Coping with COVID-19 using contact tracing mobile apps

Chenglong Li (Department of Information and Knowledge Management, Tampere University, Tampere, Finland)
Hongxiu Li (Department of Information and Knowledge Management, Tampere University, Tampere, Finland)
Shaoxiong Fu (College of Information Management, Nanjing Agricultural University, Nanjing, China)

Industrial Management & Data Systems

ISSN: 0263-5577

Article publication date: 28 February 2023

Issue publication date: 27 April 2023

1106

Abstract

Purpose

To cope with the COVID-19 pandemic, contact tracing mobile apps (CTMAs) have been developed to trace contact among infected individuals and alert people at risk of infection. To disrupt virus transmission until the majority of the population has been vaccinated, achieving the herd immunity threshold, CTMA continuance usage is essential in managing the COVID-19 pandemic. This study seeks to examine what motivates individuals to continue using CTMAs.

Design/methodology/approach

Following the coping theory, this study proposes a research model to examine CTMA continuance usage, conceptualizing opportunity appraisals (perceived usefulness and perceived distress relief), threat appraisals (privacy concerns) and secondary appraisals (perceived response efficacy) as the predictors of individuals' CTMA continuance usage during the pandemic. In the United States, an online survey was administered to 551 respondents.

Findings

The results revealed that perceived usefulness and response efficacy motivate CTMA continuance usage, while privacy concerns do not.

Originality/value

This study enriches the understanding of CTMA continuance usage during a public health crisis, and it offers practical recommendations for authorities.

Keywords

Citation

Li, C., Li, H. and Fu, S. (2023), "Coping with COVID-19 using contact tracing mobile apps", Industrial Management & Data Systems, Vol. 123 No. 5, pp. 1440-1464. https://doi.org/10.1108/IMDS-05-2022-0293

Publisher

:

Emerald Publishing Limited

Copyright © 2023, Chenglong Li, Hongxiu Li and Shaoxiong Fu

License

Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode


1. Introduction

At the onset of the COVID-19 pandemic, many countries deployed contact tracing mobile apps (CTMAs) to prevent the spread of the coronavirus (Rowe et al., 2020; Trang et al., 2020). Installed on smartphones, these apps use Bluetooth or GPS signals to detect when two users come into close contact with each other (such as within two meters for 15 min) (Ferretti et al., 2020; Trang et al., 2020). Once an individual has tested positive for infection, these apps can report their case anonymously and alert all other users who had been in close contact with the infected person, allowing exposed users to quarantine or arrange a test and, thus, preventing further transmission (Ferretti et al., 2020). However, such apps' success in controlling the spread of COVID-19 depends on their use by individuals. To sufficiently disrupt coronavirus infection, at least 56% of a country's population, as Hinch et al. (2020) estimated, should use such apps. Many European countries (e.g. Germany, Finland and France) and the United States have deployed CTMAs on a voluntary basis (Rowe et al., 2020; Trang et al., 2020). It is necessary for authorities to understand how to motivate individuals to keep using CTMAs during the pandemic, which is vital for achieving the goal of a high rate of CTMA use in a country's population to disrupt coronavirus infection, especially if the CTMA use is on a voluntary basis. Therefore, understanding the factors that may facilitate or obstruct citizens' CTMA continuance usage is crucial.

Recent studies have examined individuals' CTMA usage from different theoretical perspectives, such as privacy concerns and diffusion of innovation theory (Lin et al., 2021), unified theory of acceptance and use of technology (UTAUT) (Ojo and Rizun, 2021; Walter Thiée et al., 2021), privacy calculus model and herding heuristics (Wagner et al., 2021), app specifications (Trang et al., 2020) and critical social theory (Rowe et al., 2020). However, these studies focused only on adoption and largely ignored continuance usage, which – unlike adoption's focus on the first-time use of apps – emphasizes the long-term use (Bhattacherjee, 2001). The initial adoption does not always guarantee continuance usage (Bhattacherjee, 2001; Yan et al., 2021). Individual users may stop using CTMAs after using it for some time. For instance, a Corsair study on National Health Service (NHS) COVID-19 App in the United Kingdom has reported that 2% of users deleted the app and 72% of users switched off the contact tracing function in the first two months since the app was launched in September 2020 (Potts, 2020). The reasons for CTMA continuance usage could be different from the ones explaining initial adoption. Users' continuance usage could be influenced by their prior information systems (IS) use experience such that their use experience could lead to their perception change on IS use, such as post-expectation regarding usefulness, confirmation of pre-expectations following actual use and satisfaction with prior IS use (Bhattacherjee, 2001). Thus, recent research findings on the antecedents of CTMA adoption cannot fully explain the continuance usage of CTMA. To disrupt virus transmission until the majority of the population has been vaccinated, achieving the herd immunity threshold, people's continuance usage of CTMA is essential in managing the COVID-19 pandemic (Wymant et al., 2021). Moreover, since global COVID-19 infections keep spreading in the world (World Health Organization, 2021a), understanding how to promote CTMA continuance usage is paramount to managing the COVID-19 pandemic.

Additionally, prior studies have examined CTMA adoption from the view of benefits and threats and highlighted privacy concerns as a threat inhibiting individuals' adoption of CTMA (Chan and Saqib, 2021; Lin et al., 2021) but largely ignored the role of users' assessment of coping options available to respond to privacy issues related to CTMA in explaining their CTMA continuance usage during the public health crisis. The significance of privacy protection regarding CTMA has been highlighted in the literature (Riemer et al., 2020). Privacy-preserving techniques have also been applied in CTMA development to protect CTMA users' privacy, such as anonymity and decentralization (Apple and Google, 2021). However, it is not clear how CTMA users' assessments regarding the coping resources for privacy protection in their CTMA use will affect their continuance usage of CTMA in the public health crisis. Hence, it is necessary to investigate whether users' assessments of coping resources related to privacy protection can predict their continued usage of CTMA, in addition to users' perceived benefits and threats of using CTMAs.

