<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id><journal-id journal-id-type="publisher-id">formative</journal-id><journal-id journal-id-type="index">27</journal-id><journal-title>JMIR Formative Research</journal-title><abbrev-journal-title>JMIR Form Res</abbrev-journal-title><issn pub-type="epub">2561-326X</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v10i1e83363</article-id><article-id pub-id-type="doi">10.2196/83363</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Patients&#x2019; mHealth Apps Usage and Data Privacy, Security, and Confidentiality Concerns: Exploratory Study</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Alhammad</surname><given-names>Nasser</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Alajlani</surname><given-names>Mohannad</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Abd-alrazaq</surname><given-names>Alaa</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Arvanitis</surname><given-names>Theodoros N</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff4">4</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Epiphaniou</surname><given-names>Gregory</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Health Informatics, Saudi Electronic University</institution><addr-line>Jeddah</addr-line><country>Saudi Arabia</country></aff><aff id="aff2"><institution>Institute of Digital Healthcare, Warwick Manufacturing Group (WMG), University of Warwick</institution><addr-line>Millburn House</addr-line><addr-line>Coventry</addr-line><country>United Kingdom</country></aff><aff id="aff3"><institution>AI Center for Precision Health, Weill Cornell Medicine</institution><addr-line>Doha</addr-line><country>Qatar</country></aff><aff id="aff4"><institution>University of Birmingham</institution><addr-line>Birmingham</addr-line><country>United Kingdom</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Sarvestan</surname><given-names>Javad</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Krishnapatnam</surname><given-names>Mahendra</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Sadiq</surname><given-names>Mohammed</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Mamidipally</surname><given-names>Rohit</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Tam</surname><given-names>Will</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Nasser Alhammad, PhD, Institute of Digital Healthcare, Warwick Manufacturing Group (WMG), University of Warwick, Millburn House, Coventry, CV4 7AL, United Kingdom, ; <email>n.alhammad@seu.edu.sa</email></corresp></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>20</day><month>5</month><year>2026</year></pub-date><volume>10</volume><elocation-id>e83363</elocation-id><history><date date-type="received"><day>01</day><month>09</month><year>2025</year></date><date date-type="rev-recd"><day>20</day><month>04</month><year>2026</year></date><date date-type="accepted"><day>22</day><month>04</month><year>2026</year></date></history><copyright-statement>&#x00A9; Nasser Alhammad, Mohannad Alajlani, Alaa Abd-alrazaq, Theodoros Arvanitis, Gregory Epiphaniou. Originally published in JMIR Formative Research (<ext-link ext-link-type="uri" xlink:href="https://formative.jmir.org">https://formative.jmir.org</ext-link>), 20.5.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://formative.jmir.org">https://formative.jmir.org</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://formative.jmir.org/2026/1/e83363"/><abstract><sec><title>Background</title><p>The Technology Adoption Model (TAM) offers a potential framework for elucidating the relationships between data privacy or security concerns and behavioral intention, perceived usefulness (PU), and perceived ease of use (PEOU) of mobile health (mHealth) apps, particularly for patients&#x2019; self-care management. In Saudi Arabia, limited information is available on these pertinent research areas despite the government&#x2019;s relentless efforts to bolster the use of mHealth apps.</p></sec><sec><title>Objective</title><p>This study applies the TAM and the psychosociocultural framework to explore the influence of patients&#x2019; data privacy and security concerns on the PU, PEOU, and behavioral intention to use mHealth apps for self-care management in Saudi Arabia.</p></sec><sec sec-type="methods"><title>Methods</title><p>A cross-sectional study was conducted by recruiting patients using mHealth apps for self-care from various provinces in Saudi Arabia. Research instruments were developed based on the components of 2 theories: the psychosociocultural framework and TAM, which were then piloted, validated, and distributed to participants via Google Forms. Linear regression models were performed to test the hypothesized relationships.</p></sec><sec sec-type="results"><title>Results</title><p>Overall, 567 patients using mHealth apps participated in the study. Slightly more than one-third (217/567, 38.2%; range 35.6%&#x2010;41.4%) of the participants expressed a high level of concern regarding data privacy, confidentiality, and security, with significant predictors being female gender, higher educational qualifications, and younger age groups (&#x003C;46 years). About 18% to 25% of the variance in PU, PEOU, and behavioral intention to use mHealth apps was explained by the tested factors. Patients were more likely to have higher PU following a unit decrease in data confidentiality (<italic>&#x03B2;</italic>=.31; <italic>P</italic>=.01) and security concerns (<italic>&#x03B2;</italic>=.47; <italic>P</italic>=.01). The PEOU of mHealth apps increased as users demonstrated less concern regarding data privacy (<italic>&#x03B2;</italic>=.18; <italic>P</italic>=.001), confidentiality (<italic>&#x03B2;</italic>=.24; <italic>P</italic>&#x003C;.001), and security (<italic>&#x03B2;</italic>=.43; <italic>P</italic>=.02). Likewise, behavioral intention to use mHealth apps also increased significantly following a reduction in respondents&#x2019; concerns toward data privacy (<italic>&#x03B2;</italic>=.18; <italic>P</italic>=.02), confidentiality (<italic>&#x03B2;</italic>=.24; <italic>P</italic>=.03), and security issues (<italic>&#x03B2;</italic>=.36; <italic>P</italic>=.01).</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>Specific demographic factors and concerns regarding data security and privacy influence patients&#x2019; PU, PEOU, and behavioral intention to use mHealth apps for self-care management. Targeting the age-, education-, and gender-based differences regarding the usage of mHealth apps. Health care providers and policymakers may consider age-, education-, and gender-based differences when developing strategies to improve the adoption of mHealth apps among the Saudi patient population.</p></sec></abstract><kwd-group><kwd>data privacy</kwd><kwd>confidentiality</kwd><kwd>security</kwd><kwd>health care</kwd><kwd>patients</kwd><kwd>mobile health</kwd><kwd>mHealth</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><sec id="s1-1"><title>Background</title><p>The usage of mobile health (mHealth) apps has witnessed exponential growth among the general public and health care providers, especially with the introduction of smartphones [<xref ref-type="bibr" rid="ref1">1</xref>] and the growing interest in the health care industry and research field [<xref ref-type="bibr" rid="ref2">2</xref>]. COVID-19 is also a strong factor contributing to the heightened reliance on digital health [<xref ref-type="bibr" rid="ref3">3</xref>]. The application of mHealth apps ranges from disease management to self-care, which constitutes activities performed to prevent or manage health conditions and promote good health. These activities include information gathering, supervising behavioral changes, managing fitness, and reminding patients of rehabilitation schedules and medication [<xref ref-type="bibr" rid="ref4">4</xref>]. mHealth apps also assist in managing health records and providing easy access and avenues to perform mobile or remote consultations [<xref ref-type="bibr" rid="ref5">5</xref>].</p><p>Providing timely consultation and decision-making at the point of care requires various resources, including clinical data. As a result, there is continuous advocacy for mHealth apps to be adopted by health care professionals and patients [<xref ref-type="bibr" rid="ref6">6</xref>]. With advancements in digital health care and technologies, widespread usage of mHealth apps for self-care is expected in the next decade [<xref ref-type="bibr" rid="ref7">7</xref>]. However, issues related to data privacy, security, and confidentiality are well-established barriers to the adoption of mHealth apps in health care settings [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>].</p><p>Data security refers to legislative, physical, or mechanical tools used to prevent personal health information from unauthorized disclosure [<xref ref-type="bibr" rid="ref8">8</xref>], whereas data confidentiality refers to the responsibility of those collecting data or information (ie, app developers and providers) in upholding the concerns of patients or users to whom such information is related [<xref ref-type="bibr" rid="ref8">8</xref>]. The National Committee on Vital and Health Statistics described privacy as an individual legal right or freedom to protect or disclose their health information. Data protection in mHealth apps is crucial given the susceptibility of keyed-in information and the growing interest of attackers and hackers in mobile apps [<xref ref-type="bibr" rid="ref7">7</xref>]. Furthermore, data breaches have been associated with a variety of factors, such as data privacy disclosure, data management and storage, data encryption, data integration, app operability, and authentication [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. Patients possess a contractual relationship with health care providers, whereby the latter are responsible for ensuring the confidentiality and safety of the patient&#x2019;s health information [<xref ref-type="bibr" rid="ref4">4</xref>]. Accumulated evidence suggests low awareness among mHealth app users regarding data privacy, security, and confidentiality. Meanwhile, health care providers are more conversant with these issues, particularly as gleaned from studies conducted in Western countries [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref10">10</xref>].</p><p>In the Middle East, Saudi Arabia has one of the fastest-growing health care economies, which is linked to the digitization of the sector [<xref ref-type="bibr" rid="ref11">11</xref>]. Events such as the high penetration of smartphones, the internet, and the widespread usage of social networking in the Arabian Gulf contribute to advancements in health care delivery. Aligning with the increasing number of smartphone users, numerous mHealth apps were introduced in Saudi Arabia to meet the country&#x2019;s Vision 2030 goals [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>]. The Ministry of Health has also developed specific mobile apps to facilitate self-care management and consultations between health care providers and patients [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>].</p><p>Despite the diverse efforts put in place by the government, the uptake of mHealth apps in Saudi Arabia has yet to achieve the projected benchmark [<xref ref-type="bibr" rid="ref13">13</xref>]. Recent studies highlighted privacy and security issues regarding data shared via mHealth apps, with the potential to cause data breaches and severe economic consequences [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. However, it remains unknown whether such concerns influence the adoption and usage of mHealth apps among patients, especially for self-care management. Addressing this knowledge gap is pertinent to addressing users&#x2019; needs and developing patient-friendly mHealth apps tailored for self-care among patients in Saudi Arabia. The present empirical study explores the influence of data privacy and security concerns on patients&#x2019; perceived usefulness (PU), perceived ease of use (PEOU), and behavioral intention to use mHealth apps for self-care management.</p></sec><sec id="s1-2"><title>Research Model and Hypothesis Development</title><p>Data privacy and security concerns are among the most widely used variables in research related to mHealth systems and the adoption of various related apps. As information technology continues to increase its capacity for storing, processing, and exploring personal health information and data, researchers have developed an interest in capturing shortfalls related to privacy and data breaches [<xref ref-type="bibr" rid="ref16">16</xref>]. Wilkowska and Ziefle [<xref ref-type="bibr" rid="ref17">17</xref>] explored the perceived relevance of privacy and security aspects among different groups, followed by assessing the predictive power of the variables on the acceptance of medical assistive technologies. Multivariate regression models revealed that the most predictive security and privacy domains were crucial for the acceptance and usage of the technologies. Nevertheless, there is a paucity of data regarding users&#x2019; privacy concerns and their effects on mHealth app adoption, especially in the Saudi context.