we confirm that CFIP imposes a more negative effect on specific health information dissemination than on sharing general health information on Twitter. In addition, H2C proposes that people may disclose more general health information than specific health information owing to peer-related privacy concerns. The <italic>t</italic> value was significant (<italic>t</italic><sub>165</sub>=4.72; <italic>P</italic>&#60;.001); thus, the effect of PrPC was more prominent in specific health information sharing than in disclosing general health information on Twitter.</p>
        <p>Finally, the model explains 41% of the variance in general health information disclosure and 67% in specific health information sharing on Twitter. The <italic>R</italic><sup>2</sup> scores suggest that the 2 aspects of information privacy concerns (ie, concerns about the web-based practices of companies and peers’ behaviors) can provide reliable explanatory power to predict the variance in sharing general and specific health information.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Path analysis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="140"/>
            <col width="280"/>
            <col width="220"/>
            <col width="90"/>
            <col width="120"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td>Hypothesis</td>
                <td>Path</td>
                <td>Standardized coefficient, β</td>
                <td>SE</td>
                <td>Critical ratio</td>
                <td>Results</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1A</td>
                <td>CFIP<sup>a</sup>–general health information disclosure</td>
                <td>−.07</td>
                <td>0.04</td>
                <td>1.54</td>
                <td>Not supported</td>
              </tr>
              <tr valign="top">
                <td>1B</td>
                <td>CFIP–specific health information disclosure</td>
                <td>−.43<sup>b</sup></td>
                <td>0.03</td>
                <td>4.21</td>
                <td>Supported</td>
              </tr>
              <tr valign="top">
                <td>2A</td>
                <td>PrPC<sup>c</sup>–general health information disclosure</td>
                <td>−.38<sup>b</sup></td>
                <td>0.05</td>
                <td>5.37</td>
                <td>Supported</td>
              </tr>
              <tr valign="top">
                <td>2B</td>
                <td>PrPC–specific health information disclosure</td>
                <td>−.72<sup>b</sup></td>
                <td>0.05</td>
                <td>7.12</td>
                <td>Supported</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>CFIP: concern for information privacy.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>Significance level, <italic>P</italic>&#60;.001.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>PrPC: peer privacy concern.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Model paths. H1A: hypothesis 1A; H1B: hypothesis 1B; H2A: hypothesis 2A; H2B: hypothesis 2B; *<italic>P</italic>&#60;.001.</p>
          </caption>
          <graphic xlink:href="formative_v8i1e45573_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Information sharing is one of the most important objectives of social media. People use Twitter for conversation, and information sharing can initiate a web-based exchange of ideas about an issue. As health information is more sensitive than other types of personal information, disclosing such data can raise privacy concerns. Most previous studies have mainly focused on privacy concerns related to companies and vendors as they may collect and use individuals’ personal information for other purposes or may not properly protect the collected information [<xref ref-type="bibr" rid="ref87">87</xref>]. Few studies have also explained privacy concerns related to the web-based behaviors of peers [<xref ref-type="bibr" rid="ref22">22</xref>]. However, previous literature did not consider both sides of information privacy concerns in a model in the context of social media. Moreover, disclosure behaviors on social media can be contingent upon the type of health information owing to sensitivity levels. Few studies have examined the sharing behaviors based on the unique characteristics of general and specific health information [<xref ref-type="bibr" rid="ref86">86</xref>].</p>
        <p>Although both antecedents (CFIP and PrPC) have been examined separately in previous studies, this study’s findings could propose scientific novelty. The study differs from previous research in this field because we integrated 2 aspects of privacy concerns (eg, related to companies and peers) to investigate the disclosure of general and specific health information on Twitter. In this study, we examined whether both aspects of information privacy concerns can jointly influence sharing decisions related to health-related information or whether the effect of one aspect can be overshadowed by the other; for instance, whether the nature of the relationships and contexts with 2 different information trustees (ie, vendors and peers) can influence people to share their health information on Twitter. The findings indicate that privacy concerns related to companies play a more significant role in predicting specific health information than in predicting general health information. Privacy concerns related to companies’ practices reflect the collection and misuse of health information by vendors, such as concerns about using health information for data mining and research purposes [<xref ref-type="bibr" rid="ref88">88</xref>]. Our findings demonstrate that Twitter users are more concerned about vendors and companies using or sharing their personal health information than general health information. Thus, the dimensions of CFIP (ie, collection, unauthorized secondary use, improper access, and errors) become salient only when people want to disclose specific health information (such as information about their chronic diseases, signs, and symptoms or personal health status). Sharing public health information about hospitals, medical costs, and medications is not significantly affected by concerns about how companies may use such information. A plausible justification is that general health information cannot reflect any personal information associated with an individual, and even if it is used for data mining or big data analysis, it will not violate the user’s privacy needs. Consistent with previous studies [<xref ref-type="bibr" rid="ref89">89</xref>], individuals may deliberately want to share general health information on social media to increase public awareness and knowledge about a medical situation, such as COVID-19 symptoms and vaccination. Regardless of information accuracy or misinformation, users may engage in sharing their general medical knowledge and public information about treatment options with almost no or minor privacy concerns related to companies and vendors’ collection and use practices.</p>
        <p>Our results also show that peer-related privacy concerns can significantly shape both general and specific health information sharing on Twitter. Although Twitter is not the same as web-based health communities designed to share health information, many individuals use tweets to share personal and public health information [<xref ref-type="bibr" rid="ref90">90</xref>]. Web-based interactions with peers may affect their sharing behaviors as they may feel unable to control who can see, comment on, or exchange the health information they share on Twitter. The dimensions of PrPC (ie, psychological, communication, virtual territory, and peer-related information privacy concerns) are important factors in predicting how users may disclose public and personal health information. However, peer-related privacy concerns are more intense for sharing personal than general health information. This finding indicates that when a user wants to share public information about a disease (for instance, cancer, COVID-19, or HIV), they are still concerned about how peers relate such general information to their profile. This concern becomes more salient when the user decides to reveal personal health information about that disease, such as what treatments or medications they are using daily or what medical procedures they will undergo in the future. Previous studies associate sharing personal health information related to physical health problems or mental disorders on web-based P2P networks with stigma [<xref ref-type="bibr" rid="ref91">91</xref>]. The more sensitive the health information, the more stigma is attached to sharing such information with peers. Thus, being judged by peers (close friends and other web-based users) because of sharing personal health information may prevent them from disclosing that content on Twitter.</p>
        <p>Although results show significant impacts of both aspects of privacy concerns on sharing specific health information on Twitter, peer-related privacy concerns are leading factors in shaping personal health information disclosure, more so than privacy concerns associated with companies and third parties. This result confirms the importance of web-based interactions with peers on social media and how to deal with their sharing behaviors, such as commenting or tagging [<xref ref-type="bibr" rid="ref60">60</xref>]. This finding implies the critical effects of Twitter friends and the circle of people who can see and share tweets about private health information. Individuals may be first concerned about the Twitter circle and how peers would react to the shared personal information about health status and then become worried about how many companies may access such data and how they would use or share them. Thus, secondary dissemination of personal health information by web-based peers through liking, reposting, retweeting, or commenting on posts is more challenging to the maintenance of privacy controls than secondary use of data or unauthorized access to such private information by companies and vendors. Our finding that peer-related privacy concerns have a strong impact on health information sharing compared with privacy concerns associated with companies and third parties offers a counternarrative to prevalent assumptions in digital privacy research. This could be attributed to Twitter’s highly interactive and public nature, which might accentuate peer-related concerns. Previous studies, mainly those conducted in the context of web-based shopping or general social media use, might have overestimated the role of concerns associated with companies and third parties owing to the commercial and private nature of these web-based activities.</p>
      </sec>
      <sec>
        <title>Theoretical Implications</title>