Furthermore, IS researchers have developed an extensive body of knowledge on IS continuance (Bhattacherjee, 2001). Their research contexts mainly focus on normal daily life or work environments. Mobile app continuance usage during a public health crisis might have different causes than IS continuance usage in daily life or work-environment contexts. CTMA continuance usage during the pandemic may be influenced by CTMA as a public good (Rehse and Tremöhlen, 2022; Riemer et al., 2020). A public good is non-rivalrous and non-exclusive; everyone can benefit from it, and one person's use does not obstruct another's (Riemer et al., 2020). Therefore, some individuals may consider more about the social impact of CTMA use rather than their personal costs, thus continuing to use CTMAs during a public health crisis to contribute to the public goods (Campos-Mercade et al., 2021; Riemer et al., 2020). For instance, some people may be willing to sacrifice their private information to help slow the spread of COVID-19 and protect others' health during the unprecedented and emergent public health crisis. The knowledge on IS continuance in daily life or work environment might not explain individuals' CTMA continuance usage during the COVID-19 pandemic. However, research on citizens' CTMA continuance usage during a public health crisis is limited in the literature. Therefore, it is needed to investigate CTMA continuance usage to explain IS continuance usage during unprecedented situations.

To close this research gap, this study examines the factors that determine CTMA continuance usage during the COVID-19 pandemic by developing a research model based on coping theory. According to coping theory, how people cope with a stressful situation depends on a combination of opportunity appraisals (i.e. perceived usefulness and perceived distress relief), threat appraisals (i.e. privacy concerns) and secondary appraisals (i.e. perceived response efficacy) (Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984). CTMAs can be an effective coping tool for the pandemic, but it does entail uncertainties; to guide their app use during the pandemic, users cannot draw from or build on their prior knowledge of technology use in daily life and work environments. Thus, CTMA users may appraise the benefits and threats of CTMA use as well as the coping resources for privacy protection over their usage based on first-time use experience to decide their continuance usage of CTMAs. Therefore, to investigate CTMA continuance usage, this study deemed a research model based on coping theory to be appropriate.

The proposed research model was tested using the survey data collected in the United States (n = 551). The findings demonstrate that CTMA continuance usage is determined by users' perceived usefulness (opportunity appraisals) and perceived response efficacy (secondary appraisals). Thus, this study contributes to the extant literature on IS continuance usage by using the coping theory to explain CTMA continuance usage and distinguishing differences between opportunity appraisals (i.e. perceived usefulness and perceived distress relief), threat appraisals (i.e. privacy concerns) and secondary appraisals (i.e. perceived response efficacy) as antecedents that determine individuals' CTMA continuance usage during the COVID-19 pandemic. In doing so, this study offers an in-depth appreciation of how individuals' different appraisals regarding CTMAs determine their continuance usage of CTMAs to cope with the pandemic.

2. Literature review

2.1 Research on the use of contact tracing mobile apps (CTMA) during the pandemic

Recently, CTMA use has attracted considerable research attention in many domains, with researchers focusing on factors that compel individuals to install and use such apps from different theoretical lenses. The determinants of this adoption can be grouped into two main types: (1) usage benefits and (2) threats to usage. Regarding usage benefits, recent CTMA studies have employed traditional IS theories to examine what determines user adoption. For instance, centering the diffusion of innovations theory, Lin et al. (2021) found that relative advantage positively influences users' CTMA adoption. Also, the initial research on these apps has highlighted their dual benefit appeal for not only individuals (such as informing them about high-risk contacts) but also society (informing other people about close contact with an infected person), which are important motivations for the adoption of these apps (Trang et al., 2020).

The most significant threats to CTMA adoption—since it involves a compromise between privacy and health—are privacy concerns and risks (Chan and Saqib, 2021; Lin et al., 2021). People are afraid to disclose their private information, such as COVID-19 test results, exposure to infection, location and their communities' or social groups' COVID-19 status; moreover, they worry about potential hacking and data misuse by app service providers or governments (Riemer et al., 2020). Such privacy risks, as Wagner et al. (2021) found, negatively affect individuals' willingness to adopt these apps. To reduce this reluctance, apps that offer a high level of privacy protection and user data confidentiality are crucial (Bhattacharya and Ramos, 2021; Lin et al., 2021; Trang et al., 2020).

Prior CTMA studies in IS fields have principally focused on these apps' adoption (see Table 1), largely ignoring continuance usage despite recent research stating that users' continued app use is important for controlling the pandemic before vaccines achieve sufficient population-level protection (Wymant et al., 2021). Additionally, although recent research has examined the benefits and threats of using such apps, few studies have explored how users' assessment of available coping resources for privacy issues over CTMA use affects their continuance usage of CTMA. It is still unclear what is the role of users' assessments of available coping resources for privacy issues over their CTMA use in explaining their continuance usage of CTMA in the public health crisis. As per previous literature, coping theory may help explain individuals' coping responses to stressful events, based on a combination of opportunity, threat and secondary appraisals (Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984). This draws attention to the necessity of exploring what motivates CTMA continuance usage from the coping theory perspective.

2.2 Coping theory

Rooted in psychology, coping theory aims to explain how people cope with stressful situations and perform effective and appropriate coping behaviors. Lazarus and Folkman (1984, p. 141) defined coping as “constantly changing cognitive and behavioral efforts to manage specific external and internal demands that are appraised as taxing or exceeding the resources of the person.” Individuals' coping responses, according to coping theory, are based on their cognitive appraisals—that is, their evaluations of whether a stressful event is relevant to them and, if so, how (Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984). The cognitive appraisal process comprises two steps: primary appraisals and secondary appraisals. Primary appraisals refer to an individual's evaluation of whether an encounter causes potential benefits or harms. It, in turn, comprises opportunity appraisals and threat appraisals. Opportunity appraisals refer to an individual's assessment of whether potential consequences are positive (Lazarus and Folkman, 1984). If they believe an event allows them to achieve beneficial outcomes, they tend to perform such behavioral responses (Bala and Venkatesh, 2016; Gong et al., 2020). Meanwhile, threat appraisals refer to an individual's evaluation of whether an event's anticipated consequences are negative (Lazarus and Folkman, 1984). If they believe an event will bring unfavorable outcomes, they will likely perform avoidant behavioral responses (Bala and Venkatesh, 2016; Lazarus and Folkman, 1984). Encounters are complicated and frequently perceived as encompassing both opportunities and threats. Secondary appraisals refer to an individual's cognitive assessment of whether coping resources are available to respond to an encounter (Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984). Such assessment determines the coping options available to individuals and their sense of control over the encounter (Fadel and Brown, 2010; Lazarus and Folkman, 1984).

Coping theory's three types of appraisals have been used to examine IS adaptation in numerous contexts, such as the use of new IT in work environments (Beaudry and Pinsonneault, 2005), wearable healthcare devices (Marakhimov and Joo, 2017), mandatory IT use (Bhattacherjee et al., 2018) and mobile payments (Gong et al., 2020). For instance, in the context of mobile payment services, Gong et al., (2020) found that opportunity appraisals (measured by perceived value) and secondary appraisals (measured by perceived controllability) positively influence individuals' intentions to use mobile payment services, whereas threat appraisals (measured by perceived threat) negatively influence use intentions. Table 2 summarizes previous studies on the three types of cognitive appraisals in the IS field.