</p><p>The literature posits that users&#x2019; awareness of data privacy makes them circumspect about adopting technology and sharing their personal information [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Users&#x2019; perspectives and concerns about data privacy of health information may influence their avoidance of using specific health care services, including mHealth in the present context [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>]. Previous research revealed that the failure to mitigate customers&#x2019; privacy concerns severely impacts customers&#x2019; behavior and attitudes toward health care services [<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref24">24</xref>]. Mukherjee et al [<xref ref-type="bibr" rid="ref23">23</xref>] also found that security related to privacy, combined with shared values, was positively associated with customers&#x2019; behavioral intention. The present study aligns with the argument that privacy, security, and confidentiality concerns are related to end users&#x2019; assessment of a lack of reliance on mHealth apps, especially relating to sharing their personal data.</p><p>Empirical studies have demonstrated how Technology Adoption Model (TAM) components influence the perception of using mHealth apps [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Despite the usefulness of mHealth apps for patients, Mangkunegara et al [<xref ref-type="bibr" rid="ref25">25</xref>] found that patients were more likely to have a negative perception when such apps are difficult to operate, thereby reducing their intention to use them. Verissimo et al [<xref ref-type="bibr" rid="ref26">26</xref>] revealed that users prioritized mHealth apps that can be easily used to retrieve health information of interest. Gagnon et al [<xref ref-type="bibr" rid="ref27">27</xref>] posited that PEOU has a positive relationship with the adoption of health care technologies.</p><p>In terms of the acceptance of mHealth apps among the Saudi population, this study used TAM to derive the research hypotheses. The 2 key components of TAM, PEOU and PU, have been shown to influence users&#x2019; behavioral intentions [<xref ref-type="bibr" rid="ref24">24</xref>]. However, despite extensive research on data privacy and security in the health care context, their effects on privacy concerns remain underreported [<xref ref-type="bibr" rid="ref25">25</xref>]. A study found that higher privacy and security concerns played a negative mediating role in the association between users&#x2019; perceived risk and attitude [<xref ref-type="bibr" rid="ref28">28</xref>]. It is plausible to predict that patients will not find usefulness in technology with a high risk of invading their privacy. Thus, privacy and security concerns might decrease individuals&#x2019; PEOU and PU for any service, including mHealth apps.</p><p>Privacy and security concerns are also linked to PU because users may be unsure that health-related outcomes will be achieved if the fear of unauthorized access to their personal information cannot be guaranteed [<xref ref-type="bibr" rid="ref29">29</xref>]. Likewise, privacy and security concerns are related to PEOU, given that addressing these issues reduces the effort that would otherwise be required in monitoring the system. Thus, security and privacy concerns constitute perceived risk, an important variable for mHealth use in terms of distance and interaction between patients and health care providers. In the mHealth context, users face the possibility of suffering a loss while using the technology [<xref ref-type="bibr" rid="ref30">30</xref>], with most perceiving risk when there is no avenue to verify the security of the infrastructure for securing their personal health information. Patients&#x2019; perception of risk, which entails privacy and security concerns, is negatively linked to their intention to transact. Thus, privacy and security concerns might limit PEOU and negatively impact individuals&#x2019; PU for any service. It is important to elucidate these events in the context of using mHealth apps for self-care management, as detailed data and information are required to operate the digital technology. Based on these arguments, the following hypotheses are proposed:</p><list list-type="bullet"><list-item><p>H1: Patients&#x2019; concerns about data privacy influence their PU, PEOU, and behavioral intention to use mHealth apps.</p></list-item><list-item><p>H2: Patients&#x2019; concerns about the security of mHealth apps influence their PU, PEOU, and behavioral intention to use mHealth apps.</p></list-item><list-item><p>H3: Patients&#x2019; concerns about the confidentiality of data shared on mHealth apps influence their PU, PEOU, and behavioral intention to use mHealth apps. The proposed research model is presented in <xref ref-type="fig" rid="figure1">Figure 1</xref>.</p></list-item></list><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Conceptual framework showing the proposed relationship between sociodemographic factors, Technology Adoption Model dimensions and concerns regarding data privacy, security, and confidentiality. mHealth: mobile health.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="formative_v10i1e83363_fig01.png"/></fig></sec></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Study Area, Study Design, and Study Population</title><p>There are a total of 13 provinces in Saudi Arabia, namely Riyadh, Madinah, Mecca, Tabuk, Najran, Hail, Northern, Eastern, Al Jouf, Asir, Qassim, Jazan, and Al Baha. The study design entailed a cross-sectional method by gathering information from patients using mHealth apps for self-care management during a specific period. The study population and unit of analysis in this study encompass all patients who fulfill the inclusion criteria, particularly those who are actively using mHealth apps to participate in self-care activities for disease management.</p></sec><sec id="s2-2"><title>Inclusion and Exclusion Criteria</title><p>Certain inclusion criteria were considered to recruit the appropriate respondents. The target participants included patients aged 18 years and older, with a confirmatory diagnosis of a health condition that requires monitoring by health care providers. Participants must also be conversant with mHealth apps specifically designed for self-care management. To ensure that patients provide factual responses and minimize recall bias, they must be either current and active users of mHealth apps or have used them within 1 year prior to the time of this study. Consistent data synthesis was facilitated by defining self-care as &#x201C;activities performed on mHealth apps to prevent or manage health conditions and promote good health, which encompass information gathering, supervising behavioral changes, managing fitness, setting reminders for rehabilitation schedules and medication, as well as direct consultation with clinicians or health care providers [<xref ref-type="bibr" rid="ref4">4</xref>].&#x201D;</p></sec><sec id="s2-3"><title>Instrument Development and Administration</title><p>A multidimensional approach was applied to develop the survey, which entailed an in-depth literature review, modification of existing research instruments, and discussion among the researchers. We developed a structured questionnaire, broadly divided into 2 parts. The first page in part 1 comprised the consent form and participant eligibility criteria. Detailed information on the consent form is provided in the next section. As for inclusion criteria, potential respondents were instructed to state whether they are actively using mHealth apps for self-care or had used such technologies in the last year, and the specific self-care activity performed. The remaining part of part 1 entails demographic data such as age, gender, marital status, occupation, income level, education level, current health app usage, and frequency of mobile app use.</p><p>Part 2 of the questionnaire consists of 7 sections. The first section comprised 5 items, focusing on patients&#x2019; awareness of data privacy, security, and confidentiality [<xref ref-type="bibr" rid="ref15">15</xref>]. The second (8 items), third (6 items), and fourth (7 items) sections emphasize patients&#x2019; privacy, confidentiality, and security concerns, respectively. These items were adopted from studies conducted by Aljedaani et al [<xref ref-type="bibr" rid="ref15">15</xref>], Zhou et al [<xref ref-type="bibr" rid="ref31">31</xref>], and Zhou et al [<xref ref-type="bibr" rid="ref4">4</xref>]. The PU of mHealth apps was explored in the fifth section (4 items), whereas PEOU was evaluated in the sixth section. Three items were designed in the seventh section to assess patients&#x2019; behavioral intentions. All sections and items were measured using a 5-point Likert scale ranging from 1=strongly disagree, 2=disagree, 3=neutral, 4=agree, to 5=strongly agree.</p><p>All questions were closed-ended. The questionnaire was translated from English to Arabic by 2 experienced translators. Subsequently, both versions of the questionnaire were piloted and validated. Expert opinions and pilot testing were used to prevent potential ceiling and floor effects from the questionnaire items that could affect accurate data interpretation. After validating the instrument and making adjustments based on experts&#x2019; suggestions and recommendations, the reliability of the instrument was assessed. A total of 20 patients were recruited for the pilot study, as suggested by Lackey and Wingate [<xref ref-type="bibr" rid="ref32">32</xref>]. These respondents were not included in the final survey. Reliability was evaluated by computing Cronbach &#x03B1;, which indicates participants&#x2019; comprehension of each item in the questionnaire. <xref ref-type="table" rid="table1">Table 1</xref> presents the results of the reliability analysis for each section and the overall survey instrument.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Results of the reliability analysis.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Section</td><td align="left" valign="bottom">Number of items</td><td align="left" valign="bottom">Cronbach &#x03B1;</td></tr></thead><tbody><tr><td align="left" valign="top">Awareness of data privacy, security, and confidentiality</td><td align="left" valign="top">5</td><td align="left" valign="top">0.80</td></tr><tr><td align="left" valign="top">Data privacy</td><td align="left" valign="top">8</td><td align="left" valign="top">0.82</td></tr><tr><td align="left" valign="top">Data confidentiality</td><td align="left" valign="top">6</td><td align="left" valign="top">0.86</td></tr><tr><td align="left" valign="top">Data security</td><td align="left" valign="top">7</td><td align="left" valign="top">0.74</td></tr><tr><td align="left" valign="top">Perceived usefulness</td><td align="left" valign="top">4</td><td align="left" valign="top">0.77</td></tr><tr><td align="left" valign="top">Perceived ease of use</td><td align="left" valign="top">4</td><td align="left" valign="top">0.69</td></tr><tr><td align="left" valign="top">Behavioral intention</td><td align="left" valign="top">3</td><td align="left" valign="top">0.68</td></tr><tr><td align="left" valign="top">Overall</td><td align="left" valign="top">37</td><td align="left" valign="top">0.81</td></tr></tbody></table></table-wrap><p>All sections of the questionnaire fulfilled the minimum required value (Cronbach &#x03B1;=0.60) for acceptable internal consistency and reliability. The construct on behavioral intention yielded the lowest value (Cronbach &#x03B1;=0.68), while the construct on data confidentiality had the highest reliability coefficient (Cronbach &#x03B1;=0.86). The instrument achieved an excellent level of reliability, with an overall Cronbach &#x03B1; of 0.81. Hence, no item was deleted or added to any of the constructs, and the instrument was considered suitable for the final survey. The developed questionnaire (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) was then prepared using Google Forms and Qualtrics. Subsequently, the link was distributed electronically on different media, such as email and social networks, including WhatsApp, Facebook, and LinkedIn (Microsoft).</p></sec><sec id="s2-4"><title>Ethical Considerations</title><p>Ethical approval for this research was obtained from the Biomedical and Scientific Research Ethics Committee, University of Warwick (BSREC 03/22&#x2010;23), the Medical Research and Ethics Committee, and the Ministry of Health in Saudi Arabia. Participants were instructed to provide written and signed consent on the first page of the instrument before responding to the questions. Participation was anonymous to ensure that participant confidentiality was maintained. No identifying details were recorded, and participants were informed that they could withdraw from the study at any time without any penalty. All collected data were stored on a personal computer with a secure password and were accessible only to authorized parties (the supervisory team and the researcher). Participants did not receive any financial compensation or incentives for participation in this study.