        <p>This study may offer some theoretical contributions. First, our findings have implications for information privacy research in social media by integrating the existing privacy concern perspectives. This study can open up the discussions through which privacy needs related to companies, third parties, and peer-related aspects can be addressed. Then, this comprehensive mechanism may strongly affect users’ sharing behavior patterns. Second, this study distinguishes the differences between sharing public and private health information on Twitter. Although disclosing specific health information may help share personal experiences related to various medical situations that could be useful for peers, it is more challenging than disseminating general health information. The findings demonstrate how company-related and peer-related privacy concerns could shape the 2 types of information-sharing behaviors. Third, this study investigates the effects of information privacy mechanisms on health information sharing in the context of Twitter. The findings can promote discussions about health information disclosure in other P2P networks such as other social media platforms, virtual worlds, or Metaverse. Fourth, exploring the determinants of information sharing regarding different types of privacy concerns can expand our current understanding of knowledge acquisition. As sharing both general and specific health information on social media can contribute to people’s medical knowledge, addressing the barriers to specific health information sharing and removing the privacy challenges can significantly help the procedures of medical knowledge acquisition from web-based interactions with peers.</p>
        <p>The study contributes significantly to the theoretical understanding of privacy concerns in web-based health information sharing. The evidence that peer-related privacy concerns influence more strongly than those related to companies and third parties highlights a potential oversight in theoretical perspectives. Current theories largely view companies as the predominant source of digital privacy concerns, and this may need re-evaluation. The results extend existing theories by emphasizing the role of peer interactions in privacy concerns, particularly in public and highly interactive web-based environments such as Twitter. This recognition of the social dimension of privacy concerns could be integrated into existing theoretical models to provide a more comprehensive framework for web-based privacy behavior. Furthermore, although our study is specific to Twitter and health information, the insights gained may have broad applicability. The potential role of peer-related privacy concerns could be a valuable area of exploration in other social media contexts and in sharing other types of sensitive information. Thus, our findings open up new avenues for theoretical exploration and suggest a need for further studies to fully understand the complexities of privacy behavior in the digital age.</p>
        <p>Unlike other research approaches, such as experiments, observational data, or qualitative interviews to assess privacy concerns and information sharing, our study used a quantitative survey approach. This allowed us to capture data from a large and more diverse sample, providing a more robust and generalizable understanding of privacy concerns in web-based health information sharing. The strength of our quantitative approach lies in its ability to establish clear patterns and relationships among various factors influencing privacy concerns. This enabled us to derive a more comprehensive and systematic understanding of the factors that significantly influence privacy concerns and health information sharing on Twitter. In terms of comparison, our findings offer a novel perspective about the role of peer-related privacy concerns in shaping web-based health information–sharing behaviors. Previous studies have predominantly focused on company-related and third party–related privacy concerns. However, our study highlighted the paramount influence of peer-related privacy concerns, thus suggesting a reorientation of focus in subsequent research efforts in this area. Our study also provides quantifiable evidence about the relative influence of peer-related privacy concerns and such privacy concerns associated with companies and third parties on Twitter users’ health information–sharing behaviors. Such quantifiable insights could serve as valuable benchmarks for future studies seeking to measure and compare similar variables in different contexts or on different platforms. Our survey methodology, coupled with a comparative analysis of the findings, underscores the contribution of our study to the field, offering both nuanced insights and broad trends that enrich our understanding of privacy concerns and health information sharing on social media platforms.</p>
      </sec>
      <sec>
        <title>Practical Contributions</title>
        <p>This study also provides several practical and technical implications for promoting privacy protection on Twitter. To promote the sharing of specific health information, it is essential to address privacy concerns related to both companies and peers. However, addressing peer-related privacy concerns is vital to encourage the disclosure of general health information. This is because concerns related to companies and third parties do not significantly predict general health information sharing. Thus, a robust privacy policy cannot be developed regardless of information type. As the 2 types of health information require different ways of satisfying privacy needs, mechanisms and regulations facilitating general and specific health information sharing cannot be the same. Depending on the type of health information, it is essential to customize the ability of Twitter users to control their self-concept and meet different privacy protection requirements. General procedures and privacy policies to regulate the dissemination and use of personal posts are not sufficient to address the information privacy concerns. Twitter should allay users’ privacy concerns about sharing specific health information using advanced technology and management mechanisms. For example, Twitter can enable individuals to restrict access to their shared personal health information. Punitive regulations can be established for inappropriate behaviors (such as retweeting without consent) that may discourage sharing specific health information. All controlling mechanisms and privacy protection functionalities should be easy to understand and use and should not be an additional burden on the users.</p>
        <p>As the 2 aspects (company-related and peer-related aspects) of privacy concerns manifest in several dimensions, different features can be developed to address the need for effective protection mechanisms. Twitter can add a new feature to tweets, enabling users to identify the sensitivity of posts related to health information. The content will be recognized as a private post if the sensitivity score (eg, calculated based on a scale ranging from 1 to 10) is more than average. Then, that post is automatically restricted from exposure to everyone, and users can share their thoughts and experiences only with a small crowd. Users can also define terms and conditions for peers who want to retweet sensitive posts. For instance, a “request for share” button can appear for each sensitive post, and peers can only share the posts when they get approval from the focal users. Given our findings, Twitter could introduce a feature that allows users to select the audience for their health-related posts, thereby addressing peer-related privacy concerns. They could also introduce a “Health Information” mode that automatically applies high privacy settings for tweets marked as health related. In addition, given the significant role of knowledge in shaping privacy concerns, Twitter should consider educational campaigns or prompts to inform users about these features and the importance of privacy when sharing health information.</p>
        <p>In May 2022, Elon Musk called for further investigation into the accuracy of spam and fake account estimates, which Twitter announced to be &#60;5%. Fake and spam accounts could lead to undesirable social interactions with peers, unwanted peer-shared information, and an unpleasant web-based social environment. Twitter needs to use new procedures to detect spam and fake accounts and better control the functionality of Twitter bots to provide a more appropriate web-based social platform. This new mechanism could automatically limit the visibility of private posts containing highly sensitive health information to everyone, even to people who users follow. On the basis of the current Twitter privacy policy, people can mention who can reply to a specific tweet. However, it is hard to confirm who can actually see the posts because of bots and recommendation agents.</p>
        <p>Social bots use computer algorithms to artificially create content and interact with people on social media [<xref ref-type="bibr" rid="ref92">92</xref>]. Twitter bots can be manipulative and purposely change people’s attitudes and opinions about a topic [<xref ref-type="bibr" rid="ref93">93</xref>]. For instance, bots can share posts with peers who are not following a user but usually read posts with health information content. The existence of bots may be useful for sharing general information but can be very harmful because it can increase exposure to private posts with sensitive health information. A plausible recommendation is to add a new category for sensitive content (such as specific health information) besides the photo, graphics interchange format (GIF), and poll categories. Then, users can create a new circle of people who are allowed to see, reply to, or share these sensitive posts. Users can also customize the configuration and limit the possible unwanted interactions by selecting who can see the posts but cannot share them. This small crowd can be saved for future use and can be easily modified later. The advantage of this new category is that people are notified to customize their Twitter circle depending on different content (eg, highly sensitive, semisensitive, and nonsensitive). For instance, a user can select everyone to see and comment on posts containing information about cryptocurrency, high-technology companies, or humanitarian issues. In contrast, the user can select a group of followers to see their thoughts about general health information and choose only a few close friends to see and comment on posts with sensitive health information.</p>
        <p>Stringent privacy policies are required to enable Twitter users to limit who (ie, peers) can view, comment on, and share web-based content. People should be able to easily edit with whom they can share health information to exercise control over their personal digital information. Spambots on Twitter should also be controlled, modified, or filtered because they can involve potentially deceptive, harmful, or annoying activities. A more transparent policy is required to detect and deactivate invasive Twitter bots that can automatically like or retweet users’ postings without consent.</p>
        <p>Finally, the insights from our study are not only limited to Twitter but also have implications for other social media platforms where users might share health information. Such platforms should recognize the significant role of peer-related privacy concerns and consider introducing similar audience control features. Health professionals and health-related organizations using social media for patient engagement should also be aware of these concerns and take steps to ensure that their communication respects patient privacy. Policy makers should consider our findings when developing regulations for health information sharing on social media to ensure that they address the most significant privacy concerns.</p>