We selected coping theory as the theoretical framework for several reasons. First, it highlights cognitive appraisal's role in determining coping responses to stressful situations (Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984). This theory can help explain how individuals appraise stressful situations and how their appraisals form their behavioral responses (Folkman and Moskowitz, 2004; Salo et al., 2020). Second, this theory offers a theoretical framework with which to understand individual behaviors in psychology and post-adoption use in IS (Beaudry and Pinsonneault, 2005; Fadel and Brown, 2010; Salo et al., 2020). This complements this study's aims. Therefore, following the previous literature, coping theory was used in this study to investigate continuous usage of CTMA.

3. Research model and hypothesis development

3.1 Research model development

Users' cognitive appraisals help explain their behavioral responses to stressful events (Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984; Salo et al., 2020). The research model was built based on coping theory to study how the three types of cognitive appraisals affect users' behavioral responses to CTMA. Specifically, perceived usefulness and perceived distress relief were conceptualized as opportunity appraisal, privacy concerns as threat appraisal, perceived response efficacy as secondary appraisal and continuance usage as a behavioral response. The definitions of the five constructs are defined in Table 3.

In this study, we adopted variables (e.g. perceived usefulness, perceived distress relief, privacy concerns and perceived response efficacy) from prior studies because the coping theory does not provide specific constructs to measure appraisals. As suggested by prior literature (Bhattacherjee et al., 2018), we accommodated existing relevant variables in the literature to reflect different appraisals and to fit to the CTMA context. Some studies have accommodated the IS continuance enablers (e.g. perceived usefulness) (Bhattacherjee, 2001; Yan et al., 2021) and inhibitors (e.g. privacy concerns) (Zhou, 2016; Zhou and Li, 2014) to reflect users' primary appraisals of opportunity and threat, respectively (Bhattacherjee et al., 2018). Prior studies have also adopted different variables regarding the external resources to deal with IS usage from other theories, such as facilitating conditions, to uncover users' assessments of available resources to respond to IS usage (Bhattacherjee et al., 2018; Venkatesh et al., 2003). Even though these variables (e.g. perceived usefulness, perceived distress relief, privacy concerns and perceived response efficacy) are developed as part of different theoretical paradigms, the prior research applying coping theory shows that they could also be applied in our study to reflect users' different cognitive appraisals under the theoretical framework of the coping theory.

Specifically, in this study, opportunity appraisals reflect the degree to which a user perceives using CTMA to help achieve beneficial outcomes (Bala and Venkatesh, 2016; Beaudry and Pinsonneault, 2005). Past IS literature has used perceived usefulness (Bhattacherjee et al., 2018) and stress reduction (Cheikh-Ammar, 2020; Eisel et al., 2014) to reflect the beneficial outcomes of using an IS. Since CTMA can offer timely alerts and instructions to users who have been near an infected person, CTMA use will instrumentally enhance users' performance in protecting their health. Also, these apps' timely alerts and guidance may relieve the distress caused by infection-related uncertainties and worries (Lin et al., 2020). Thus, perceived usefulness and perceived distress relief are assumed to constitute CTMA-related opportunity appraisal.

Threat appraisals represent the degree to which a user feels that CTMA use disrupts their personal benefits and well-being (Bala and Venkatesh, 2016; Beaudry and Pinsonneault, 2005). Previous IS research has highlighted that privacy concerns are a critical threat to IS users if the IS collects, stores and uses users' private information (Dinev and Hart, 2006; Zhang et al., 2018). This also applies to CTMA since apps collect users' private information—such as their close contacts and COVID-19 testing results—and use it to detect potential exposure. Therefore, privacy concerns can present a key threat for individual users, and app use compromises between health and privacy. Indeed, recent studies have highlighted individuals' privacy concerns as the major threat to CTMA adoption (Lin et al., 2021; Riemer et al., 2020; Trang et al., 2020). In light of this, privacy concerns are assumed to represent threat appraisals regarding CTMA.

Secondary appraisals refer to an individual's cognitive assessment of whether coping resources are available to respond to an encounter (Bala and Venkatesh, 2016; Beaudry and Pinsonneault, 2005; Lazarus and Folkman, 1984). Coping theory has indicated that if users believe there exist adequate and sufficient coping resources, the threat is apt to be minimal or absent (Bhattacherjee et al., 2018; Lazarus and Folkman, 1984). Since privacy issues are one major threat to CTMA use, users' evaluations of privacy protection are particularly critical in this study's context. Indeed, many preventive measures and techniques have been used by CTMA providers to protect private information, such as no location data collection, anonymity and decentralization (Apple and Google, 2021; Sowmiya et al., 2021). These privacy protections provided by CTMA providers offer the coping resource to CTMA users to respond to privacy issues when using CTMA. CTMA users could assess the efficacy of these coping resource for privacy protections in preventing privacy threats in their CTMA use. Thus, perceived response efficacy fits well with the definition of secondary appraisals in our studied context and can be assumed to constitute secondary appraisals regarding CTMA.

In this study, behavioral response was operationalized as continuance usage, which refers to users' continued CTMA use during the COVID-19 pandemic (Bhattacherjee, 2001). Prior literature has adopted continuance usage to represent a behavioral response. For instance, Yang et al. (2016) developed behavioral response as continuous use when employing coping theory to study users' reactions to mobile shopping channels. Therefore, in this study, continuance usage of CTMA is assumed to reflect users' behavioral responses to the COVID-19 pandemic.

According to coping theory, individuals' opportunity, threat and secondary appraisals jointly determine their behavioral responses to stressful events (Beaudry and Pinsonneault, 2005; D'Arcy et al., 2014; Salo et al., 2020). Aligning with this theory, perceived usefulness, distress relief, privacy concerns and perceived response efficacy are proposed as the essential determinants of CTMA continuance usage. Meanwhile, age, gender, education and coronavirus test status are moderators in the model (see Figure 1).

3.2 Hypothesis development

Perceived usefulness has been widely considered an important driver of IS continuance usage (Bhattacherjee, 2001). In this study's context, by using CTMA, if users were near a person reported to have been infected with COVID-19, they could use CTMA to be rapidly informed about their potential exposure and receive further instructions on how to self-isolate and protect themselves (Trang et al., 2020) or even quickly access testing and treatment if needed. Consequently, users will likely perceive such apps as useful, improving their ability to protect their health during the COVID-19 pandemic. These usefulness perceptions can facilitate CTMA continuance usage (Bhattacherjee, 2001). Therefore, the following hypothesis is suggested.