</p></sec><sec id="s2-5"><title>Recruitment</title><p>The survey was distributed in all 13 provinces in Saudi Arabia to eligible participants identified via contact repositories available at 2 hospitals purposively selected in each province. Likewise, participant sampling was nonprobabilistic and convenient. A total of 567 valid questionnaires were collected from the online survey between January 2024 and June 2024.</p></sec><sec id="s2-6"><title>Data Analysis</title><p>Descriptive statistics were used to summarize the participants&#x2019; background information. All research variables were checked for normality using the Kolmogorov-Smirnov test and presented as mean (SD) or median (IQR), as appropriate. Bivariate analysis was conducted using either Pearson chi-square test or independent <italic>t</italic> test to determine the association between respondents&#x2019; demographic factors and their scores for concerns regarding data privacy, security, and confidentiality. Meanwhile, linear regression analyses were conducted in 2 stages, simple and multiple, to investigate the influence of respondents&#x2019; concerns about data privacy, security, and confidentiality on PEOU, PU, and behavioral intention toward mHealth apps. For the former stage, 1 independent variable was introduced into the regression model at a time, and the relationship was assessed for its significance based on a <italic>P</italic> value of .10. This <italic>P</italic> value was chosen as a cutoff to prevent prematurely discarding key variables in the model, as well as preventing type II errors and identifying potential confounders. Thereafter, all significant independent variables were introduced into the multiple regression model. This model was used to determine how well the set of independent variables (concerns about data privacy, security, and confidentiality) predicts the dependent variables (PEOU, PU, and behavioral intention toward mHealth apps). In addition, regression analysis was used to identify the best predictor among the significant independent variables. For each model, the <italic>R</italic><sup>2</sup> value describes how much of the variance in the outcome variable is explained by the model, whereas standardized regression coefficient values reflect the contribution of each variable. A significant relationship was set at a <italic>P</italic> value of .05. All the analyses were conducted in SPSS version 25 statistical software (IBM).</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Participants&#x2019; Demographic Profile</title><p>A total of 567 valid and completed questionnaires were retrieved and analyzed. As shown in <xref ref-type="table" rid="table2">Table 2</xref>, the majority of participants were male patients (379/567, 66.8%), had a bachelor&#x2019;s degree (262/567, 46.2%), and were aged 26 to 35 years (211/567, 37.2%). Slightly more than half of the participants belonged to the middle socioeconomic class (299/567, 52.5%), earning between 5000 and 14,999 Saudi Arabia riyal (SAR), compared with high-income (113/567, 20%) and low-income levels (155/567, 27.5%), respectively. Most patients had been using mHealth apps for 1 to 3 years (213/567, 38%), and approximately 94% (533/567) were active users of mHealth apps, compared with 6% (34/567) who had stopped using the digital health technology less than 1 year ago. In terms of self-care activities, most patients used the apps for monitoring behavioral or lifestyle changes (272/567, 48%), while 22% (125/567) and 28% (159/567) engaged mainly in remote consultation with health care providers and physical activities or exercise, respectively.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Demographic characteristics of the participants.<sup><xref ref-type="table-fn" rid="table2fn1">a</xref></sup></p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom" colspan="2">Value, n (%)</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="3">Gender</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Male</td><td align="left" valign="top" colspan="2">379 (66.8)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Female</td><td align="left" valign="top" colspan="2">179 (31.6)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Prefer not to say</td><td align="left" valign="top" colspan="2">9 (1.6)</td></tr><tr><td align="left" valign="top" colspan="3">Educational qualification</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>High school or secondary</td><td align="left" valign="top" colspan="2">71 (12.5)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Bachelor&#x2019;s degree</td><td align="left" valign="top" colspan="2">262 (46.2)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Masters&#x2019;s degree</td><td align="left" valign="top" colspan="2">125 (22)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Diploma</td><td align="left" valign="top" colspan="2">70 (12.3)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>PhD</td><td align="left" valign="top" colspan="2">39 (6.9)</td></tr><tr><td align="left" valign="top" colspan="3">Age (y)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>18&#x2010;25</td><td align="left" valign="top" colspan="2">65 (11.5)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>26&#x2010;35</td><td align="left" valign="top" colspan="2">211 (37.2)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>36&#x2010;45</td><td align="left" valign="top" colspan="2">183 (32.3)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>46&#x2010;65</td><td align="left" valign="top" colspan="2">103 (18.2)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Above 65</td><td align="left" valign="top" colspan="2">5 (0.9)</td></tr><tr><td align="left" valign="top" colspan="3">Income level or socioeconomic status</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>High (&#x003E;15,000 SAR<sup><xref ref-type="table-fn" rid="table2fn2">b</xref></sup>)</td><td align="left" valign="top" colspan="2">113 (20)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Middle (&#x003E;5000&#x2010;14,999 SAR)</td><td align="left" valign="top" colspan="2">299 (52.5)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Low (&#x003C;5000 SAR)</td><td align="left" valign="top" colspan="2">155 (27.5)</td></tr><tr><td align="left" valign="top" colspan="3">Experience using mHealth apps</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003C;6 months</td><td align="left" valign="top" colspan="2">113 (20)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>6&#x2010;12 months</td><td align="left" valign="top" colspan="2">102 (18)</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>1&#x2010;3 years</td><td align="left" valign="top" colspan="2">213 (37.5)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003E;3 years</td><td align="left" valign="top" colspan="2">139 (24.5)</td></tr><tr><td align="left" valign="top" colspan="3">mHealth user category</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Active</td><td align="left" valign="top" colspan="2">533 (94)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Inactive</td><td align="left" valign="top" colspan="2">34 (6)</td></tr><tr><td align="left" valign="top" colspan="3">Self-care activities</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Health-related reminders</td><td align="left" valign="top" colspan="2">85 (15)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Monitoring behavioral or lifestyle changes</td><td align="left" valign="top" colspan="2">272 (48)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Physical activities or exercise</td><td align="left" valign="top" colspan="2">159 (28)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Remote consultation</td><td align="left" valign="top" colspan="2">125 (22)</td></tr></tbody></table><table-wrap-foot><fn id="table2fn1"><p><sup>a</sup>Self-care activities were assessed using multiple-choice options; therefore, the cumulative percentage is greater than 100%.</p></fn><fn id="table2fn2"><p><sup>b</sup>SAR: Saudi Arabia riyal (1 SAR=US $0.27).</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-2"><title>Patients&#x2019; Perspectives on Data Privacy, Security, and Confidentiality</title><p>Descriptive results of participants&#x2019; responses to items used in assessing their data privacy, security, and confidentiality concerns are summarized in the <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>. Slightly more than half of the participants were concerned when health care providers asked them for too much personal information, suggesting that health care providers may be collecting excess personal information. A high proportion (394/567, 69.5%) agreed with the possibility of unauthorized individuals accessing their personal information. Most patients prioritized their data privacy when using mHealth apps (349/567, 61.6%), always checked and read the privacy policy before signing up for mHealth apps (280/567, 49.4%), and checked the privacy settings before use (277/567, 48.9%). Furthermore, although 40% (226/567) of participants agreed that app developers ensure data confidentiality, 35% (198/567) disagreed with the statements. Nevertheless, most participants reported that they always log out of mHealth apps after use, refuse to allow their data to be used for marketing research purposes, and are indifferent to sharing their clinical history on mHealth apps. Most patients (309/567, 54.6%) also agreed that a law exists to protect the usage of their personal data by a third party without their permission.</p><p>For data security, more than 60% (340/567) of the participants agreed that their mobile phones are protected with a password and/or biometrics, avoid using their smartphones with other users, and prefer mHealth apps to have user authentication to secure their personal data. In contrast, comparatively lower proportions agreed with changing their passwords regularly to avoid data hacking (246/567, 43.4%), using mHealth apps with an option to terminate permission of data collection before signing up (281/567, 49.6%), and being aware of encryption functions to assist in securing their data (234/567, 41.3%).</p><p>The mean (SD) score for data security was 3.22 (1.12), for data confidentiality was 3.04 (1.25), and for data privacy was 2.93 (1.08). Despite 38.2% (217/567) of patients demonstrating greater concerns regarding at least one of the investigated issues, no significant difference was observed in the proportions of patients expressing low or high concerns (<xref ref-type="table" rid="table3">Table 3</xref>).</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Data privacy, security, and confidentiality concerns and mHealth app usage.<sup><xref ref-type="table-fn" rid="table3fn1">c</xref></sup></p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Mean (SD)</td><td align="left" valign="bottom" colspan="2">Concerns</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="top">Low (%)</td><td align="left" valign="top">High (%)</td></tr></thead><tbody><tr><td align="left" valign="top">Data privacy</td><td align="left" valign="top">2.93<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup> (1.08)</td><td align="left" valign="top">58.6<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="top">41.4</td></tr><tr><td align="left" valign="top">Data confidentiality</td><td align="left" valign="top">3.04<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup> (1.15)</td><td align="left" valign="top">60.8<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="top">39.2</td></tr><tr><td align="left" valign="top">Data security</td><td align="left" valign="top">3.22<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup> (1.25)</td><td align="left" valign="top">64.4<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="top">35.6</td></tr><tr><td align="left" valign="top">Overall</td><td align="left" valign="top">3.06 (1.12)</td><td align="left" valign="top">61.2</td><td align="left" valign="top">38.2</td></tr></tbody></table><table-wrap-foot><fn id="table3fn1"><p><sup>a</sup>Higher mean scores reflect less concern regarding data privacy, confidentiality, and security. High and low categories were computed based on a cutoff point of 2.5 on the 5-point Likert scale.</p></fn><fn id="table3fn2"><p><sup>b</sup>Mean values with the same superscript letter are not statistically significantly different (<italic>P</italic>&#x003E;.05).</p></fn></table-wrap-foot></table-wrap><p>A descriptive analysis of the TAM dimensions is shown in <xref ref-type="table" rid="table4">Table 4</xref>. PU recorded the highest mean (SD) score of 3.21 (1.33), followed by PEOU at 3.32 (1.33) and behavioral intention at 3.21 (1.33). These results indicate that most patients had a positive perception of the 3 domains, as evidenced by the frequency distribution, where more than 60% (340/567) were in the &#x201C;high&#x201D; category. No significant difference was observed in the mean scores between any of the TAM dimensions.</p><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>Descriptive analysis of Technology Adoption Model dimensions<sup><xref ref-type="table-fn" rid="table4fn1">a</xref></sup>.