      </sec>
      <sec>
        <title>Limitations and Future Studies</title>
        <p>Our study also has some limitations that can be considered as opportunities for future studies. First, a web-based survey through MTurk was used to collect data, which may be biased toward people familiar with crowdsourcing platforms. Future studies can use other data collection and sampling strategies, such as collecting data directly from Twitter. Second, we collected data from 329 Twitter users, which may not be a good representative of Twitter users. Next, studies can increase the sample size to reduce sampling bias and improve the generalizability of the findings. Third, we did not consider the effects of cultural dimensions (such as individualism, uncertainty avoidance, etc) on sharing health information on Twitter. It can be interesting for future studies to explore the effect of culture on disclosing different types of health information on social media. Fourth, our study tests a model to analyze health information sharing from the perspective of privacy concerns. However, there may be other essential variables. More studies are required to examine other factors inhibiting and promoting sharing behaviors on social media, such as reputation, incentives, trust, stigma, and social support. Fifth, this study did not examine the accuracy of the health information shared on Twitter or the risks of misinformation because it is not within the scope of this study. Future studies could expand upon our results to investigate the role of misinformation risks in information-sharing behaviors. Finally, our study focused on Twitter as a study context. We encourage future studies to extend the proposed model to other social media platforms (eg, Facebook, TikTok, and Instagram) where web-based interactions with peers are essential.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This study provides insights into health information sharing on Twitter from a privacy perspective. The findings propose that including CFIP and PrPC constructs can help in better conceptualization of information privacy concerns in the context of social media. The integration of these 2 aspects of information privacy can expand the discussion about internet privacy by addressing the privacy needs associated with the practices of companies, such as collection, unauthorized secondary use, improper access, and errors. It also considers psychological privacy concerns, communication privacy concerns, peers’ sharing behaviors, and territory privacy concerns related to peers in such interpersonal interactions. This interactive approach can provide a more comprehensive analysis of information privacy (related to web-based vendors and web-based peers) and adds a more substantial explanation of privacy needs on social media channels (such as Twitter). Privacy concerns may not always prohibit disclosure behaviors on Twitter; it depends on the type of health information. The findings demonstrate that peer-related privacy concerns are more salient to predicting general and specific health information sharing on Twitter than privacy concerns related to companies and third parties. The results could propose practical contributions by shedding more light on the negative impacts of web-based peer behaviors on losing personal control over digital communications and information access. Privacy policies should focus on companies’ practices, such as sharing users’ information with third parties for big data analytics. We suggest mitigating privacy concerns and promoting health information sharing on Twitter by creating policies that tailor privacy needs to the type of health information shared (ie, general or specific).</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Web-based survey—measuring items.</p>
        <media xlink:href="formative_v8i1e45573_app1.docx" xlink:title="DOCX File , 15 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AVE</term>
          <def>
            <p>average variance extracted</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CDC</term>
          <def>
            <p>Centers for Disease Control and Prevention</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CFIP</term>
          <def>
            <p>concern for information privacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">GIF</term>
          <def>
            <p>graphics interchange format</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">H1A</term>
          <def>
            <p>hypothesis 1A</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">H1B</term>
          <def>
            <p>hypothesis 1B</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">H1C</term>
          <def>
            <p>hypothesis 1C</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">H2A</term>
          <def>
            <p>hypothesis 2A</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">H2B</term>
          <def>
            <p>hypothesis 2B</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">H2C</term>
          <def>
            <p>hypothesis 2C</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">MTurk</term>
          <def>
            <p>Mechanical Turk</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">P2P</term>
          <def>
            <p>peer-to-peer</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">PrPC</term>
          <def>
            <p>peer privacy concern</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <notes>
      <sec>
        <title>Data Availability</title>
        <p>The data sets generated and analyzed during this study are available from the corresponding author upon reasonable request.</p>
      </sec>
    </notes>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benetoli</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>TF</given-names>
            </name>
            <name name-style="western">
              <surname>Aslani</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Consumer health-related activities on social media: exploratory study</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>10</month>
          <day>13</day>
          <volume>19</volume>
          <issue>10</issue>
          <fpage>e352</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/10/e352/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.7656</pub-id>
          <pub-id pub-id-type="medline">29030326</pub-id>
          <pub-id pub-id-type="pii">v19i10e352</pub-id>
          <pub-id pub-id-type="pmcid">PMC5660293</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alvarez-Mon</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Asunsolo Del Barco</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lahera</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Quintero</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ferre</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Pereira-Sanchez</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Ortuño</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Alvarez-Mon</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Increasing interest of mass communication media and the general public in the distribution of tweets about mental disorders: observational study</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>05</month>
          <day>28</day>
          <volume>20</volume>
          <issue>5</issue>
          <fpage>e205</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/5/e205/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9582</pub-id>
          <pub-id pub-id-type="medline">29807880</pub-id>
          <pub-id pub-id-type="pii">v20i5e205</pub-id>
          <pub-id pub-id-type="pmcid">PMC5996178</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laranjo</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Arguel</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Neves</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Gallagher</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Kaplan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mortimer</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Mendes</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Lau</surname>
              <given-names>AY</given-names>
            </name>
          </person-group>
          <article-title>The influence of social networking sites on health behavior change: a systematic review and meta-analysis</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2015</year>
          <month>01</month>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>243</fpage>
          <lpage>56</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/25005606"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2014-002841</pub-id>
          <pub-id pub-id-type="medline">25005606</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2014-002841</pub-id>
          <pub-id pub-id-type="pmcid">PMC4433372</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moorhead</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Hazlett</surname>
              <given-names>DE</given-names>
            </name>
            <name name-style="western">
              <surname>Harrison</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Carroll</surname>
              <given-names>JK</given-names>
            </name>
            <name name-style="western">
              <surname>Irwin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hoving</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A new dimension of health care: systematic review of the uses, benefits, and limitations of social media for health communication</article-title>
          <source>J Med Internet Res</source>
          <year>2013</year>
          <month>04</month>
          <day>23</day>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>e85</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2013/4/e85/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.1933</pub-id>
          <pub-id pub-id-type="medline">23615206</pub-id>
          <pub-id pub-id-type="pii">v15i4e85</pub-id>
          <pub-id pub-id-type="pmcid">PMC3636326</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Social media use in 2018</article-title>
          <source>Pew Research Center</source>
          <year>2018</year>
          <month>3</month>
          <day>1</day>
          <access-date>2023-02-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/internet/2018/03/01/social-media-use-in-2018/">https://www.pewresearch.org/internet/2018/03/01/social-media-use-in-2018/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Corsi</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>DD</given-names>
            </name>
            <name name-style="western">
              <surname>Butaney</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Majdalany</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Corsi</surname>
              <given-names>MP</given-names>
            </name>