H1.

Perceived usefulness is positively associated with CTMA continuance usage.

The COVID-19 pandemic has created distress and fear (Li et al., 2021), and one leading cause of this distress is informational uncertainty regarding the pandemic (Lin et al., 2020; Rettie and Daniels, 2021). For instance, people do not know whether they have been exposed to infection, and they are unsure of the correct response to virus exposure or diagnosed infection. Such uncertainties have contributed to intense distress during the COVID-19 pandemic (Lin et al., 2020). Past research has suggested that IS can reduce the distress caused by a specific event by providing information that supports decision-making (Eisel et al., 2014). Similarly, recent research has demonstrated that transparent, timely communication helps reduce COVID-19-related distress (Lin et al., 2020). CTMA can convey such messages by offering timely alerts and clear guidance, so users may perceive such apps as helpful in alleviating distress. Therefore, they would likely continue using these apps. Hence, the following hypothesis is proposed.

H2.

Perceived distress relief is positively associated with CTMA continuance usage.

For effective contact tracing, CTMA must collect and process individuals' data (Lin et al., 2021; Riemer et al., 2020; Trang et al., 2020). For instance, a GPS-based tracing app collects users' GPS information, disclosing their precise location. Although some apps rely on Bluetooth techniques and do not collect precise location information, people remain concerned about the use and storage of their sensitive data and possible surveillance (Riemer et al., 2020; Trang et al., 2020). Such CTMA privacy concerns may decrease users' CTMA continuance usage. Privacy concerns, prior literature has indicated, are the primary inhibitor of mobile app continuance intention (Zhou, 2016; Zhou and Li, 2014). For instance, according to Zhou and Li (2014), in the context of mobile social network services, privacy concerns are negatively linked to continuance intentions. Moreover, according to recent CTMA research, privacy concerns are the main reason for unwillingness to download and use CTMA (Chan and Saqib, 2021). Hence, it is reasonable to presume that privacy concerns decrease CTMA continuance usage, yielding the following hypothesis.

H3.

Privacy concerns are negatively associated with CTMA continuance usage.

Perceived response efficacy reveals the extent to which users perceive that preventative measures effectively protect their privacy (Boss et al., 2015). To protect users' privacy, many efforts have sought to limit data collection and control data transmission and storage (Sowmiya et al., 2021). Typically, a smartphone app generates and transmits a Bluetooth signal (a series of unique strings of random numbers and letters) that does not contain any personal information (such as names and identities), and when a user is infected, they can report their infection via the app, which will send a unique Bluetooth signal to a central database. The app will automatically check the report for other users and alert them if they have been in close contact with an infected user. Neither app users, the infected person, smartphone operating system developers, nor the government can infer any private information from the data collected by these apps (Apple and Google, 2021). These preventive measures may decrease users' worries about the collection and use of their private information. While users who perceive high response efficacy are more likely to feel secure about their privacy and continue using such apps, users who perceived low response efficacy may continue to feel uncertain and threatened regarding privacy security, avoiding the continued use of such apps. Thus, the following hypothesis is proposed.

H4.

Perceived response efficacy is positively associated with CTMA continuance usage.

In this study, age, gender, education and coronavirus test status are considered as moderators to explore the possible effects of user-related characteristics on these proposed relationships. Such as senior CTMA users might be more vulnerable to COVID-19 than other age groups (World Health Organization, 2021b), they might be more eager to seek interventions to help them to cope with this stressful situation, thus, their cognitive appraisals of using CTMA, such as opportunity appraisals, could exert a stronger influence on their continuance usage than other age groups. Regarding gender, women have been found to be more sensitive to stressful situations than men (Matud, 2004), therefore, women's opportunity, threats and secondary appraisals of using CTMA to cope with COVID-19 pandemic could have different impacts on their continuance usage than men. Considering education background, prior studies found that people with higher education tend to use new technologies more than those with less educational background (Owusu Kwateng et al., 2019). Furthermore, regarding COVID-19 testing status, users who have been tested are obligated to report their test results via the app, particularly when they are diagnosed with an infection, thereby, they might be more concerned about the benefits and threats of using CTMA as well as the privacy protection related to CTMA compared with those who have not been tested. Hence, the effects of cognitive appraisals on continuance usage may be different among users with different characteristics, and it is meaningful to explore the moderating effects of age, gender, education and coronavirus test status in this study.

4. Research method

4.1 Instrument development

We adapted well-established scales from prior research to measure all constructs using a seven-point Likert scale. Specifically, perceived usefulness and continuance usage were measured with items derived from the work of Bhattacherjee (2001), perceived distress relief using items derived from the study of Dholakia (2006), privacy concerns using items derived from the research of Dinev and Hart (2006) and perceived response efficacy using items derived from the work of Posey et al. (2015). More details of these measures can be found in Table 5.

4.2 Participants

Current CTMA users in the USA comprised the target population of this study for the following reasons. First, CTMA use in USA was depended on a voluntary basis among individuals. Second, many individuals had used CTMA for a while before our study. According to a survey on public's attitude toward CTMA use in USA conducted in June, 2020, 42% of respondents supported CTMA use during the pandemic (Zhang et al., 2020). The Amazon Mechanical Turk (MTurk) was used to recruit participants since obtaining a large sample of respondents from various backgrounds who respond fast is easy in USA. A concise explanation of the study's objectives and a link to its online questionnaire were presented with the invitation messages. To investigate CTMA continuance usage, it is necessary that the required respondents have had certain usage experiences. Thus, the two following screening questions were implemented to record respondents' prior CTMA use, including “Have you installed and used a mobile tracing app on your smartphone before?” and if so, “What is the mobile tracing app you are using?”. Only those respondents who answer yes to the first question and write the name of a specific tracing app they have used to the second question can proceed with the rest parts of the questionnaire. In addition, two attention-checking questions were incorporated into the questionnaire to ensure sufficient attention by respondents. Each response was checked carefully to eliminate unreliable responses.