</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Mean (SD)</td><td align="left" valign="bottom" colspan="2">Categories</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="top">High (%)</td><td align="left" valign="top">Low (%)</td></tr></thead><tbody><tr><td align="left" valign="top">Perceived usefulness</td><td align="left" valign="top">3.40<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup> (1.35)</td><td align="left" valign="top">68<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup></td><td align="left" valign="top">32</td></tr><tr><td align="left" valign="top">Perceived ease of use</td><td align="left" valign="top">3.32<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup> (1.33)</td><td align="left" valign="top">66.4<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup></td><td align="left" valign="top">33.6</td></tr><tr><td align="left" valign="top">Behavioral intention</td><td align="left" valign="top">3.21<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup> (1.33)</td><td align="left" valign="top">64.2<sup><xref ref-type="table-fn" rid="table4fn2">b</xref></sup></td><td align="left" valign="top">35.8</td></tr></tbody></table><table-wrap-foot><fn id="table4fn1"><p><sup>a</sup>Overall, <italic>P</italic> values were not computed for these variables, as they measure distinct dimensions of technology adoption. Higher mean scores reflect greater perceived usefulness, ease of use, and behavioral intention to use mHealth apps. High and low categories were computed based on a cutoff point of 2.5 on the 5-point Likert scale.</p></fn><fn id="table4fn2"><p><sup>b</sup>Mean values with the same superscript letter are not statistically significantly different (<italic>P</italic>&#x003E;.05).</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-3"><title>Influence of Patients&#x2019; Demographic Profile and Data Privacy, Security, and Confidentiality Concerns</title><p><xref ref-type="table" rid="table5">Table 5</xref> depicts the bivariate analysis of patients&#x2019; demographic factors and responses to items regarding mHealth app privacy, confidentiality, and security. Female users demonstrated significantly higher mean scores (<italic>P</italic>&#x003C;.05) in terms of data privacy, security, and confidentiality compared with male users of mHealth apps. Likewise, patients with secondary or high school qualifications and older age groups (46&#x2010;65 y and above 65 y old) recorded significantly higher scores (<italic>P</italic>&#x003C;.05) for all investigated outcomes relative to those with higher educational qualifications (bachelor&#x2019;s, master&#x2019;s, and PhD) and younger patients (18-25 y old), respectively. In contrast, no significant relationships were observed in terms of income level, user category (active vs inactive), experience using mHealth apps, or type of self-care activities.</p><table-wrap id="t5" position="float"><label>Table 5.</label><caption><p>Bivariate analyses of patients&#x2019; demographic profile and security, privacy, and confidentiality concerns of data shared via mHealth apps.</p></caption><table id="table5" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom" colspan="2">Data privacy</td><td align="left" valign="bottom" colspan="2">Data security</td><td align="left" valign="bottom" colspan="2">Data confidentiality</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="top">Mean (SD)</td><td align="left" valign="top"><italic>P</italic> value</td><td align="left" valign="top">Mean (SD)</td><td align="left" valign="top"><italic>P</italic> value</td><td align="left" valign="top">Mean (SD)</td><td align="left" valign="top"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top">Gender</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.003</td></tr><tr><td align="left" valign="top">&#x2003;Male</td><td align="left" valign="top">2.81 (1.16)</td><td align="left" valign="top"/><td align="left" valign="top">3.08 (1.35)</td><td align="left" valign="top"/><td align="left" valign="top">2.88 (1.23)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Female</td><td align="left" valign="top">3.20 (0.80)</td><td align="left" valign="top"/><td align="left" valign="top">3.53 (0.93)</td><td align="left" valign="top"/><td align="left" valign="top">3.36 (0.88)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Educational qualification</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">&#x2003;High school or secondary</td><td align="left" valign="top">3.42 (1.31)</td><td align="left" valign="top"/><td align="left" valign="top">3.50 (1.44)</td><td align="left" valign="top"/><td align="left" valign="top">3.51 (1.48)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Bachelor&#x2019;s degree</td><td align="left" valign="top">3.05 (1.03)</td><td align="left" valign="top"/><td align="left" valign="top">3.23 (1.10)</td><td align="left" valign="top"/><td align="left" valign="top">3.20 (1.18)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Master&#x2019;s degree</td><td align="left" valign="top">3.04 (0.86)</td><td align="left" valign="top"/><td align="left" valign="top">3.10 (0.95)</td><td align="left" valign="top"/><td align="left" valign="top">3.11 (1.05)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Diploma</td><td align="left" valign="top">2.89 (1.25)</td><td align="left" valign="top"/><td align="left" valign="top">3.03 (1.25)</td><td align="left" valign="top"/><td align="left" valign="top">3.01 (1.42)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;PhD</td><td align="left" valign="top">2.94 (1.02)</td><td align="left" valign="top"/><td align="left" valign="top">2.92 (1.17)</td><td align="left" valign="top"/><td align="left" valign="top">2.99 (1.22)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Age (y)</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">&#x2003;18&#x2010;25</td><td align="left" valign="top">2.28 (1.36)</td><td align="left" valign="top"/><td align="left" valign="top">2.37 (1.43)</td><td align="left" valign="top"/><td align="left" valign="top">2.39 (1.47)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;26&#x2010;35</td><td align="left" valign="top">2.99 (1.00)</td><td align="left" valign="top"/><td align="left" valign="top">3.07 (1.11)</td><td align="left" valign="top"/><td align="left" valign="top">3.29 (1.17)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;36&#x2010;45</td><td align="left" valign="top">2.97 (1.02)</td><td align="left" valign="top"/><td align="left" valign="top">3.06 (1.10)</td><td align="left" valign="top"/><td align="left" valign="top">3.27 (1.21)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;46&#x2010;65</td><td align="left" valign="top">3.14 (0.98)</td><td align="left" valign="top"/><td align="left" valign="top">3.32 (1.01)</td><td align="left" valign="top"/><td align="left" valign="top">3.49 (1.11)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;&#x003E;65</td><td align="left" valign="top">3.12 (0.82)</td><td align="left" valign="top"/><td align="left" valign="top">3.60 (0.48)</td><td align="left" valign="top"/><td align="left" valign="top">4.30 (0.57)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Income level</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.24</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.38</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.35</td></tr><tr><td align="left" valign="top">&#x2003;High</td><td align="left" valign="top">3.20 (0.80)</td><td align="left" valign="top"/><td align="left" valign="top">3.55 (0.87)</td><td align="left" valign="top"/><td align="left" valign="top">3.22 (0.78)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Middle</td><td align="left" valign="top">3.12 (1.31)</td><td align="left" valign="top"/><td align="left" valign="top">3.23 (1.25)</td><td align="left" valign="top"/><td align="left" valign="top">3.50 (1.57)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Low</td><td align="left" valign="top">3.02 (1.03)</td><td align="left" valign="top"/><td align="left" valign="top">3.11 (1.10)</td><td align="left" valign="top"/><td align="left" valign="top">3.42 (1.24)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Experience in using mHealth<sup><xref ref-type="table-fn" rid="table5fn1">a</xref></sup> apps</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.43</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.72</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.50</td></tr><tr><td align="left" valign="top">&#x2003;&#x003C;6 months</td><td align="left" valign="top">2.89 (1.25)</td><td align="left" valign="top"/><td align="left" valign="top">3.03 (1.25)</td><td align="left" valign="top"/><td align="left" valign="top">3.22 (1.42)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;6&#x2010;12 months</td><td align="left" valign="top">2.94 (1.02)</td><td align="left" valign="top"/><td align="left" valign="top">3.08 (1.17)</td><td align="left" valign="top"/><td align="left" valign="top">3.20 (1.22)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;1&#x2010;3 years</td><td align="left" valign="top">2.94 (1.09)</td><td align="left" valign="top"/><td align="left" valign="top">3.23 (1.24)</td><td align="left" valign="top"/><td align="left" valign="top">3.04 (1.16)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;&#x003E;3 years</td><td align="left" valign="top">2.92 (1.06)</td><td align="left" valign="top"/><td align="left" valign="top">3.22 (1.26)</td><td align="left" valign="top"/><td align="left" valign="top">3.03 (1.15)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">mHealth app user category</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.87</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.42</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.50</td></tr><tr><td align="left" valign="top">&#x2003;Active</td><td align="left" valign="top">2.89 (1.00)</td><td align="left" valign="top"/><td align="left" valign="top">3.01 (1.02)</td><td align="left" valign="top"/><td align="left" valign="top">3.49 (1.71)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Inactive</td><td align="left" valign="top">2.92 (1.02)</td><td align="left" valign="top"/><td align="left" valign="top">3.11 (1.30)</td><td align="left" valign="top"/><td align="left" valign="top">3.32 (1.26)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Self-care activities</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.62</td><td align="left" valign="top"/><td align="left" valign="top">.26</td><td align="left" valign="top">&#x2003;</td><td align="left" valign="top">.32</td></tr><tr><td align="left" valign="top">&#x2003;Health-related reminders</td><td align="left" valign="top">2.72 (1.04)</td><td align="left" valign="top"/><td align="left" valign="top">3.04 (1.00)</td><td align="left" valign="top"/><td align="left" valign="top">3.10 (1.18)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Monitoring behavioral changes</td><td align="left" valign="top">2.84 (1.01)</td><td align="left" valign="top"/><td align="left" valign="top">2.99 (1.14)</td><td align="left" valign="top"/><td align="left" valign="top">2.95 (1.26)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Physical activities</td><td align="left" valign="top">2.75 (0.88)</td><td align="left" valign="top"/><td align="left" valign="top">2.94 (1.12)</td><td align="left" valign="top"/><td align="left" valign="top">3.00 (1.01)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">&#x2003;Remote consultation</td><td align="left" valign="top">2.68 (0.78)</td><td align="left" valign="top"/><td align="left" valign="top">2.82 (0.58)</td><td align="left" valign="top"/><td align="left" valign="top">3.22 (0.77)</td><td align="left" valign="top"/></tr></tbody></table><table-wrap-foot><fn id="table5fn1"><p><sup>a</sup>mHealth: mobile health.</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-4"><title>Association Between TAM Dimensions and Patients&#x2019; Privacy, Security, and Confidentiality Concerns</title><p><xref ref-type="table" rid="table6">Table 6</xref> presents the 3 final regression models for the relationship between TAM dimensions and data privacy, security, and confidentiality concerns. As shown in model 1 (PU), approximately 26% of the variance in PU of mHealth apps was explained by the tested factors. There was no significant linear relationship between data privacy concerns and the PU of mHealth apps (<italic>P</italic>=.18). However, there was a significant positive relationship between the PU of mHealth apps and concerns regarding data confidentiality (<italic>P</italic>&#x003C;.001) and security (<italic>P</italic>&#x003C;.001). Thus, patients were more likely to have higher PU following a unit decrease in data confidentiality and security concerns.</p><table-wrap id="t6" position="float"><label>Table 6.</label><caption><p>Multiple regression models showing the influence of perceived usefulness, perceived ease of use and behavioral intention to use mobile health apps and concerns regarding data privacy, confidentiality, and security.