            <name name-style="western">
              <surname>Malchow</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Piontkowski</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Trinh</surname>
              <given-names>QD</given-names>
            </name>
            <name name-style="western">
              <surname>Loeb</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Abdollah</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Top 100 urology influencers on Twitter: is social media influence associated with academic impact?</article-title>
          <source>Eur Urol Focus</source>
          <year>2023</year>
          <month>03</month>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>396</fpage>
          <lpage>402</lpage>
          <pub-id pub-id-type="doi">10.1016/j.euf.2022.09.009</pub-id>
          <pub-id pub-id-type="medline">36210295</pub-id>
          <pub-id pub-id-type="pii">S2405-4569(22)00216-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Taft</surname>
              <given-names>TH</given-names>
            </name>
            <name name-style="western">
              <surname>Charabaty</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Social media in inflammatory bowel disease: the patient and physician perspective</article-title>
          <source>Curr Opin Gastroenterol</source>
          <year>2021</year>
          <month>07</month>
          <day>01</day>
          <volume>37</volume>
          <issue>4</issue>
          <fpage>328</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1097/MOG.0000000000000742</pub-id>
          <pub-id pub-id-type="medline">33859103</pub-id>
          <pub-id pub-id-type="pii">00001574-202107000-00006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saura</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Palacios-Marqués</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ribeiro-Soriano</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns in social media UGC communities: understanding user behavior sentiments in complex networks</article-title>
          <source>Inf Syst E-Bus Manage</source>
          <year>2023</year>
          <month>03</month>
          <day>11</day>
          <pub-id pub-id-type="doi">10.1007/s10257-023-00631-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Appari</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Information security and privacy in healthcare: current state of research</article-title>
          <source>Intl J Internet Enterp Manage</source>
          <year>2010</year>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>279</fpage>
          <pub-id pub-id-type="doi">10.1504/ijiem.2010.035624</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eichstaedt</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Merchant</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Ungar</surname>
              <given-names>LH</given-names>
            </name>
            <name name-style="western">
              <surname>Crutchley</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Preoţiuc-Pietro</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Asch</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Schwartz</surname>
              <given-names>HA</given-names>
            </name>
          </person-group>
          <article-title>Facebook language predicts depression in medical records</article-title>
          <source>Proc Natl Acad Sci USA</source>
          <year>2018</year>
          <month>10</month>
          <day>15</day>
          <volume>115</volume>
          <issue>44</issue>
          <fpage>11203</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1073/pnas.1802331115</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schwartz</surname>
              <given-names>HA</given-names>
            </name>
            <name name-style="western">
              <surname>Eichstaedt</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kern</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sap</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Stillwell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kosinski</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Towards assessing changes in degree of depression through Facebook</article-title>
          <year>2014</year>
          <conf-name>Workshop on Computational Linguistics and Clinical Psychology: From Linguistic Signal to Clinical Reality</conf-name>
          <conf-date>June 27, 2004</conf-date>
          <conf-loc>Baltimore, MD</conf-loc>
          <pub-id pub-id-type="doi">10.3115/v1/w14-3214</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Calix</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Bernard</surname>
              <given-names>GR</given-names>
            </name>
          </person-group>
          <article-title>Identifying personal health experience tweets with deep neural networks</article-title>
          <year>2017</year>
          <conf-name>39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)</conf-name>
          <conf-date>July 11-15, 2017</conf-date>
          <conf-loc>Jeju, Korea (South)</conf-loc>
          <pub-id pub-id-type="doi">10.1109/embc.2017.8037039</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fish</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hatton</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chauhan</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>“Tell me what they do to my body”: a survey to find out what information people with learning disabilities want with their medications</article-title>
          <source>Brit J Learn Disabil</source>
          <year>2017</year>
          <month>07</month>
          <day>10</day>
          <volume>45</volume>
          <issue>3</issue>
          <fpage>217</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1111/bld.12196</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>BB</given-names>
            </name>
          </person-group>
          <article-title>Self-disclosure on social networking sites, positive feedback, and social capital among Chinese college students</article-title>
          <source>Comput Hum Behav</source>
          <year>2014</year>
          <month>09</month>
          <volume>38</volume>
          <fpage>213</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2014.06.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kshetri</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Big data׳s impact on privacy, security and consumer welfare</article-title>
          <source>Telecomm Policy</source>
          <year>2014</year>
          <month>12</month>
          <volume>38</volume>
          <issue>11</issue>
          <fpage>1134</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1016/j.telpol.2014.10.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Price</surname>
              <given-names>WN 2nd</given-names>
            </name>
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>IG</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the age of medical big data</article-title>
          <source>Nat Med</source>
          <year>2019</year>
          <month>01</month>
          <day>7</day>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>37</fpage>
          <lpage>43</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30617331"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41591-018-0272-7</pub-id>
          <pub-id pub-id-type="medline">30617331</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-018-0272-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC6376961</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ozdemir</surname>
              <given-names>ZD</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Benamati</surname>
              <given-names>JH</given-names>
            </name>
          </person-group>
          <article-title>Antecedents and outcomes of information privacy concerns in a peer context: an exploratory study</article-title>
          <source>Eur J Inf Syst</source>
          <year>2018</year>
          <month>02</month>
          <day>15</day>
          <volume>26</volume>
          <issue>6</issue>
          <fpage>642</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1057/s41303-017-0056-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeung</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Kletecka-Pulker</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Eibensteiner</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Plunger</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Völkl-Kernstock</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Willschke</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Atanasov</surname>
              <given-names>AG</given-names>
            </name>
          </person-group>
          <article-title>Implications of Twitter in health-related research: a landscape analysis of the scientific literature</article-title>
          <source>Front Public Health</source>
          <year>2021</year>
          <month>7</month>
          <day>9</day>
          <volume>9</volume>
          <fpage>654481</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34307273"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpubh.2021.654481</pub-id>
          <pub-id pub-id-type="medline">34307273</pub-id>
          <pub-id pub-id-type="pmcid">PMC8299201</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sinnenberg</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Buttenheim</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Padrez</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mancheno</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ungar</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Merchant</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>Twitter as a tool for health research: a systematic review</article-title>
          <source>Am J Public Health</source>
          <year>2017</year>
          <month>01</month>
          <volume>107</volume>
          <issue>1</issue>
          <fpage>e1</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.2016.303512</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bansal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sofat</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Who is who on Twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time</article-title>
          <source>Cybern Syst</source>
          <year>2018</year>
          <month>01</month>
          <day>22</day>
          <volume>49</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1080/01969722.2017.1412866</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information privacy research: an interdisciplinary review</article-title>
          <source>MIS Q</source>
          <year>2011</year>
          <month>12</month>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>989</fpage>
          <lpage>1015</lpage>
          <pub-id pub-id-type="doi">10.2307/41409970</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Karahanna</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Peer privacy concerns: conceptualization and measurement</article-title>
          <source>MIS Q</source>
          <year>2022</year>
          <volume>46</volume>