The online survey was delivered to prospective respondents at the beginning of December 2020, when mass vaccination efforts had not yet publicly begun in the United States. In total, 783 responses were collected in one week. The 190 respondents who had not installed a contact tracing app on their smartphone or failed to offer the specific names of the contact tracing app they had used were excluded in this study. Furthermore, we excluded 25 respondents who failed to answer two attention-checking questions correctly and 17 respondents who answered unreliably—such as by providing the same response option for all measurement items. Finally, a valid sample of 551 responses was obtained. Considering the sample size, prior literature suggests that a data sample size of about 10 times the number of items used in a study can be appropriate (Hair et al., 2014). In this study, there are 20 measurement items in total. Thus, the sample size of about 200 will be appropriate for this study. Our sample size (N = 551) is greater than 200 and can be considered as adequate for this study. Among the 551 final respondents, 60.4% were male and 39.4% were female. Most respondents were 20–39 years old (64%), and most had been previously tested for coronavirus (61.3%). Table 4 presents respondents' demographic information.

4.3 Common method bias and collinearity

To assess common method bias, this study employed Harman's single factor test, as recommended by Podsakoff et al. (2003). This test revealed that the highest variance explained by a single factor was 39.2%, which was lower than the suggested threshold value of 50% (Podsakoff et al., 2003). Therefore, common method bias was not a serious concern for this study.

The collinearity of each independent variable was measured, as advised by Kock and Lynn (2012), by assessing the values of the variance inflation factor (VIF). The VIF values ranged from 1.189 to 2.416, which was below the recommended threshold of 3.3 (Kock and Lynn, 2012). Therefore, collinearity was not a critical issue for this study.

4.4 Data analysis

This study utilized partial least squares (PLS) to analyze the data. Prior literature suggests that compared with covariance-based structural equation modeling (CB-SEM), PLS-SEM is more suitable for studies when the research objective is for prediction and when the data distribution is lack of normality (Chin et al., 2003; Hair et al., 2019). This study aims to examine what factors predict CTMA continuance usage. Additionally, prior literature suggests that when testing the multivariate normality of the data, if the value of Skewness is between −2 and +2, and the value of Kurtosis is between −7 and +7, data distribution can be considered as normal (Curran et al., 1996; West et al., 1995). Our test results showed that the values of both Skewness and Kurtosis did not meet the recommended thresholds, indicating that our data is not normal. Thus, PLS-SEM technique is a proper method for this study. The data analysis includes the test of the measurement model and structural model.

4.4.1 Measurement model

Convergent validity and discriminant validity were tested to assess the measurement model. To test convergent validity, this study evaluated the factor loading of each item, Composite Reliability (CR), Cronbach's alpha (CA) and Average Variance Extracted (AVE). As Table 5 shows, all factor loading, CA and CR values met the recommended threshold of 0.70, 0.70 and 0.70, respectively, and AVE values all exceeded 0.5, indicating satisfactory convergent validity for this study (Fornell and Larcker, 1981).

Discriminant validity was evaluated using two means: (1) the criteria proposed by Fornell and Larcker (1981) and (2) the Heterotrait–Monotrait (HTMT) ratio developed by Henseler et al. (2015). First, according to Fornell and Larcker (1981), discriminant validity is established when (1) the square root of each construct's AVE exceeds the correlations between the construct and others and (2) the item loadings are higher on their intended construct than on other constructs. Tables 6 and 7 show that this study's results met these criteria. Second, according to Henseler et al. (2015), an HTMT of 0.90 is an acceptable threshold for discriminant validity. Table 8 shows that this study's discriminant validity was confirmed.

4.4.2 Structural model

The structural model was tested by measuring not only the significance and size of the path coefficients and the coefficient of determination (R2 value) but also the model's predictive relevance (Q2 value) and goodness of fit. Figure 2 presents the results using PLS.

The model explains 57.6% of continuance usage variance. Perceived usefulness (β = 0.284, p < 0.001) and response efficacy (β = 0.448, p < 0.001) significantly positively influence continuance usage. In contrast, perceived distress relief and privacy concerns do not significantly influence continuance usage, thus supporting H1 and H4 while not supporting H2 and H3.

The Stone–Geisser Q2 was further measured to estimate the predictive relevance of the proposed research model (Geisser, 1974; Hair et al., 2017; Stone, 1974). The results of this test showed that the Q2 value for continuance usage was 0.363, greater than zero, indicating good predictive relevance (Hair et al., 2017).

The standardized root mean square residual (SRMR) was applied to assess the goodness of fit for the proposed research model (Hair et al., 2017; Henseler et al., 2014). This test's result was 0.061, which is less than the recommended threshold of 0.08, indicating a good model fit (Hair et al., 2017; Henseler et al., 2014; Hu and Bentler, 1998).

4.4.3 Moderation analysis

The moderation analysis was conducted to explore the moderating effects of age, gender, education and coronavirus test status on the proposed relationships. Gender and coronavirus test status was operationalized as a dummy variable. Age and education were operated as a dummy variable that took ordinal values to represent increasing levels of age and education background, respectively. Specifically, respondents were divided into three sub-groups by age: (1) young, aged 20–29 years; (2) middle-aged, 30 to 49; and (3) senior, 50 to 69. Prior research has focused on the young, middle-aged and senior groups to explore how age moderates certain IS relationships (e.g. Czaja et al., 2006; Tams et al., 2014; Zhao et al., 2018). Recent literature also noted there are differences between young, middle and senior people in terms of their vulnerability to COVID-19 (World Health Organization, 2021b; Bhopal et al., 2021). Thus, this study also explores whether there are significant differences among these three user groups. The respondents were also divided into three sub-groups by education following the prior literature (i.e. low, middle and high) (e.g. Cruz-Jesus et al., 2016): (1) low, having only completed basic education or upper secondary education (or vocational school); (2) middle, having completed a bachelor's degree; and (3) high, having completed a master's or doctoral degrees.

Multi-group analysis (MGA) was applied in this study to assess the moderating effect (Hair et al., 2017). Prior to MGA, as recommended by Henseler et al. (2016), the Measurement Invariance of Composite Models (MICOM) procedure was used to ascertain whether measurement invariance existed among the different groups. The results showed no measurement invariance among the sub-groups regarding gender and education, so the MGA was not used to analyze differences among user groups in these categories. For age and coronavirus test status, partial measurement was established, so MGA was used to analyze differences among these sub-groups (Henseler et al., 2016).

As Table 9 shows, a significant difference was observed between the young and senior age sub-groups concerning the relationship between perceived usefulness and continuance usage. Specifically, senior group exhibited the most significant effect of perceived usefulness on continuance usage (β = 0.586, p < 0.001), followed by the middle-aged sub-group (β = 0.267, p < 0.001) and young sub-group (β = 0.198, p < 0.05).