</p></caption><table id="table6" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom"><italic>&#x03B2;</italic></td><td align="left" valign="bottom"><italic>t</italic> test (<italic>df</italic>)</td><td align="left" valign="bottom"><italic>P</italic> value</td><td align="left" valign="bottom">95% CI</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="5">Model 1 (PU<sup><xref ref-type="table-fn" rid="table6fn2">b</xref></sup>)<sup><xref ref-type="table-fn" rid="table6fn3">c</xref></sup></td></tr><tr><td align="left" valign="top">&#x2003;Constant</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table6fn4">d</xref></sup></td><td align="left" valign="top">&#x2212;0.28 (563)</td><td align="left" valign="top">.78</td><td align="left" valign="top">&#x2212;0.18 to 0.14</td></tr><tr><td align="left" valign="top">&#x2003;Data privacy</td><td align="left" valign="top">.06</td><td align="left" valign="top">1.33 (563)</td><td align="left" valign="top">.18</td><td align="left" valign="top">&#x2212;0.04 to 0.12</td></tr><tr><td align="left" valign="top">&#x2003;Data confidentiality</td><td align="left" valign="top">.31</td><td align="left" valign="top">7.42 (563)</td><td align="left" valign="top">.01</td><td align="left" valign="top">0.27 to 0.46</td></tr><tr><td align="left" valign="top">&#x2003;Data security</td><td align="left" valign="top">.47</td><td align="left" valign="top">10.82 (563)</td><td align="left" valign="top">.01</td><td align="left" valign="top">0.42 to 0.61</td></tr><tr><td align="left" valign="top" colspan="5">Model 2 (PEOU<sup><xref ref-type="table-fn" rid="table6fn5">e</xref></sup>)<sup><xref ref-type="table-fn" rid="table6fn6">f</xref></sup></td></tr><tr><td align="left" valign="top">&#x2003;Constant</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2212;0.18 (563)</td><td align="left" valign="top">.85</td><td align="left" valign="top">&#x2212;0.17 to 0.14</td></tr><tr><td align="left" valign="top">&#x2003;Data privacy</td><td align="left" valign="top">.188</td><td align="left" valign="top">3.98 (563)</td><td align="left" valign="top">.001</td><td align="left" valign="top">0.11 to 0.34</td></tr><tr><td align="left" valign="top">&#x2003;Data confidentiality</td><td align="left" valign="top">.248</td><td align="left" valign="top">5.75 (563)</td><td align="left" valign="top">.001</td><td align="left" valign="top">0.18 to 0.38</td></tr><tr><td align="left" valign="top">&#x2003;Data security</td><td align="left" valign="top">.436</td><td align="left" valign="top">9.76 (563)</td><td align="left" valign="top">.02</td><td align="left" valign="top">0.37 to 0.55</td></tr><tr><td align="left" valign="top" colspan="5">Model 3 (Behavioral intention)<sup><xref ref-type="table-fn" rid="table6fn7">g</xref></sup></td></tr><tr><td align="left" valign="top">&#x2003;Constant</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2212;0.21 (563)</td><td align="left" valign="top">.82</td><td align="left" valign="top">&#x2212;0.20 to 0.160</td></tr><tr><td align="left" valign="top">&#x2003;Data privacy</td><td align="left" valign="top">.18</td><td align="left" valign="top">3.25 (563)</td><td align="left" valign="top">.02</td><td align="left" valign="top">0.08 to 0.35</td></tr><tr><td align="left" valign="top">&#x2003;Data confidentiality</td><td align="left" valign="top">.24</td><td align="left" valign="top">4.80 (563)</td><td align="left" valign="top">.03</td><td align="left" valign="top">0.16 to 0.39</td></tr><tr><td align="left" valign="top">&#x2003;Data security</td><td align="left" valign="top">.36</td><td align="left" valign="top">7.02 (563)</td><td align="left" valign="top">.01</td><td align="left" valign="top">0.282 to 0.50</td></tr></tbody></table><table-wrap-foot><fn id="table6fn1"><p><sup>a</sup>Degrees of freedom for the reported <italic>t</italic> values were based on the residual degrees of freedom from the regression models.</p></fn><fn id="table6fn2"><p><sup>b</sup>PU: perceived usefulness.</p></fn><fn id="table6fn3"><p><sup>c</sup>Model 1: <italic>R</italic><sup>2</sup>=0.26; adjusted <italic>R</italic><sup>2</sup>=0.25; SE=0.12.</p></fn><fn id="table6fn4"><p><sup>d</sup>Not applicable.</p></fn><fn id="table6fn5"><p><sup>e</sup>PEOU: perceived ease of use.</p></fn><fn id="table6fn6"><p><sup>f</sup>Model 2: <italic>R</italic><sup>2</sup>=0.20; adjusted <italic>R</italic><sup>2</sup>=0.19; SE=0.09.</p></fn><fn id="table6fn7"><p><sup>g</sup>Model 3: <italic>R</italic><sup>2</sup>=0.22; adjusted <italic>R</italic><sup>2</sup>=0.21; SE=0.11.</p></fn></table-wrap-foot></table-wrap><p>In terms of PEOU of mHealth apps, about 20% of the variation in PEOU of mHealth apps was explained by the independent variables. Specifically, the PEOU of mHealth apps increased as users demonstrated less concern regarding data privacy, confidentiality, and security (ie, higher mean scores for each independent variable). All the tested factors demonstrated significant linear relationships (<italic>P</italic>&#x003C;.05) with behavioral intention to use mHealth apps. Behavioral intention to use mHealth apps increased significantly following a reduction in respondents&#x2019; concerns toward data privacy, confidentiality, and security issues. The <italic>R</italic><sup>2</sup> value revealed that 22% of the variance in behavioral intention to use mHealth apps was explained by the tested factors.</p></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Main Findings</title><p>Given the widespread use of smartphones and the adoption of digitalized health technologies in Saudi Arabia, it is pertinent to elucidate events that may shape the adoption and usage of mHealth apps, particularly those designed for self-care management. Examples include several mHealth apps implemented by the Ministry of Health in response to COVID-19 [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>] and those for managing chronic diseases, such as the Cora Health and Sehhaty Wa Daghty apps [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. The provision of adequate security and privacy is key to enhancing the effectiveness and adoption of these apps [<xref ref-type="bibr" rid="ref35">35</xref>]. However, relevant privacy and security issues related to mHealth are poorly understood in Saudi Arabia [<xref ref-type="bibr" rid="ref11">11</xref>]. This study provides insight into the factors influencing mHealth app usage for self-care among patients and their data privacy, security, and confidentiality concerns.</p><p>Approximately one-third of the patients (217/567, 38.2%) conveyed greater concerns regarding the privacy and security of mHealth apps used for self-care in Saudi Arabia. This finding supports the reports from prior local studies, whereby users perceived the privacy of mHealth apps as inadequate, with a greater risk of affecting data security [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Further comparison can be made between our study and that of Aljedaani et al [<xref ref-type="bibr" rid="ref15">15</xref>], who focused on end users&#x2019; awareness of security features in mHealth apps introduced in Saudi Arabia. Most respondents in their study were unaware of the existing security features, which led to only a few respondents expressing concerns regarding data privacy. The discrepancy stems from the fact that patients using mHealth apps for self-care were enrolled in our study and are well conversant with the technology. Our results are also similar to research conducted in Western countries. For instance, 96% of users in the United Kingdom expressed concern about personal data security and privacy, leading to requests for user authentication and data encryption [<xref ref-type="bibr" rid="ref37">37</xref>].</p><p>Gender-, education-, and age-based differences were observed in relation to concerns regarding mHealth apps&#x2019; data privacy and security. Notably, female patients in our study were more concerned about data privacy and security compared with male patients. While the underlying reasons for these results are not well understood, given the lack of published research on the topic, a few studies have shown gender-specific differences in satisfaction levels with mHealth apps [<xref ref-type="bibr" rid="ref36">36</xref>]. For instance, male users reflect higher satisfaction levels with mHealth apps and perceptions of health-related technologies [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref40">40</xref>]. In our study, female patients were less satisfied with mHealth apps, which may account for their concerns regarding the security and confidentiality of data shared on digital technologies.</p><p>Younger patients also reflected a higher level of concern about privacy in mHealth apps relative to the older age groups. This result might be influenced by increased exposure to events relating to data breaches, as they spend more time on their smartphones compared with the older population [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. Moreover, young patients tend to be more familiar with digital interfaces, as evidenced in research reporting mHealth app usage for diabetes self-management [<xref ref-type="bibr" rid="ref41">41</xref>] and studies conducted in Canada [<xref ref-type="bibr" rid="ref42">42</xref>] and the United Kingdom [<xref ref-type="bibr" rid="ref43">43</xref>]. As a result, young patients have greater inclinations toward security notifications and authentication, increasing their perception of data privacy and security [<xref ref-type="bibr" rid="ref36">36</xref>]. Higher technological acceptance and comfort among young users, variation in user expectations and technological literacy levels, and their effects on overall satisfaction may explain these findings.</p><p>Technology literacy levels have been demonstrated as a predictor of attitude and intention to use mobile apps for self-care management, such as diabetes and hypertension control [<xref ref-type="bibr" rid="ref42">42</xref>], but it is unclear whether educational status shapes patients&#x2019; perspectives on data privacy. In this study, patients with higher educational qualifications were more likely to raise concerns regarding data privacy and security compared with less educated patients. The reason for this finding may stem from greater confidence and more informed decision-making when using mHealth technologies among highly educated users. Higher education could also influence patients&#x2019; attitudes or intentions to use mHealth apps for self-care [<xref ref-type="bibr" rid="ref44">44</xref>]. A recent study in Saudi Arabia found no significant association between diabetes patients&#x2019; educational status and their attitude or intention to use mHealth apps [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. Our study sheds more light on the topic, highlighting how educational level and privacy concerns may interact in shaping patients&#x2019; intentions to use digital health technologies, particularly in the Saudi Arabian context. Overall, the demographic influences identified in the present study underscore the significance of tailoring mHealth apps that take into account diverse patient preferences and abilities to maximize effectiveness and engagement.</p><p>As for the TAM domains, the hypothesized relationship between PU of mHealth apps and patients&#x2019; concerns about data security and confidentiality was supported. Greater concerns about data security, privacy, and confidentiality influenced patients&#x2019; PEOU of mHealth apps. Hence, patients found mHealth apps to be more useful and easy to operate upon perceiving the technology as highly secure and confidential in handling their personal data. In other words, 1 approach to address users&#x2019; concerns regarding data security is to ensure they can easily navigate the technology and access the security features. Thus, apart from improving the security features as suggested by most users, ensuring that these security features are easy to use is even more important. These findings are consistent with studies reporting data security issues as reasons for users declining to adopt digital health technologies [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. Prior studies depicted that security and privacy are fundamental aspects when designing self-care mobile apps for users in Saudi Arabia [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. For instance, the Sehhaty Wa Daghty app, a widely used mHealth app in Saudi Arabia, has effective provisions for gathering and handling users&#x2019; personal health information by following principles outlined in the European Commission&#x2019;s code of conduct on privacy of mHealth apps [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref47">47</xref>]. These provisions contributed significantly to a high level of adoption among the target population. Moreover, a recent empirical investigation into end users&#x2019; security awareness of mHealth apps revealed participants&#x2019; desire for usable security, such as biometric authentication, and their concerns about data anonymization [<xref ref-type="bibr" rid="ref15">15</xref>]. Thus, the present study reflects that addressing data privacy and security issues is a promising approach to enhancing the adoption and usage of self-care mobile apps.</p><p>Lastly, patients&#x2019; behavioral intention to use mHealth apps improved upon perceiving that the technology effectively addressed data security, privacy, and confidentiality. These findings support the position of previous studies in which users&#x2019; awareness of data privacy was reported to influence their intention to adopt technology and share their personal information [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref48">48</xref>-<xref ref-type="bibr" rid="ref50">50</xref>]. Behavioral modifications toward specific health care services, including mHealth, may be shaped by users&#x2019; perspectives and concerns about the data privacy of health information [<xref ref-type="bibr" rid="ref9">9</xref>]. Past research demonstrated that severe consequences and effects on users&#x2019; behavior and attitude toward health care services may arise from the failure to mitigate customers&#x2019; privacy concerns [<xref ref-type="bibr" rid="ref23">23</xref>]. Mukherjee et al [<xref ref-type="bibr" rid="ref23">23</xref>] also reported that security to privacy combined with shared values were positively associated with customers&#x2019; behavioral intention, which is consistent with the present study.