          <issue>1</issue>
          <fpage>491</fpage>
          <lpage>530</lpage>
          <pub-id pub-id-type="doi">10.25300/MISQ/2022/14861</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A privacy preservation model for health-related social networking sites</article-title>
          <source>J Med Internet Res</source>
          <year>2015</year>
          <month>07</month>
          <day>08</day>
          <volume>17</volume>
          <issue>7</issue>
          <fpage>e168</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2015/7/e168/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.3973</pub-id>
          <pub-id pub-id-type="medline">26155953</pub-id>
          <pub-id pub-id-type="pii">v17i7e168</pub-id>
          <pub-id pub-id-type="pmcid">PMC4526982</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Valdez</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ten Thij</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bathina</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rutter</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Bollen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Social media insights into US mental health during the COVID-19 pandemic: longitudinal analysis of Twitter data</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>12</month>
          <day>14</day>
          <volume>22</volume>
          <issue>12</issue>
          <fpage>e21418</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/12/e21418/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/21418</pub-id>
          <pub-id pub-id-type="medline">33284783</pub-id>
          <pub-id pub-id-type="pii">v22i12e21418</pub-id>
          <pub-id pub-id-type="pmcid">PMC7744146</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grover</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kar</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Davies</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>“Technology enabled health” – insights from Twitter analytics with a socio-technical perspective</article-title>
          <source>Int J Inf Manage</source>
          <year>2018</year>
          <month>12</month>
          <volume>43</volume>
          <fpage>85</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2018.07.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chew</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Eysenbach</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Pandemics in the age of Twitter: content analysis of tweets during the 2009 H1N1 outbreak</article-title>
          <source>PLoS One</source>
          <year>2010</year>
          <month>11</month>
          <day>29</day>
          <volume>5</volume>
          <issue>11</issue>
          <fpage>e14118</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0014118"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0014118</pub-id>
          <pub-id pub-id-type="medline">21124761</pub-id>
          <pub-id pub-id-type="pmcid">PMC2993925</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chunara</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Andrews</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Brownstein</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>Social and news media enable estimation of epidemiological patterns early in the 2010 Haitian cholera outbreak</article-title>
          <source>Am J Trop Med Hyg</source>
          <year>2012</year>
          <month>01</month>
          <volume>86</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <lpage>45</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/22232449"/>
          </comment>
          <pub-id pub-id-type="doi">10.4269/ajtmh.2012.11-0597</pub-id>
          <pub-id pub-id-type="medline">22232449</pub-id>
          <pub-id pub-id-type="pii">86/1/39</pub-id>
          <pub-id pub-id-type="pmcid">PMC3247107</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sarker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>O'Connor</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ginn</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Scotch</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Malone</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gonzalez</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Social media mining for toxicovigilance: automatic monitoring of prescription medication abuse from Twitter</article-title>
          <source>Drug Saf</source>
          <year>2016</year>
          <month>03</month>
          <day>9</day>
          <volume>39</volume>
          <issue>3</issue>
          <fpage>231</fpage>
          <lpage>40</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26748505"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s40264-015-0379-4</pub-id>
          <pub-id pub-id-type="medline">26748505</pub-id>
          <pub-id pub-id-type="pii">10.1007/s40264-015-0379-4</pub-id>
          <pub-id pub-id-type="pmcid">PMC4749656</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reavley</surname>
              <given-names>NJ</given-names>
            </name>
            <name name-style="western">
              <surname>Pilkington</surname>
              <given-names>PD</given-names>
            </name>
          </person-group>
          <article-title>Use of Twitter to monitor attitudes toward depression and schizophrenia: an exploratory study</article-title>
          <source>PeerJ</source>
          <year>2014</year>
          <volume>2</volume>
          <fpage>e647</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/25374786"/>
          </comment>
          <pub-id pub-id-type="doi">10.7717/peerj.647</pub-id>
          <pub-id pub-id-type="medline">25374786</pub-id>
          <pub-id pub-id-type="pii">647</pub-id>
          <pub-id pub-id-type="pmcid">PMC4217192</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>DeCamp</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dredze</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chisolm</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Berger</surname>
              <given-names>ZD</given-names>
            </name>
          </person-group>
          <article-title>What are health-related users tweeting? a qualitative content analysis of health-related users and their messages on Twitter</article-title>
          <source>J Med Internet Res</source>
          <year>2014</year>
          <month>10</month>
          <day>15</day>
          <volume>16</volume>
          <issue>10</issue>
          <fpage>e237</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2014/10/e237/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.3765</pub-id>
          <pub-id pub-id-type="medline">25591063</pub-id>
          <pub-id pub-id-type="pii">v16i10e237</pub-id>
          <pub-id pub-id-type="pmcid">PMC4296104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Scanfeld</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Scanfeld</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Larson</surname>
              <given-names>EL</given-names>
            </name>
          </person-group>
          <article-title>Dissemination of health information through social networks: Twitter and antibiotics</article-title>
          <source>Am J Infect Control</source>
          <year>2010</year>
          <month>04</month>
          <volume>38</volume>
          <issue>3</issue>
          <fpage>182</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/20347636"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ajic.2009.11.004</pub-id>
          <pub-id pub-id-type="medline">20347636</pub-id>
          <pub-id pub-id-type="pii">S0196-6553(10)00034-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC3601456</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Social media analytics for enterprises: typology, methods, and processes</article-title>
          <source>Bus Horiz</source>
          <year>2018</year>
          <month>03</month>
          <volume>61</volume>
          <issue>2</issue>
          <fpage>199</fpage>
          <lpage>210</lpage>
          <pub-id pub-id-type="doi">10.1016/j.bushor.2017.11.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Valaitis</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Akhtar-Danesh</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Brooks</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Binks</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Semogas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Online communities of practice as a communication resource for community health nurses working with homeless persons</article-title>
          <source>J Adv Nurs</source>
          <year>2011</year>
          <month>06</month>
          <day>10</day>
          <volume>67</volume>
          <issue>6</issue>
          <fpage>1273</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1365-2648.2010.05582.x</pub-id>
          <pub-id pub-id-type="medline">21306424</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ghosh</surname>
              <given-names>DD</given-names>
            </name>
            <name name-style="western">
              <surname>Guha</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>What are we 'tweeting' about obesity? mapping tweets with topic modeling and geographic information system</article-title>
          <source>Cartogr Geogr Inf Sci</source>
          <year>2013</year>
          <month>03</month>
          <volume>40</volume>
          <issue>2</issue>
          <fpage>90</fpage>
          <lpage>102</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/25126022"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/15230406.2013.776210</pub-id>
          <pub-id pub-id-type="medline">25126022</pub-id>
          <pub-id pub-id-type="pmcid">PMC4128420</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prier</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Giraud-Carrier</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hanson</surname>
              <given-names>CL</given-names>
            </name>
          </person-group>
          <article-title>Identifying health-related topics on Twitter</article-title>
          <year>2011</year>
          <conf-name>4th International Conference of Social Computing, Behavioral-Cultural Modeling and Prediction</conf-name>
          <conf-date>March 29-31, 2011</conf-date>
          <conf-loc>College Park, MD</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-3-642-19656-0_4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Radloff</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Wawrzynski</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Cloyes</surname>
              <given-names>KG</given-names>
            </name>
          </person-group>
          <article-title>Mining Twitter to explore the emergence of COVID-19 symptoms</article-title>
          <source>Public Health Nurs</source>
          <year>2020</year>
          <month>11</month>
          <day>16</day>
          <volume>37</volume>
          <issue>6</issue>
          <fpage>934</fpage>
          <lpage>40</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32937679"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/phn.12809</pub-id>