As Table 10 shows, a significant difference was observed between the tested and not-tested groups concerning the relationship between perceived response efficacy and continuance usage. Specifically, perceived response efficacy more strongly and significantly influenced continuance usage for the tested group (β = 0.548, p < 0.001) compared to the not-tested group (β = 0.276, p < 0.01). Additionally, distress relief was found to significantly affect continuance usage only in the not-tested group (β = 0.283, p < 0.05).

5. Discussion

Our findings raised several points of interest. First, our results reveal that perceived usefulness (β = 0.284, p < 0.001) and perceived response efficacy (β = 0.448, p < 0.001) determine CTMA continuance usage. This finding aligns with coping theory, according to which primary appraisals and secondary appraisals predict users' behavioral responses related to new IS (Bala and Venkatesh, 2016; Gong et al., 2020). Generally, when deciding to continue CTMA use, users assess the consequences of their use (primary appraisal) and evaluate the coping resources over this use (secondary appraisal). They tend to continue using these apps during a pandemic when they perceive them as highly useful in protecting their health and highly efficacious in protecting their privacy.

Specifically, perceived response efficacy was found to be a stronger driver for CTMA continuance usage than perceived usefulness. Users' privacy concerns considerably influence their CTMA use during a public health crisis (Chan and Saqib, 2021; Riemer et al., 2020). Using such apps involves a compromise between users' privacy and health. Thus, continuance usage is not only influenced by such apps' perceived usefulness in protecting users' health but also—more importantly—determined by users' evaluation of whether an app's available measures can effectively protect their privacy. If users perceive CTMA's privacy protections as effective and adequate, this study's findings suggest, they will likely continue using these apps—even if they do not fully recognize CTMA's usefulness in protecting their health during a pandemic. This finding highlights the importance of perceived response efficacy in explaining CTMA continuance usage during a public health crisis.

Contrary to our expectations, privacy concerns do not significantly influence CTMA continuance usage. This finding contradicts some prior research findings in normal life contexts. For instance, users' privacy concerns have been discovered to negatively affect their continuance usage regarding social network sites (SNS) (Zhou and Li, 2014) and location-based services (Zhou, 2016). A possible explanation for this research finding is that CTMA users might be willing to sacrifice their privacy for personal and public health benefits during a public health crisis. Privacy calculus theory (Culnan and Armstrong, 1999; Dinev and Hart, 2006) suggests that people may intend to compromise privacy for certain benefits, such as health and security. Prior research has found that, when people perceive a pressing security threat, they will more likely accept a compromise between privacy and personal safety (Davis and Silver, 2004). The COVID-19 pandemic has become a serious public health crisis, threatening individuals' life and health, so users may accept CTMA as necessary for the public benefits. Despite CTMA-related privacy concerns, they may continue using CTMA to help manage the pandemic. Thus, privacy concerns could lose their importance and even have no impact on individuals' CTMA continuance usage during this pandemic.

The finding on the insignificant impact of privacy concerns on CTMA continuance usage is also not consistent with recent research findings on CTMA adoption. For instance, Chan and Saqib (2021) found that privacy concerns can reduce individuals' willingness to download CTMA. A possible explanation is that, if users perceive that preventative measures or designs (such as anonymity and decentralization) of CTMA can protect their privacy effectively based on their prior CTMA use experience, privacy concerns will not obstruct their continuance usage of CTMA (Trang et al., 2020). In addition, Chan and Saqib (2021) focused on initial CTMA acceptance, while this study has focused on continuous usage. When individuals lack experience using CTMA during the COVID-19 pandemic, they are less likely to recognize the extent to which CTMA will protect their privacy and their possible benefits than individuals who have already used CTMA. Therefore, privacy concerns are a critical factor in reducing individuals' initial acceptance of CTMA. After individuals have already used CTMA voluntarily for some time during the COVID-19 pandemic, they can better understand the measures CTMA use to protect their privacy based on their usage experiences, which could enhance their perceptions concerning privacy protection. Thus, their privacy concerns related to CTMA use become less critical and might not reduce their CTMA continuance usage during the COVID-19 pandemic.

This study also found perceived distress relief has no significant influence on CTMA continuance usage in general. This is not consistent with prior findings in normal life or work contexts. For instance, the findings of Cheikh-Ammar (2020) indicated that distress relief offered by a SNS can motivate users to continue their usage of SNS. A possible reason is that not all CTMA users emphasize the value of distress relief when using CTMA, as we found that perceived distress relief has a significant influence on continuance usage particularly for users who had not been tested for COVID-19 (β = 0.283, p < 0.05). These users worry more about their health than those who have been tested since they do not know whether they have been infected with SARS-CoV-2 (severe acute respiratory syndrome coronavirus 2, the virus that causes COVID-19). These uncertainties can cause distress (Peters et al., 2017), leaving users eager for timely, relevant information from CTMA to help them to release the stress. CTMA can convey such information via timely alerts and instructions. Thus, users who have not been tested might tend to consider CTMA helpful for reducing distress related to COVID-19. Accordingly, when they perceive that these apps can relieve their distress, they will continue using them during the pandemic.

Finally, this study found some differences among the factors determining individuals' continuous CTMA use across different user groups. The results show that age and COVID-19 testing status moderate cognitive appraisal's impact on continuance usage. Specifically, regarding age, perceived usefulness was found to influence continuance usage the most among senior users (β = 0.586, p < 0.001) and the least among young users (β = 0.198, p < 0.05), and significant differences are visible between these two user groups. This significant difference might be due to senior users' vulnerability to COVID-19 than other age groups (World Health Organization, 2021b). Therefore, senior people may eagerly seek effective interventions to prevent infections. In contrast, the risk of severe coronavirus disease and mortality is low among young people in general (Bhopal et al., 2021), so they might worry less about infection than other age groups. Thus, the perception of the usefulness of CTMA will have the strongest impact on their continuance usage of CTMA in the senior group than other age groups.

In examining coronavirus test status, this study found that perceived response efficacy has a stronger impact on continuance usage for users who have been tested for COVID-19 (β = 0.548, p < 0.001) than users who have not (β = 0.276, p < 0.01), and there a significant difference between these two groups. One possible reason for this finding is that users who have been tested are obligated to report their results to the apps if they are diagnosed with infection; therefore, they may be more concerned about disclosing their information and require more privacy protection. Accordingly, when they perceive that these apps can effectively protect their privacy, they may intend more strongly to continue using them.