</p></sec><sec id="s4-2"><title>Implications of the Study</title><p>This study has important implications for mHealth app developers and the health care system in Saudi Arabia. The security and adoption of mHealth systems could be effectively strengthened if both developers&#x2019; and patients&#x2019; perspectives on mHealth apps are aligned [<xref ref-type="bibr" rid="ref37">37</xref>]. mHealth developers can use the research findings to devise strategies to ensure the safety of patient health information, deliver health care services efficiently, and maintain a balance between security and usability. The findings from this study reflect underlying issues relating to patients&#x2019; awareness of security and privacy features provided in mHealth apps implemented by the Saudi government. Hence, the research outcomes reveal certain factors contributing to the present low adoption rate of mHealth apps among patients. Necessary adjustments in terms of decision-making, policies, and investments could be made to ensure that mHealth apps align with Vision 2030 goals, particularly for self-care management.</p><p>This study findings also have important research implications by demonstrating the relevance of combining technology adoption theories and the PSC framework in understanding factors that could shape patients&#x2019; decisions to adopt and use mHealth apps for self-care management. As only a few studies on this research topic have been published, this study offers more opportunities for exploring relevant theoretical models that could be used to explain factors contributing to patients&#x2019; views and understanding of mHealth app security and privacy.</p></sec><sec id="s4-3"><title>Limitations of the Study</title><p>Despite using a cross-sectional approach in this study, certain methodological limitations need to be acknowledged. The inclusion and exclusion criteria used in selecting the study participants might have excluded potential participants with pertinent information on the research topics. Furthermore, only patients using mHealth apps for self-care management were recruited, and the use of self-reported instruments is subject to response bias. These limitations may affect the generalizability of the results. Another possible limitation is the lack of generalizability to other digital health tools and populations of other countries, since the patients were recruited only from Saudi Arabia. Lastly, this study used a cross-sectional design, and the findings depict only the associations between the studied variables, which include patients&#x2019; demographic profile, PEOU, PU, and behavioral intention to use mHealth apps, as well as concerns regarding data privacy, security, and confidentiality. In other words, no causal relationships can be inferred. Future studies may consider including health care professionals and app developers to build on the present findings.</p></sec><sec id="s4-4"><title>Conclusion</title><p>This study revealed that about one-third of patients using mHealth apps for self-care expressed concerns regarding data privacy and security, which were shaped by demographic factors such as gender, education, and age. Available data indicated that income level, experience, user category (active vs inactive), and type of self-care activities had no influence on data privacy and security perception. Concerns regarding data security, privacy, and confidentiality shaped the PU, PEOU, and behavioral intention to use mHealth apps for self-care management. Thus, a proposed approach to address patients&#x2019; security concerns is to ensure that they can easily navigate the technology and access security and privacy features. Ensuring that these security features are user-friendly is equally important. Given the rising usage of smartphones, huge investment in mHealth apps, and the campaign to improve the usage of advanced health care systems in Saudi Arabia, this research elucidates a vital aspect that may affect these targeted goals. Policymakers and relevant bodies can use the findings to implement a model to enhance the adoption of mHealth apps, particularly by addressing patients&#x2019; concerns regarding their data privacy and security.</p></sec></sec></body><back><ack><p>Generative artificial intelligence was not used to draft any portion of this manuscript.</p></ack><notes><sec><title>Funding</title><p>This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.</p></sec><sec><title>Data Availability</title><p>The full data extraction sheet is available from the corresponding author upon reasonable request.</p></sec></notes><fn-group><fn fn-type="con"><p>Conceptualization: NA, TNA, GE (equal)</p><p>Data curation: NA (lead), MA, AA (supporting)</p><p>Formal analysis: NA (lead), MA, AA (supporting)</p><p>Funding acquisition: NA, TNA, GE (equal)</p><p>Investigation: NA (lead), MA, AA (supporting)</p><p>Methodology: NA, TNA, GE (equal)</p><p>Project administration: NA (lead), TNA, GE, MA (supporting)</p><p>Supervision: TNA, GE (equal)</p><p>Writing original draft: NA (lead), MA, AA (supporting)</p><p>Writing review &#x0026; editing: NA, TNA, GE, MA, AA</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">mHealth</term><def><p>mobile health</p></def></def-item><def-item><term id="abb2">PEOU</term><def><p>perceived ease of use</p></def></def-item><def-item><term id="abb3">PU</term><def><p>perceived usefulness</p></def></def-item><def-item><term id="abb4">TAM</term><def><p>Technology Adoption Model</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chen</surname><given-names>J</given-names> </name><name name-style="western"><surname>Lieffers</surname><given-names>J</given-names> </name><name name-style="western"><surname>Bauman</surname><given-names>A</given-names> </name><name name-style="western"><surname>Hanning</surname><given-names>R</given-names> </name><name name-style="western"><surname>Allman-Farinelli</surname><given-names>M</given-names> </name></person-group><article-title>The use of smartphone health apps and other mobile health (mHealth) technologies in dietetic practice: a three country study</article-title><source>J Hum Nutr Diet</source><year>2017</year><month>08</month><volume>30</volume><issue>4</issue><fpage>439</fpage><lpage>452</lpage><pub-id pub-id-type="doi">10.1111/jhn.12446</pub-id><pub-id pub-id-type="medline">28116773</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hussain</surname><given-names>M</given-names> </name><name name-style="western"><surname>Zaidan</surname><given-names>AA</given-names> </name><name name-style="western"><surname>Zidan</surname><given-names>BB</given-names> </name><etal/></person-group><article-title>Conceptual framework for the security of mobile health applications on Android platform</article-title><source>Telemat Inform</source><year>2018</year><month>08</month><volume>35</volume><issue>5</issue><fpage>1335</fpage><lpage>1354</lpage><pub-id pub-id-type="doi">10.1016/j.tele.2018.03.005</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fagherazzi</surname><given-names>G</given-names> </name><name name-style="western"><surname>Goetzinger</surname><given-names>C</given-names> </name><name name-style="western"><surname>Rashid</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Aguayo</surname><given-names>GA</given-names> </name><name name-style="western"><surname>Huiart</surname><given-names>L</given-names> </name></person-group><article-title>Digital health strategies to fight COVID-19 worldwide: challenges, recommendations, and a call for papers</article-title><source>J Med Internet Res</source><year>2020</year><month>06</month><day>16</day><volume>22</volume><issue>6</issue><fpage>e19284</fpage><pub-id pub-id-type="doi">10.2196/19284</pub-id><pub-id pub-id-type="medline">32501804</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhou</surname><given-names>L</given-names> </name><name name-style="western"><surname>Bao</surname><given-names>J</given-names> </name><name name-style="western"><surname>Watzlaf</surname><given-names>V</given-names> </name><name name-style="western"><surname>Parmanto</surname><given-names>B</given-names> </name></person-group><article-title>Barriers to and facilitators of the use of mobile health apps from a security perspective: mixed-methods study</article-title><source>JMIR mHealth uHealth</source><year>2019</year><month>04</month><day>16</day><volume>7</volume><issue>4</issue><fpage>e11223</fpage><pub-id pub-id-type="doi">10.2196/11223</pub-id><pub-id pub-id-type="medline">30990458</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kao</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Liebovitz</surname><given-names>DM</given-names> </name></person-group><article-title>Consumer mobile health apps: current state, barriers, and future directions</article-title><source>PM R</source><year>2017</year><month>05</month><volume>9</volume><issue>5S</issue><fpage>S106</fpage><lpage>S115</lpage><pub-id pub-id-type="doi">10.1016/j.pmrj.2017.02.018</pub-id><pub-id pub-id-type="medline">28527495</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Li</surname><given-names>J</given-names> </name><name name-style="western"><surname>Silvera-Tawil</surname><given-names>D</given-names> </name><name name-style="western"><surname>Varnfield</surname><given-names>M</given-names> </name><name name-style="western"><surname>Hussain</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Math</surname><given-names>V</given-names> </name></person-group><article-title>Users&#x2019; perceptions toward mHealth technologies for health and well-being monitoring in pregnancy care: qualitative interview study</article-title><source>JMIR Form Res</source><year>2021</year><month>12</month><day>2</day><volume>5</volume><issue>12</issue><fpage>e28628</fpage><pub-id pub-id-type="doi">10.2196/28628</pub-id><pub-id pub-id-type="medline">34860665</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bhuyan</surname><given-names>SS</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>H</given-names> </name><name name-style="western"><surname>Isehunwa</surname><given-names>OO</given-names> </name><etal/></person-group><article-title>Privacy and security issues in mobile health: current research and future directions</article-title><source>Health Policy Technol</source><year>2017</year><month>06</month><volume>6</volume><issue>2</issue><fpage>188</fpage><lpage>191</lpage><pub-id pub-id-type="doi">10.1016/j.hlpt.2017.01.004</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sampat</surname><given-names>BH</given-names> </name><name name-style="western"><surname>Prabhakar</surname><given-names>B</given-names> </name></person-group><article-title>Privacy risks and security threats in mHealth apps</article-title><source>J Int Technol Inf Manag</source><year>2017</year><volume>26</volume><issue>4</issue><fpage>126</fpage><lpage>153</lpage><pub-id pub-id-type="doi">10.58729/1941-6679.1353</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Asiri</surname><given-names>E</given-names> </name><name name-style="western"><surname>Asiri</surname><given-names>H</given-names> </name><name name-style="western"><surname>Househ</surname><given-names>M</given-names> </name></person-group><article-title>Exploring the concepts of privacy and the sharing of sensitive health information</article-title><source>Integrating Information Technology and Management for Quality of Care</source><year>2014</year><publisher-name>IOS Press</publisher-name><fpage>161</fpage><lpage>164</lpage><pub-id pub-id-type="doi">10.3233/978-1-61499-423-7-161</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Esposito</surname><given-names>M</given-names> </name><name name-style="western"><surname>Minutolo</surname><given-names>A</given-names> </name><name name-style="western"><surname>Megna</surname><given-names>R</given-names> </name><name name-style="western"><surname>Forastiere</surname><given-names>M</given-names> </name><name name-style="western"><surname>Magliulo</surname><given-names>M</given-names> </name><name name-style="western"><surname>De Pietro</surname><given-names>G</given-names> </name></person-group><article-title>A smart mobile, self-configuring, context-aware architecture for personal health monitoring</article-title><source>Eng Appl Artif Intell</source><year>2018</year><month>01</month><volume>67</volume><fpage>136</fpage><lpage>156</lpage><pub-id pub-id-type="doi">10.1016/j.engappai.2017.09.019</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Alanzi</surname><given-names>T</given-names> </name></person-group><article-title>mHealth for diabetes self-management in the Kingdom of Saudi Arabia: barriers and solutions</article-title><source>J Multidiscip Healthc</source><year>2018</year><volume>11</volume><fpage>535</fpage><lpage>546</lpage><pub-id pub-id-type="doi">10.2147/JMDH.S174198</pub-id><pub-id pub-id-type="medline">30349285</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Young</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Alharthy</surname><given-names>A</given-names> </name><name name-style="western"><surname>Hosler</surname><given-names>AS</given-names> </name></person-group><article-title>Transformation of Saudi Arabia&#x2019;s health system and its impact on population health: what can the USA learn?