          <pub-id pub-id-type="medline">32937679</pub-id>
          <pub-id pub-id-type="pmcid">PMC8080690</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saniei</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rodríguez Doncel</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>PHDD: corpus of physical health data disclosure on Twitter during COVID-19 pandemic</article-title>
          <source>SN Comput Sci</source>
          <year>2022</year>
          <month>04</month>
          <day>06</day>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>212</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35400014"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s42979-022-01097-x</pub-id>
          <pub-id pub-id-type="medline">35400014</pub-id>
          <pub-id pub-id-type="pii">1097</pub-id>
          <pub-id pub-id-type="pmcid">PMC8983320</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="web">
          <article-title>Social media guidelines and best practices</article-title>
          <source>Centers for Disease Control and Prevention</source>
          <year>2011</year>
          <access-date>2023-03-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cdc.gov/socialmedia/tools/guidelines/pdf/microblogging.pdf">https://www.cdc.gov/socialmedia/tools/guidelines/pdf/microblogging.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Medford</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Saleh</surname>
              <given-names>SN</given-names>
            </name>
            <name name-style="western">
              <surname>Sumarsono</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Perl</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>CU</given-names>
            </name>
          </person-group>
          <article-title>An "infodemic": leveraging high-volume Twitter data to understand early public sentiment for the coronavirus disease 2019 outbreak</article-title>
          <source>Open Forum Infect Dis</source>
          <year>2020</year>
          <month>07</month>
          <volume>7</volume>
          <issue>7</issue>
          <fpage>ofaa258</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33117854"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/ofid/ofaa258</pub-id>
          <pub-id pub-id-type="medline">33117854</pub-id>
          <pub-id pub-id-type="pii">ofaa258</pub-id>
          <pub-id pub-id-type="pmcid">PMC7337776</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Segars</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>An empirical examination of the concern for information privacy instrument</article-title>
          <source>Inf Syst Res</source>
          <year>2002</year>
          <month>03</month>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>36</fpage>
          <lpage>49</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.13.1.36.97</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rohunen</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Markkula</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>On the road – listening to data subjects’ personal mobility data privacy concerns</article-title>
          <source>Behav Inf Technol</source>
          <year>2018</year>
          <month>10</month>
          <day>30</day>
          <volume>38</volume>
          <issue>5</issue>
          <fpage>486</fpage>
          <lpage>502</lpage>
          <pub-id pub-id-type="doi">10.1080/0144929x.2018.1540658</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malhotra</surname>
              <given-names>NK</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model</article-title>
          <source>Inf Syst Res</source>
          <year>2004</year>
          <month>12</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>336</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sarathy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors</article-title>
          <source>Decis Support Syst</source>
          <year>2011</year>
          <month>6</month>
          <volume>51</volume>
          <issue>3</issue>
          <fpage>434</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2011.01.017</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Milberg</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Information privacy: measuring individuals' concerns about organizational practices</article-title>
          <source>MIS Q</source>
          <year>1996</year>
          <month>06</month>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>167</fpage>
          <pub-id pub-id-type="doi">10.2307/249477</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jeong</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns on social networking sites: interplay among posting types, content, and audiences</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>04</month>
          <volume>69</volume>
          <fpage>302</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.12.042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thackeray</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Neiger</surname>
              <given-names>BL</given-names>
            </name>
            <name name-style="western">
              <surname>Hanson</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>McKenzie</surname>
              <given-names>JF</given-names>
            </name>
          </person-group>
          <article-title>Enhancing promotional strategies within social marketing programs: use of web 2.0 social media</article-title>
          <source>Health Promot Pract</source>
          <year>2008</year>
          <month>10</month>
          <day>19</day>
          <volume>9</volume>
          <issue>4</issue>
          <fpage>338</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1177/1524839908325335</pub-id>
          <pub-id pub-id-type="medline">18936268</pub-id>
          <pub-id pub-id-type="pii">9/4/338</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <source>Sentiment Analysis: Mining Opinions, Sentiments, and Emotions</source>
          <year>2015</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Cambridge University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Katarya</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Social media based surveillance systems for healthcare using machine learning: a systematic review</article-title>
          <source>J Biomed Inform</source>
          <year>2020</year>
          <month>08</month>
          <volume>108</volume>
          <fpage>103500</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(20)30128-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2020.103500</pub-id>
          <pub-id pub-id-type="medline">32622833</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(20)30128-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC7331523</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Debatin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lovejoy</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Horn</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Hughes</surname>
              <given-names>BN</given-names>
            </name>
          </person-group>
          <article-title>Facebook and online privacy: attitudes, behaviors, and unintended consequences</article-title>
          <source>J Comput Mediat Commun</source>
          <year>2009</year>
          <month>10</month>
          <day>1</day>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>83</fpage>
          <lpage>108</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1083-6101.2009.01494.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nabity-Grover</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Thatcher</surname>
              <given-names>JB</given-names>
            </name>
          </person-group>
          <article-title>Inside out and outside in: how the COVID-19 pandemic affects self-disclosure on social media</article-title>
          <source>Int J Inf Manage</source>
          <year>2020</year>
          <month>12</month>
          <volume>55</volume>
          <fpage>102188</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32836645"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2020.102188</pub-id>
          <pub-id pub-id-type="medline">32836645</pub-id>
          <pub-id pub-id-type="pii">102188</pub-id>
          <pub-id pub-id-type="pmcid">PMC7320916</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>BC</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Xiao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Embarrassing exposures in online social networks: an integrated perspective of privacy invasion and relationship bonding</article-title>
          <source>Inf Syst Res</source>
          <year>2015</year>
          <month>12</month>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>675</fpage>
          <lpage>94</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.2015.0602</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boshmaf</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Muslukhov</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Beznosov</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ripeanu</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Design and analysis of a social botnet</article-title>
          <source>Comput Netw</source>
          <year>2013</year>
          <month>2</month>
          <volume>57</volume>
          <issue>2</issue>
          <fpage>556</fpage>
          <lpage>78</lpage>
          <pub-id pub-id-type="doi">10.1016/j.comnet.2012.06.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fire</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Goldschmidt</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Elovici</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Online social networks: threats and solutions</article-title>
          <source>IEEE Commun Surv Tutor</source>
          <year>2014</year>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>2019</fpage>
          <lpage>36</lpage>
          <pub-id pub-id-type="doi">10.1109/comst.2014.2321628</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>‘A right to be forgotten’: retrospective privacy concerns in social networking services</article-title>
          <source>Behav Inf Technol</source>
          <year>2022</year>
          <month>03</month>
          <day>15</day>
          <volume>42</volume>
          <issue>7</issue>
          <fpage>829</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1080/0144929x.2022.2046162</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Beyond information: the role of territory in privacy management behavior on social networking sites</article-title>
          <source>J Assoc Inf Syst</source>
          <year>2019</year>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>434</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.17705/1.jais.00540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frampton</surname>
              <given-names>BD</given-names>
            </name>
            <name name-style="western">
              <surname>Child</surname>
              <given-names>JT</given-names>
            </name>
          </person-group>
          <article-title>Friend or not to friend: coworker Facebook friend requests as an application of communication privacy management theory</article-title>