6. Conclusion

6.1 Theoretical contributions

This study contributes to the research related to CTMA on several fronts. First, it makes contextual contributions to the IS continuance literature by extending the context of IS use from the normal daily life and work contexts to a larger societal public health crisis context and by clarifying cognitive appraisals' role in explaining individuals' CTMA continuance usage in the specific abnormal context of a public health crisis, grounded on coping theory. Investigating cognitive appraisals' role in explaining CTMA continuance usage enriches IS continuance research using coping theory, and it explains how technology can help people cope with public health crises.

Second, this study offers new insights explaining CTMA-related privacy issues. Unlike previous research, which indicated that privacy concerns are one of the key obstacles to IS continuance in normal life contexts (Zhou, 2016; Zhou and Li, 2014), as well as CTMA adoption (Chan and Saqib, 2021; Lin et al., 2021), this study found that privacy concerns do not inhibit continuance usage of CTMA though privacy concerns have been highlighted to be critical in understanding CTMA adoption. Individuals' appraisal of privacy issues regarding an IS can be different due to context differences (e.g. normal work and life situation and abnormal public health crisis). Specifically, in a public health crisis context, users are willing to compromise their privacy to protect their personal and public health, and their privacy concerns will not hinder them to continue using CTMA during the pandemic. Thus, threat appraisal (such as privacy concerns) is not a hinder for users' CTMA continuance usage, and the second appraisal (such as perceived response efficacy) and opportunity appraisal (such as perceived usefulness) are important appraisals for users' CTMA continuance usage in a public health crisis context.

Third, the theoretical lens of coping theory yields new insights into the mechanisms underlying CTMA continuance usage from a multi-dimension cognitive appraisal view, that is, individuals appraise not only the benefits and threats of CTMA usage but also the coping resources to privacy issues in their continuance usage of CTMA. Unlike recent research on CTMA largely focusing on the initial adoption and ignoring the impact of users' assessment of coping options available to respond to privacy issues on their continuance usage of CTMA (e.g. Chan and Saqib, 2021; Lin et al., 2021), this study's findings show that opportunity appraisals (perceived usefulness) and secondary appraisals (perceived response efficacy) motivate users' continuance usage, indicating that – even during unprecedented situations – coping theory is a powerful tool with which to explain IS continuance usage in a public health crisis.

Fourth, this study has provided new insights specific to emotion-related benefits of CTMAs. The results of this study show that perceived distress relief has a significant influence on CTMA continuance usage only for users who have not been tested for COVID-19. This finding offers further evidence that CTMAs can not only help users protect their health but also reduce emotional distress for specific user groups. This finding indicates that the role of perceived distress relief in predicting continuance usage can change due to the different contexts and user characteristics.

Finally, the moderated-related findings (including age and coronavirus test status) provide a finer-grained understanding of the role of user features in explaining how cognitive appraisals affect CTMA continuance usage during the COVID-19 pandemic. Specifically, the findings highlight the crucial role of user age in explaining how perceived usefulness influences continuance usage, as well as coronavirus test status's role in explaining how perceived response efficacy affects continuance usage. These findings suggest that CTMA continuance usage is a complex and nuanced phenomenon where user-specific factors do matter.

6.2 Practical implications for public policy

This study also provides practical implications for authorities about how to use mobile technologies to manage the ongoing COVID-19 pandemic, as well as future public health crises. First, the findings on CTMAs during the COVID-19 pandemic suggest that authorities should use mobile technologies to manage public health crises. Although individuals will concern about privacy when using mobile technologies to manage public health crises, these concerns will not hinder their continuous use of such technologies if appropriate privacy protection measures are implemented in the design and development of the technologies and if they also help individuals navigate such crises.

Second, in light of the finding that perceived usefulness motivates CTMA continuance usage, authorities are recommended to promote CTMA continuance usage by improving users' perceptions of these apps' usefulness. For instance, authorities can provide authorized information about how CTMAs have been used to disrupt virus transmission and protect public health in managing the COVID-19 pandemic. Such disclosures can help individuals recognize the benefits of CTMA use. Additionally, authorities can implement promotional or educational programs that clarify these apps' benefits in controlling the COVID-19 pandemic, enhancing individuals' awareness of their utility, which could trigger continuous CTMA use during the COVID-19 pandemic.

Third, motivated by the finding that perceived response efficacy positively influences continuance usage that authorities should adopt strategies to enhance users' perceptions of CTMA's response efficacy during the COVID-19 pandemic. On the one hand, authorities should provide individual users with clear, detailed information about CTMA's privacy protection to demonstrate that sensitive user information is not captured and that collected user data will only be used strictly following data and privacy protection rules. For instance, to protect individuals' privacy, GPS techniques should not be used. On the other hand, authorities should clearly explain how these apps protect user privacy to reduce the negative impacts of rumors or misconceptions related to these apps, such as explaining in detail what data will be captured, stored and used, who owns the data, who can access the data and how user privacy will be protected, following data protection and privacy rules. These strategies will increase individuals' perceptions concerning CTMA's response efficacy, which could lead to continuous CTMA use during the COVID-19 pandemic.

The moderator-related findings inform the fourth recommendation: authorities should consider user-specific factors (including age and coronavirus test status) when promoting CTMA use. Specifically, they could customize promotions or educational programs to specific user groups. For instance, since senior users are more vulnerable to COVID-19 and their usefulness perceptions most strongly influence continuance usage, explaining CTMA's usefulness in protecting their health will more likely motivate continuance usage for this group. For users who have been tested for COVID-19, perceived response efficacy more strongly affects continuance usage, so clearly explaining these apps' privacy protection will likely encourage them to keep using these apps.

6.3 Limitations and future research directions

This study faced some limitations. First, it used an online survey of US users to test its research model. The country's national culture and political atmosphere may affect CTMA continuance usage. Therefore, more empirical evidence from respondents with different cultural and political backgrounds is needed to generalize the findings across countries or regions. Second, due to the survey method's inherent limitations, the collected data may not fully capture the complex nature of how people perceive CTMA. Accordingly, future research should apply qualitative or mixed research methods to explore and comprehensively explain continuous CTMA use. Third, the data collection took place in December 2020, when the United States saw a record number of deaths from COVID-19 (Maxouri, 2020). Individuals' opinions about these apps may have been influenced by this dire situation. Since the pandemic situation keeps changing, future research could investigate CTMA continuance usage via longitudinal research, examining whether changes to the pandemic and coping appraisals related to COVID-19 outbreaks affect continuance usage. Finally, while this study examined how cognitive appraisals directly affect continuance usage, it did not test coping strategies. A user may engage in different coping strategies (such as benefit maximizing and self-preservation) when using apps during the pandemic (Beaudry and Pinsonneault, 2005). Therefore, future research could also examine coping strategies' role in determining IS continuance usage during a crisis.