</article-title><source>Saudi J Health Syst Res</source><year>2021</year><month>10</month><day>5</day><volume>1</volume><issue>3</issue><fpage>93</fpage><lpage>102</lpage><pub-id pub-id-type="doi">10.1159/000517488</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Aljohani</surname><given-names>N</given-names> </name><name name-style="western"><surname>Chandran</surname><given-names>D</given-names> </name></person-group><article-title>The adoption of mobile health applications by patients in developing countries: a systematic review</article-title><source>Int J Adv Comput Sci Appl</source><year>2021</year><volume>12</volume><issue>4</issue><pub-id pub-id-type="doi">10.14569/IJACSA.2021.0120403</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hassounah</surname><given-names>M</given-names> </name><name name-style="western"><surname>Raheel</surname><given-names>H</given-names> </name><name name-style="western"><surname>Alhefzi</surname><given-names>M</given-names> </name></person-group><article-title>Digital response during the COVID-19 pandemic in Saudi Arabia</article-title><source>J Med Internet Res</source><year>2020</year><month>09</month><day>1</day><volume>22</volume><issue>9</issue><fpage>e19338</fpage><pub-id pub-id-type="doi">10.2196/19338</pub-id><pub-id pub-id-type="medline">32790642</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Aljedaani</surname><given-names>B</given-names> </name><name name-style="western"><surname>Ahmad</surname><given-names>A</given-names> </name><name name-style="western"><surname>Zahedi</surname><given-names>M</given-names> </name><name name-style="western"><surname>Babar</surname><given-names>MA</given-names> </name></person-group><article-title>End-users&#x2019; knowledge and perception about security of clinical mobile health apps: a case study with two Saudi Arabian mHealth providers</article-title><source>J Syst Softw</source><year>2023</year><month>01</month><volume>195</volume><fpage>111519</fpage><pub-id pub-id-type="doi">10.1016/j.jss.2022.111519</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kassem</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Alhabib</surname><given-names>B</given-names> </name><name name-style="western"><surname>Alzunaydi</surname><given-names>K</given-names> </name><name name-style="western"><surname>Farooqui</surname><given-names>M</given-names> </name></person-group><article-title>Understanding patient needs regarding adverse drug reaction reporting smartphone applications: a qualitative insight from Saudi Arabia</article-title><source>Int J Environ Res Public Health</source><year>2021</year><month>04</month><day>7</day><volume>18</volume><issue>8</issue><fpage>3862</fpage><pub-id pub-id-type="doi">10.3390/ijerph18083862</pub-id><pub-id pub-id-type="medline">33917014</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wilkowska</surname><given-names>W</given-names> </name><name name-style="western"><surname>Ziefle</surname><given-names>M</given-names> </name></person-group><article-title>Privacy and data security in E-health: requirements from the user&#x2019;s perspective</article-title><source>Health Informatics J</source><year>2012</year><month>09</month><volume>18</volume><issue>3</issue><fpage>191</fpage><lpage>201</lpage><pub-id pub-id-type="doi">10.1177/1460458212442933</pub-id><pub-id pub-id-type="medline">23011814</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kong</surname><given-names>T</given-names> </name><name name-style="western"><surname>Scott</surname><given-names>MM</given-names> </name><name name-style="western"><surname>Li</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Wichelman</surname><given-names>C</given-names> </name></person-group><article-title>Physician attitudes towards-and adoption of-mobile health</article-title><source>Digit Health</source><year>2020</year><volume>6</volume><fpage>2055207620907187</fpage><pub-id pub-id-type="doi">10.1177/2055207620907187</pub-id><pub-id pub-id-type="medline">32128235</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Addotey-Delove</surname><given-names>M</given-names> </name><name name-style="western"><surname>Scott</surname><given-names>RE</given-names> </name><name name-style="western"><surname>Mars</surname><given-names>M</given-names> </name></person-group><article-title>Review of patients&#x2019; perspectives of m-health adoption factors in the developing world. Development of a proposed conceptual framework</article-title><source>Inform Med Unlocked</source><year>2020</year><volume>21</volume><fpage>100460</fpage><pub-id pub-id-type="doi">10.1016/j.imu.2020.100460</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chen</surname><given-names>D</given-names> </name><name name-style="western"><surname>Han</surname><given-names>W</given-names> </name><name name-style="western"><surname>Yang</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>J</given-names> </name></person-group><article-title>Doctors&#x2019; personal preference and adoption of mobile apps to communicate with patients in China: qualitative study</article-title><source>JMIR mHealth uHealth</source><year>2024</year><month>06</month><day>10</day><volume>12</volume><fpage>e49040</fpage><pub-id pub-id-type="doi">10.2196/49040</pub-id><pub-id pub-id-type="medline">38857491</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Schroeder</surname><given-names>T</given-names> </name><name name-style="western"><surname>Haug</surname><given-names>M</given-names> </name><name name-style="western"><surname>Georgiou</surname><given-names>A</given-names> </name><name name-style="western"><surname>Seaman</surname><given-names>K</given-names> </name><name name-style="western"><surname>Gewald</surname><given-names>H</given-names> </name></person-group><article-title>Evidence of how physicians and their patients adopt mHealth apps in Germany: exploratory qualitative study</article-title><source>JMIR mHealth uHealth</source><year>2024</year><month>01</month><day>17</day><volume>12</volume><fpage>e48345</fpage><pub-id pub-id-type="doi">10.2196/48345</pub-id><pub-id pub-id-type="medline">38231550</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Schroeder</surname><given-names>T</given-names> </name><name name-style="western"><surname>Seaman</surname><given-names>K</given-names> </name><name name-style="western"><surname>Nguyen</surname><given-names>A</given-names> </name><name name-style="western"><surname>Gewald</surname><given-names>H</given-names> </name><name name-style="western"><surname>Georgiou</surname><given-names>A</given-names> </name></person-group><article-title>Enablers and inhibitors to the adoption of mHealth apps by patients - a qualitative analysis of German doctors&#x2019; perspectives</article-title><source>Patient Educ Couns</source><year>2023</year><month>09</month><volume>114</volume><fpage>107865</fpage><pub-id pub-id-type="doi">10.1016/j.pec.2023.107865</pub-id><pub-id pub-id-type="medline">37356116</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mukherjee</surname><given-names>A</given-names> </name><name name-style="western"><surname>Nath</surname><given-names>P</given-names> </name></person-group><article-title>Role of electronic trust in online retailing: a re-examination of the commitment&#x2010;trust theory</article-title><source>Eur J Mark</source><year>2007</year><volume>41</volume><issue>9-10</issue><fpage>1173</fpage><lpage>1202</lpage><pub-id pub-id-type="doi">10.1108/03090560710773390</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dhagarra</surname><given-names>D</given-names> </name><name name-style="western"><surname>Goswami</surname><given-names>M</given-names> </name><name name-style="western"><surname>Kumar</surname><given-names>G</given-names> </name></person-group><article-title>Impact of trust and privacy concerns on technology acceptance in healthcare: an Indian perspective</article-title><source>Int J Med Inform</source><year>2020</year><month>09</month><volume>141</volume><fpage>104164</fpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2020.104164</pub-id><pub-id pub-id-type="medline">32593847</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Mangkunegara</surname><given-names>CN</given-names> </name><name name-style="western"><surname>Azzahro</surname><given-names>F</given-names> </name><name name-style="western"><surname>Handayani</surname><given-names>PW</given-names> </name></person-group><article-title>Analysis of factors affecting user&#x2019;s intention in using mobile health application: a case study of halodoc</article-title><conf-name>2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)</conf-name><conf-date>Oct 27-28, 2018</conf-date><conf-loc>Yogyakarta, Indonesia</conf-loc><fpage>87</fpage><lpage>92</lpage><pub-id pub-id-type="doi">10.1109/ICACSIS.2018.8618174</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ver&#x00ED;ssimo</surname><given-names>JMC</given-names> </name></person-group><article-title>Usage intensity of mobile medical apps: a tale of two methods</article-title><source>J Bus Res</source><year>2018</year><month>08</month><volume>89</volume><fpage>442</fpage><lpage>447</lpage><pub-id pub-id-type="doi">10.1016/j.jbusres.2017.12.026</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gagnon</surname><given-names>MP</given-names> </name><name name-style="western"><surname>Ngangue</surname><given-names>P</given-names> </name><name name-style="western"><surname>Payne-Gagnon</surname><given-names>J</given-names> </name><name name-style="western"><surname>Desmartis</surname><given-names>M</given-names> </name></person-group><article-title>m-Health adoption by healthcare professionals: a systematic review</article-title><source>J Am Med Inform Assoc</source><year>2016</year><month>01</month><volume>23</volume><issue>1</issue><fpage>212</fpage><lpage>220</lpage><pub-id pub-id-type="doi">10.1093/jamia/ocv052</pub-id><pub-id pub-id-type="medline">26078410</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Andrews</surname><given-names>L</given-names> </name><name name-style="western"><surname>Gajanayake</surname><given-names>R</given-names> </name><name name-style="western"><surname>Sahama</surname><given-names>T</given-names> </name></person-group><article-title>The Australian general public&#x2019;s perceptions of having a personally controlled electronic health record (PCEHR)</article-title><source>Int J Med Inform</source><year>2014</year><month>12</month><volume>83</volume><issue>12</issue><fpage>889</fpage><lpage>900</lpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2014.08.002</pub-id><pub-id pub-id-type="medline">25200198</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Chapple</surname><given-names>S</given-names> </name></person-group><article-title>Privacy vs confidentiality vs security: what&#x2019;s the difference?