          <source>Comput Hum Behav</source>
          <year>2013</year>
          <month>11</month>
          <volume>29</volume>
          <issue>6</issue>
          <fpage>2257</fpage>
          <lpage>64</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2013.05.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>YJ</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Ho</surname>
              <given-names>WH</given-names>
            </name>
          </person-group>
          <article-title>Expectations of social networking site users who share and acquire health-related information</article-title>
          <source>Comput Electr Eng</source>
          <year>2018</year>
          <month>07</month>
          <volume>69</volume>
          <fpage>808</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compeleceng.2018.02.014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Hann</surname>
              <given-names>IH</given-names>
            </name>
          </person-group>
          <article-title>Socially nudged: a quasi-experimental study of friends’ social influence in online product ratings</article-title>
          <source>Inf Syst Res</source>
          <year>2018</year>
          <month>09</month>
          <volume>29</volume>
          <issue>3</issue>
          <fpage>641</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.2017.0741</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stella</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>De Domenico</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Bots increase exposure to negative and inflammatory content in online social systems</article-title>
          <source>Proc Natl Acad Sci U S A</source>
          <year>2018</year>
          <month>12</month>
          <day>04</day>
          <volume>115</volume>
          <issue>49</issue>
          <fpage>12435</fpage>
          <lpage>40</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pnas.org/doi/abs/10.1073/pnas.1803470115?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1073/pnas.1803470115</pub-id>
          <pub-id pub-id-type="medline">30459270</pub-id>
          <pub-id pub-id-type="pii">1803470115</pub-id>
          <pub-id pub-id-type="pmcid">PMC6298098</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Karahanna</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Xin Xu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The needs–affordances–features perspective for the use of social media</article-title>
          <source>MIS Q</source>
          <year>2018</year>
          <month>3</month>
          <day>3</day>
          <volume>42</volume>
          <issue>3</issue>
          <fpage>737</fpage>
          <lpage>56</lpage>
          <pub-id pub-id-type="doi">10.25300/MISQ/2018/11492</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rønn</surname>
              <given-names>KV</given-names>
            </name>
            <name name-style="western">
              <surname>Søe</surname>
              <given-names>SO</given-names>
            </name>
          </person-group>
          <article-title>Is social media intelligence private? privacy in public and the nature of social media intelligence</article-title>
          <source>Intelligence on the Frontier Between State and Civil Society</source>
          <year>2020</year>
          <publisher-loc>Milton Park, UK</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Esmaeilzadeh</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The effects of public concern for information privacy on the adoption of health information exchanges (HIEs) by healthcare entities</article-title>
          <source>Health Commun</source>
          <year>2019</year>
          <month>09</month>
          <day>08</day>
          <volume>34</volume>
          <issue>10</issue>
          <fpage>1202</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1080/10410236.2018.1471336</pub-id>
          <pub-id pub-id-type="medline">29737872</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Managing privacy in the digital economy</article-title>
          <source>Fundam Res</source>
          <year>2021</year>
          <month>09</month>
          <volume>1</volume>
          <issue>5</issue>
          <fpage>543</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1016/j.fmre.2021.08.009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sewalk</surname>
              <given-names>KC</given-names>
            </name>
            <name name-style="western">
              <surname>Tuli</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hswen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Brownstein</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Hawkins</surname>
              <given-names>JB</given-names>
            </name>
          </person-group>
          <article-title>Using Twitter to examine web-based patient experience sentiments in the United States: longitudinal study</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>10</month>
          <day>12</day>
          <volume>20</volume>
          <issue>10</issue>
          <fpage>e10043</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/10/e10043/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10043</pub-id>
          <pub-id pub-id-type="medline">30314959</pub-id>
          <pub-id pub-id-type="pii">v20i10e10043</pub-id>
          <pub-id pub-id-type="pmcid">PMC6231860</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Humphreys</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gill</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Krishnamurthy</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>How much is too much? Privacy issues on Twitter</article-title>
          <year>2010</year>
          <conf-name>International Communication Association 60th Annual Conference</conf-name>
          <conf-date>June 22-26, 2010</conf-date>
          <conf-loc>Singapore, Singapore</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christofides</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Muise</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Desmarais</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Risky disclosures on Facebook: the effect of having a bad experience on online behavior</article-title>
          <source>J Adolesc Res</source>
          <year>2012</year>
          <month>01</month>
          <day>17</day>
          <volume>27</volume>
          <issue>6</issue>
          <fpage>714</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1177/0743558411432635</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Valkenburg</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Sumter</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Peter</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Gender differences in online and offline self‐disclosure in pre‐adolescence and adolescence</article-title>
          <source>Brit J Dev Psychol</source>
          <year>2010</year>
          <month>11</month>
          <day>29</day>
          <volume>29</volume>
          <issue>2</issue>
          <fpage>253</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1348/2044-835x.002001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zou</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>MX</given-names>
            </name>
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Depression and disclosure behavior via social media: a study of university students in China</article-title>
          <source>Heliyon</source>
          <year>2020</year>
          <month>2</month>
          <day>14</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>e03368</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2405-8440(20)30213-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.heliyon.2020.e03368</pub-id>
          <pub-id pub-id-type="medline">32099917</pub-id>
          <pub-id pub-id-type="pii">S2405-8440(20)30213-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7031301</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dimitropoulos</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Scheffler</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Posnack</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Public attitudes toward health information exchange: perceived benefits and concerns</article-title>
          <source>Am J Manag Care</source>
          <year>2011</year>
          <month>12</month>
          <volume>17</volume>
          <issue>12 Spec No</issue>
          <fpage>SP111</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ajmc.com/pubMed.php?pii=53517"/>
          </comment>
          <pub-id pub-id-type="medline">22216769</pub-id>
          <pub-id pub-id-type="pii">53517</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Donnell</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Kern</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>Barrón</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Teixeira</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Dhopeshwarkar</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kaushal</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Healthcare consumers' attitudes towards physician and personal use of health information exchange</article-title>
          <source>J Gen Intern Med</source>
          <year>2011</year>
          <month>09</month>
          <day>17</day>
          <volume>26</volume>
          <issue>9</issue>
          <fpage>1019</fpage>
          <lpage>26</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/21584839"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11606-011-1733-6</pub-id>
          <pub-id pub-id-type="medline">21584839</pub-id>
          <pub-id pub-id-type="pmcid">PMC3157531</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Health information privacy concerns, antecedents, and information disclosure intention in online health communities</article-title>
          <source>Inf Manag</source>
          <year>2018</year>
          <month>06</month>
          <volume>55</volume>
          <issue>4</issue>
          <fpage>482</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2017.11.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hsu</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Ju</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Yen</surname>
              <given-names>CH</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations</article-title>
          <source>Int J Hum Comput Stud</source>
          <year>2007</year>
          <month>2</month>
          <volume>65</volume>
          <issue>2</issue>
          <fpage>153</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijhcs.2006.09.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Esmaeilzadeh</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>How does IT identity affect individuals’ use behaviors associated with personal health devices (PHDs)? an empirical study</article-title>
          <source>Inf Manag</source>
          <year>2021</year>
          <month>01</month>
          <volume>58</volume>
          <issue>1</issue>