</article-title><source>EdTech</source><year>2019</year><access-date>2023-07-21</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://edtechmagazine.com/higher/article/2019/10/security-privacy-and-confidentiality-whats-difference">https://edtechmagazine.com/higher/article/2019/10/security-privacy-and-confidentiality-whats-difference</ext-link></comment></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhang</surname><given-names>D</given-names> </name><name name-style="western"><surname>Lim</surname><given-names>J</given-names> </name><name name-style="western"><surname>Zhou</surname><given-names>L</given-names> </name><name name-style="western"><surname>Dahl</surname><given-names>AA</given-names> </name></person-group><article-title>Breaking the data value-privacy paradox in mobile mental health systems through user-centered privacy protection: a web-based survey study</article-title><source>JMIR Ment Health</source><year>2021</year><month>12</month><day>24</day><volume>8</volume><issue>12</issue><fpage>e31633</fpage><pub-id pub-id-type="doi">10.2196/31633</pub-id><pub-id pub-id-type="medline">34951604</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhou</surname><given-names>L</given-names> </name><name name-style="western"><surname>Parmanto</surname><given-names>B</given-names> </name><name name-style="western"><surname>Alfikri</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Bao</surname><given-names>J</given-names> </name></person-group><article-title>A mobile app for assisting users to make informed selections in security settings for protecting personal health data: development and feasibility study</article-title><source>JMIR mHealth uHealth</source><year>2018</year><month>12</month><day>11</day><volume>6</volume><issue>12</issue><fpage>e11210</fpage><pub-id pub-id-type="doi">10.2196/11210</pub-id><pub-id pub-id-type="medline">30538088</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lackey</surname><given-names>NR</given-names> </name><name name-style="western"><surname>Wingate</surname><given-names>AL</given-names> </name></person-group><article-title>The pilot study: one key to research success</article-title><source>Kans Nurse</source><year>1986</year><month>11</month><volume>61</volume><issue>11</issue><fpage>6</fpage><lpage>7</lpage><pub-id pub-id-type="medline">3642076</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Abu-Elenin</surname><given-names>MM</given-names> </name><name name-style="western"><surname>Jaffery</surname><given-names>F</given-names> </name><name name-style="western"><surname>Gelal</surname><given-names>R</given-names> </name><name name-style="western"><surname>Alblaid</surname><given-names>R</given-names> </name><name name-style="western"><surname>Samarkandi</surname><given-names>L</given-names> </name></person-group><article-title>The perceptions towards the effectiveness of mHealth applications during the COVID-19 pandemic among Saudi healthcare providers</article-title><source>Perspect Health Inf Manag</source><year>2023</year><access-date>2026-05-02</access-date><volume>20</volume><issue>3</issue><fpage>1c</fpage><comment><ext-link ext-link-type="uri" xlink:href="https://pmc.ncbi.nlm.nih.gov/articles/PMC10701633/">https://pmc.ncbi.nlm.nih.gov/articles/PMC10701633/</ext-link></comment></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="web"><source>Ministry of Health, Saudi Arabia</source><year>2021</year><access-date>2024-08-25</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.moh.gov.sa/en/Pages/default.aspx">https://www.moh.gov.sa/en/Pages/default.aspx</ext-link></comment></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Alessa</surname><given-names>T</given-names> </name><name name-style="western"><surname>Hawley</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Hock</surname><given-names>ES</given-names> </name><name name-style="western"><surname>de Witte</surname><given-names>L</given-names> </name></person-group><article-title>Smartphone apps to support self-management of hypertension: review and content analysis</article-title><source>JMIR mHealth uHealth</source><year>2019</year><month>05</month><day>28</day><volume>7</volume><issue>5</issue><fpage>e13645</fpage><pub-id pub-id-type="doi">10.2196/13645</pub-id><pub-id pub-id-type="medline">31140434</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Alzahrani</surname><given-names>A</given-names> </name><name name-style="western"><surname>Gay</surname><given-names>V</given-names> </name><name name-style="western"><surname>Alturki</surname><given-names>R</given-names> </name></person-group><article-title>Enabled artificial intelligence (AI) to develop Sehhaty Wa Daghty app of self-management for Saudi patients with hypertension: a qualitative study</article-title><source>Information</source><year>2023</year><volume>14</volume><issue>6</issue><fpage>334</fpage><pub-id pub-id-type="doi">10.3390/info14060334</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Richardson</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Ancker</surname><given-names>JS</given-names> </name></person-group><article-title>Public perspectives of mobile phones&#x2019; effects on healthcare quality and medical data security and privacy: a 2-year nationwide survey</article-title><source>AMIA Annu Symp Proc</source><year>2015</year><volume>2015</volume><fpage>1076</fpage><lpage>1082</lpage><pub-id pub-id-type="medline">26958246</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kabha</surname><given-names>D</given-names> </name><name name-style="western"><surname>Salameh</surname><given-names>D</given-names> </name><name name-style="western"><surname>Ahmad</surname><given-names>D</given-names> </name><etal/></person-group><article-title>M-Health applications use amongst mobile users in Dubai-UAE</article-title><source>Int J Innov Technol Explor Eng</source><year>2019</year><volume>9</volume><issue>2</issue><fpage>5100</fpage><lpage>5110</lpage><pub-id pub-id-type="doi">10.35940/ijitee.B6477.129219</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Baker</surname><given-names>DR</given-names> </name><name name-style="western"><surname>Cadet</surname><given-names>K</given-names> </name><name name-style="western"><surname>Mani</surname><given-names>S</given-names> </name></person-group><article-title>COVID-19 testing and social determinants of health among disadvantaged Baltimore neighborhoods: a community mobile health clinic outreach model</article-title><source>Popul Health Manag</source><year>2021</year><month>12</month><volume>24</volume><issue>6</issue><fpage>657</fpage><lpage>663</lpage><pub-id pub-id-type="doi">10.1089/pop.2021.0066</pub-id><pub-id pub-id-type="medline">34030489</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Poulsen</surname><given-names>KA</given-names> </name><name name-style="western"><surname>Millen</surname><given-names>CM</given-names> </name><name name-style="western"><surname>Lakshman</surname><given-names>UI</given-names> </name><name name-style="western"><surname>Buttner</surname><given-names>PG</given-names> </name><name name-style="western"><surname>Roberts</surname><given-names>LJ</given-names> </name></person-group><article-title>Satisfaction with rural rheumatology telemedicine service</article-title><source>Int J Rheum Dis</source><year>2015</year><month>03</month><volume>18</volume><issue>3</issue><fpage>304</fpage><lpage>314</lpage><pub-id pub-id-type="doi">10.1111/1756-185X.12491</pub-id><pub-id pub-id-type="medline">25530007</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rangraz Jeddi</surname><given-names>F</given-names> </name><name name-style="western"><surname>Nabovati</surname><given-names>E</given-names> </name><name name-style="western"><surname>Hamidi</surname><given-names>R</given-names> </name><name name-style="western"><surname>Sharif</surname><given-names>R</given-names> </name></person-group><article-title>Mobile phone usage in patients with type II diabetes and their intention to use it for self-management: a cross-sectional study in Iran</article-title><source>BMC Med Inform Decis Mak</source><year>2020</year><month>02</month><day>7</day><volume>20</volume><issue>1</issue><fpage>24</fpage><pub-id pub-id-type="doi">10.1186/s12911-020-1038-y</pub-id><pub-id pub-id-type="medline">32033560</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Humble</surname><given-names>JR</given-names> </name><name name-style="western"><surname>Tolley</surname><given-names>EA</given-names> </name><name name-style="western"><surname>Krukowski</surname><given-names>RA</given-names> </name><name name-style="western"><surname>Womack</surname><given-names>CR</given-names> </name><name name-style="western"><surname>Motley</surname><given-names>TS</given-names> </name><name name-style="western"><surname>Bailey</surname><given-names>JE</given-names> </name></person-group><article-title>Use of and interest in mobile health for diabetes self-care in vulnerable populations</article-title><source>J Telemed Telecare</source><year>2016</year><month>01</month><volume>22</volume><issue>1</issue><fpage>32</fpage><lpage>38</lpage><pub-id pub-id-type="doi">10.1177/1357633X15586641</pub-id><pub-id pub-id-type="medline">26026179</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dobson</surname><given-names>KG</given-names> </name><name name-style="western"><surname>Hall</surname><given-names>P</given-names> </name></person-group><article-title>A pilot study examining patient attitudes and intentions to adopt assistive technologies into type 2 diabetes self-management</article-title><source>J Diabetes Sci Technol</source><year>2015</year><month>03</month><volume>9</volume><issue>2</issue><fpage>309</fpage><lpage>315</lpage><pub-id pub-id-type="doi">10.1177/1932296814560395</pub-id><pub-id pub-id-type="medline">25427965</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Althubyani</surname><given-names>A</given-names> </name><name name-style="western"><surname>Tang</surname><given-names>C</given-names> </name><name name-style="western"><surname>Thomas</surname><given-names>J</given-names> </name><name name-style="western"><surname>Gupta</surname><given-names>S</given-names> </name></person-group><article-title>Evaluating the use of web-based technologies for self-management among Arabic-speaking immigrants living with type 2 diabetes mellitus: a cross-sectional study in Saudi Arabia</article-title><source>Diabetology</source><year>2024</year><volume>5</volume><issue>1</issue><fpage>85</fpage><lpage>95</lpage><pub-id pub-id-type="doi">10.3390/diabetology5010007</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>AlOsaimi</surname><given-names>HM</given-names> </name><name name-style="western"><surname>Kanan</surname><given-names>M</given-names> </name><name name-style="western"><surname>AlOtaibi</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Assessing intention to use mobile phone-based self-management support among adults with type 2 diabetes in Saudi Arabia: a cross-sectional study</article-title><source>Digit Health</source><year>2025</year><volume>11</volume><fpage>20552076241308993</fpage><pub-id pub-id-type="doi">10.1177/20552076241308993</pub-id><pub-id pub-id-type="medline">39801586</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nurgalieva</surname><given-names>L</given-names> </name><name name-style="western"><surname>O&#x2019;Callaghan</surname><given-names>D</given-names> </name><name name-style="western"><surname>Doherty</surname><given-names>G</given-names> </name></person-group><article-title>Security and privacy of mHealth applications: a scoping review</article-title><source>IEEE Access</source><year>2020</year><volume>8</volume><fpage>104247</fpage><lpage>104268</lpage><pub-id pub-id-type="doi">10.1109/ACCESS.2020.2999934</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tangari</surname><given-names>G</given-names> </name><name name-style="western"><surname>Ikram</surname><given-names>M</given-names> </name><name name-style="western"><surname>Ijaz</surname><given-names>K</given-names> </name><name name-style="western"><surname>Kaafar</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Berkovsky</surname><given-names>S</given-names> </name></person-group><article-title>Mobile health and privacy: cross sectional study</article-title><source>BMJ</source><year>2021</year><month>06</month><day>16</day><volume>373</volume><fpage>n1248</fpage><pub-id pub-id-type="doi">10.1136/bmj.n1248</pub-id><pub-id pub-id-type="medline">34135009</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kayyali</surname><given-names>R</given-names> </name><name name-style="western"><surname>Peletidi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ismail</surname><given-names>M</given-names> </name><name name-style="western"><surname>Hashim</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Bandeira</surname><given-names>P</given-names> </name><name name-style="western"><surname>Bonnah</surname><given-names>J</given-names> </name></person-group><article-title>Awareness and use of mHealth apps: a study from England</article-title><source>Pharmacy (Basel)</source><year>2017</year><month>06</month><day>14</day><volume>5</volume><issue>2</issue><fpage>33</fpage><pub-id pub-id-type="doi">10.3390/pharmacy5020033</pub-id><pub-id pub-id-type="medline">28970445</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dang</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Guo</surname><given-names>S</given-names> </name><name name-style="western"><surname>Guo</surname><given-names>X</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>M</given-names> </name><name name-style="western"><surname>Xie</surname><given-names>K</given-names> </name></person-group><article-title>Privacy concerns about health information disclosure in mobile health: questionnaire study investigating the moderation effect of social support</article-title><source>JMIR mHealth uHealth</source><year>2021</year><month>02</month><day>8</day><volume>9</volume><issue>2</issue><fpage>e19594</fpage><pub-id pub-id-type="doi">10.2196/19594</pub-id><pub-id pub-id-type="medline">33555266</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Atienza</surname><given-names>AA</given-names> </name><name name-style="western"><surname>Zarcadoolas</surname><given-names>C</given-names> </name><name name-style="western"><surname>Vaughon</surname><given-names>W</given-names> </name><etal/></person-group><article-title>Consumer attitudes and perceptions on mHealth privacy and security: findings from a mixed-methods study</article-title><source>J Health Commun</source><year>2015</year><volume>20</volume><issue>6</issue><fpage>673</fpage><lpage>679</lpage><pub-id pub-id-type="doi">10.1080/10810730.2015.1018560</pub-id><pub-id pub-id-type="medline">25868685</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Questionnaire.</p><media xlink:href="formative_v10i1e83363_app1.pdf" xlink:title="PDF File, 337 KB"/></supplementary-material><supplementary-material id="app2"><label>Multimedia Appendix 2</label><p>Information sheet and consent.</p><media xlink:href="formative_v10i1e83363_app2.pdf" xlink:title="PDF File, 337 KB"/></supplementary-material></app-group></back></article>