          <fpage>103313</fpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2020.103313</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chandler</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Shapiro</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Conducting clinical research using crowdsourced convenience samples</article-title>
          <source>Annu Rev Clin Psychol</source>
          <year>2016</year>
          <month>03</month>
          <day>28</day>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>53</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.1146/annurev-clinpsy-021815-093623</pub-id>
          <pub-id pub-id-type="medline">26772208</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Validity and mechanical turk: an assessment of exclusion methods and interactive experiments</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>12</month>
          <volume>77</volume>
          <fpage>184</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.08.038</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Black</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Babin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Tatham</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Multivariate Data Analysis, 6th edition</source>
          <year>2006</year>
          <publisher-loc>Upper Saddle River, NJ</publisher-loc>
          <publisher-name>Pearson Prentice Hall</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chin</surname>
              <given-names>WW</given-names>
            </name>
            <name name-style="western">
              <surname>Marcoulides</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The partial least squares approach to structural equation modeling</article-title>
          <source>Adv Hosp Leis</source>
          <year>1998</year>
          <month>1</month>
          <volume>8</volume>
          <issue>2</issue>
          <fpage>295</fpage>
          <lpage>336</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Segars</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research</article-title>
          <source>Omega</source>
          <year>1997</year>
          <month>2</month>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>107</fpage>
          <lpage>21</lpage>
          <pub-id pub-id-type="doi">10.1016/s0305-0483(96)00051-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fornell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tellis</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Zinkhan</surname>
              <given-names>GM</given-names>
            </name>
          </person-group>
          <article-title>Validity assessment: a structural equations approach using partial least squares</article-title>
          <year>1982</year>
          <conf-name>American Marketing Association Educators’ Conference</conf-name>
          <conf-date>1982</conf-date>
          <conf-loc>Long Beach, CA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jo</surname>
              <given-names>HS</given-names>
            </name>
            <name name-style="western">
              <surname>Hwang</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Market segmentation of health information use on the internet in Korea</article-title>
          <source>Int J Med Inform</source>
          <year>2010</year>
          <month>10</month>
          <volume>79</volume>
          <issue>10</issue>
          <fpage>707</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2010.07.006</pub-id>
          <pub-id pub-id-type="medline">20810307</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(10)00130-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Riel</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Henseler</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kemény</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Sasovova</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Estimating hierarchical constructs using consistent partial least squares</article-title>
          <source>Ind Manag Data Syst</source>
          <year>2017</year>
          <month>04</month>
          <day>10</day>
          <volume>117</volume>
          <issue>3</issue>
          <fpage>459</fpage>
          <lpage>77</lpage>
          <pub-id pub-id-type="doi">10.1108/imds-07-2016-0286</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Duarte</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Amaro</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Methods for modelling reflective-formative second order constructs in PLS: an application to online travel shopping</article-title>
          <source>J Hosp Tour Technol</source>
          <year>2018</year>
          <month>07</month>
          <day>02</day>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>295</fpage>
          <lpage>313</lpage>
          <pub-id pub-id-type="doi">10.1108/jhtt-09-2017-0092</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carillo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Scornavacca</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Za</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The role of media dependency in predicting continuance intention to use ubiquitous media systems</article-title>
          <source>Inf Manag</source>
          <year>2017</year>
          <month>04</month>
          <volume>54</volume>
          <issue>3</issue>
          <fpage>317</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2016.09.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>MacKenzie</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Podsakoff</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Podsakoff</surname>
              <given-names>NP</given-names>
            </name>
          </person-group>
          <article-title>Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques</article-title>
          <source>MIS Q</source>
          <year>2011</year>
          <month>6</month>
          <volume>35</volume>
          <issue>2</issue>
          <fpage>293</fpage>
          <lpage>334</lpage>
          <pub-id pub-id-type="doi">10.2307/23044045</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hooper</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Coughlan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mullen</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Evaluating model fit: a synthesis of the structural equation modelling literature</article-title>
          <year>2008</year>
          <conf-name>7th European Conference on Research Methodology for Business and Management Studies</conf-name>
          <conf-date>June 19-20, 2008</conf-date>
          <conf-loc>London, UK</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Knowledge sharing in online health communities: a social exchange theory perspective</article-title>
          <source>Inf Manag</source>
          <year>2016</year>
          <month>07</month>
          <volume>53</volume>
          <issue>5</issue>
          <fpage>643</fpage>
          <lpage>53</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2016.02.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Information privacy concerns: linking individual perceptions with institutional privacy assurances</article-title>
          <source>J Assoc Inf Syst</source>
          <year>2011</year>
          <month>12</month>
          <volume>12</volume>
          <issue>12</issue>
          <fpage>798</fpage>
          <lpage>824</lpage>
          <pub-id pub-id-type="doi">10.17705/1jais.00281</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koh</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Data mining applications in healthcare</article-title>
          <source>J Healthc Inf Manag</source>
          <year>2005</year>
          <volume>19</volume>
          <issue>2</issue>
          <fpage>64</fpage>
          <lpage>72</lpage>
          <pub-id pub-id-type="medline">15869215</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Song</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Omori</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tenzek</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Morey Hawkins</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>WY</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>YC</given-names>
            </name>
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>JY</given-names>
            </name>
          </person-group>
          <article-title>Trusting social media as a source of health information: online surveys comparing the United States, Korea, and Hong Kong</article-title>
          <source>J Med Internet Res</source>
          <year>2016</year>
          <month>03</month>
          <day>14</day>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>e25</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2016/3/e25/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.4193</pub-id>
          <pub-id pub-id-type="medline">26976273</pub-id>
          <pub-id pub-id-type="pii">v18i3e25</pub-id>
          <pub-id pub-id-type="pmcid">PMC4810010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De Choudhury</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>Seeking and sharing health information online: comparing search engines and social media</article-title>
          <year>2014</year>
          <conf-name>CHI '14: the SIGCHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 26-May 1, 2014</conf-date>
          <conf-loc>Toronto, ON</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2556288.2557214</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naslund</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Aschbrenner</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Marsch</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Bartels</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>The future of mental health care: peer-to-peer support and social media</article-title>
          <source>Epidemiol Psychiatr Sci</source>
          <year>2016</year>
          <month>01</month>
          <day>08</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>113</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.1017/s2045796015001067</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The rise of social bots</article-title>
          <source>Commun ACM</source>
          <year>2016</year>
          <month>06</month>
          <day>24</day>
          <volume>59</volume>
          <issue>7</issue>
          <fpage>96</fpage>
          <lpage>104</lpage>
          <pub-id pub-id-type="doi">10.1145/2818717</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Domenico</surname>
              <given-names>GD</given-names>
            </name>
            <name name-style="western">
              <surname>Sit</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ishizaka</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Nunan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Fake news, social media and marketing: a systematic review</article-title>
          <source>J Bus Res</source>
          <year>2021</year>
          <month>01</month>
          <volume>124</volume>
          <fpage>329</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2020.11.037</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