Figures

Research model

Figure 1

Research model

Model-testing results

Figure 2

Model-testing results

Summary of studies on contact tracing mobile apps (CTMA) from the information systems (IS) field

ReferenceFocusTheoryMethodFindings
Bhattacharya and Ramos (2021)Privacy and confidentiality related to CTMA/Qualitative studyCTMA should emphasize privacy protection and data confidentiality
Bitzer et al. (2021)The algorithmic transparency of CTMAAlgorithmic transparencyExperimentAlgorithmic transparency disclosure is positively and significantly related to app selection, user comprehension and trust
Chan and Saqib (2021)Unwillingness to download and use CTMA/Experiment
  1. -

    COVID-19 concerns decrease intentions to download and use CTMA

  2. -

    Privacy concerns and social conservatism mediate the impact of COVID-19 concerns on intentions to download and use CTMA

Lin et al. (2021)CTMA use intentions
  1. -

    Diffusion of innovation theory

  2. -

    Privacy concerns

Survey
  1. -

    Trust beliefs, compatibility and relative advantage positively affect citizens' adoption intentions

  2. -

    Privacy concerns negatively influence trusting beliefs and positively affect risk beliefs

Ojo and Rizun (2021)CTMA useUTAUTComputational grounded theoryThe top-five most prevalent topics are the need for tracing apps and mandatory use, tracing apps' launch supported by private-sector organizations, anonymity in reporting positive test results, a new business continuity tracker app for employee safety and apps for tracking symptoms
Riemer et al. (2020)IT governance
  1. -

    IT governance

Conceptual paperThe selection of approaches to IT governance is influenced by factors regarding health risks to the population, prior pandemic experience, societal culture and values, governments' role in societies and trust in governments and technologies
Rowe et al. (2020)Failure in CTMA design and adoption
  1. -

    Critical social theory

Critical research methodologyAlienation from the natural and social reality regarding the COVID-19 pandemic leads to inadequate app design and adoption failure
Walter Thiée et al. (2021)CTMA useUTAUTSurvey
  1. -

    The factors influencing individuals' intentions concerning CTMA include ethical considerations, social influence, effort expectancy, popular opinions related to COVID-19 and CTMA

  2. -

    Users' behavioral intentions positively affect their actual app use

Trang et al. (2020)CTMA acceptance
  1. -

    App specifications

Experiment
  1. -

    Convenience and privacy design positively influence mass acceptance, whereas self-benefit appeal and self-societal-benefit appeal decrease mass acceptance

  2. -

    Mass acceptance varies across groups

Urbaczewski and Lee (2020)CTMA use/Difference in difference
  1. -

    CTMA are highly and significantly associated with a decreased spread of COVID-19

Wagner et al. (2021)Use intentions and continuance intentions
  1. -

    Privacy calculus model

  2. -

    Herding heuristics

Longitudinal online survey
  1. -

    Privacy risks negatively affect use intentions, while perceived benefits and imitating others positively influence use intentions

  2. -

    Updated benefits and imitating others positively affect continuance intentions

Note(s): IT = information technology; CTMA = contact tracing mobile apps; UTAUT = unified theory of acceptance and use of technology;/= no theory applied

Summary of studies that used coping theory in the information systems (IS) field

ReferenceContextMethodAppraisalsOutcomes
Bala and Venkatesh (2016)IT adaptationField study
  1. -

    Primary appraisal

  2. -

    Perceived opportunity

  3. -

    Perceived threat

  4. -

    Secondary appraisal

  5. -

    Perceived controllability

  1. -

    Avoidance

  2. -

    Exploration-to-revert

  3. -

    Exploration-to-innovate

  4. -

    Exploitation

Beaudry and Pinsonneault (2005)Information technology (IT) useQualitative method (interviews, annual reports and job descriptions)
  1. -

    Primary appraisal

  2. -

    Opportunity

  3. -

    Threat

  4. -

    Secondary appraisal

  5. -

    IT control

  1. -

    Minimization of an IT event's negative consequences

  2. -

    Individual efficiency and effectiveness

  3. -

    Restoring personal emotional stability

Bhattacherjee et al. (2018)Mandatory IT useInterviews
  1. -

    Primary appraisal

  2. -

    Opportunity

  3. -

    Threat

  4. -

    Secondary appraisal

  5. -

    IT control

  1. -

    Reluctant response

  2. -

    Engaged response

  3. -

    Deviant response

  4. -

    Compliant response

Chen et al. (2019)Mobile shopping applicationsExperiment
  1. -

    Primary appraisal

  2. -

    Perceived information overload

  3. -

    Perceived intrusiveness

  4. -

    Perceived reward

  5. -

    Secondary appraisal

  6. -

    Perceived information control

  7. -

    Mobile computing self-efficacy

  1. -

    Discontinuance behavior

D'Arcy et al. (2014)Security-related stress (SRS)Survey
  1. -

    Primary appraisal

  2. -

    Secondary appraisal

  1. -

    Information security policy violation intentions

Christophe et al. (2011)Disruptive ITExperiment
  1. -

    Primary appraisal

  2. -

    Opportunity

  3. -

    Threat

  4. -

    Secondary appraisal

  5. -

    IT control

  1. -

    Benefit satisficing

  2. -

    Benefit maximizing

  3. -

    Self-preservation

  4. -

    Disturbance handling

Gong et al. (2020)Mobile paymentsSurvey
  1. -

    Primary appraisal

  2. -

    Perceived value

  3. -

    Perceived threat

  4. -

    Secondary appraisal

  5. -

    Perceived controllability

  1. -

    Intentions to use mobile payment services

Liang et al. (2019)IT securityExperiment
  1. -

    Perceived threat

  2. -

    Perceived avoidability

  1. -

    Inward emotion-focused coping

  2. -

    Problem-focused coping behavior

  3. -

    Outward emotion-focused coping

Marakhimov and Joo (2017)Wearable healthcare devicesSurvey
  1. -

    Primary appraisal

  2. -

    Challenge

  3. -

    Threat

Extended use
Nach and Lejeune (2010)IT challenges to users' identityQualitative method (narrative synthesis)
  1. -

    Primary appraisal

  2. -

    Positive emotional response

  3. -

    Negative emotional response

  4. -

    Secondary appraisal

  5. -

    Controllability

  1. -

    Anti-identity

  2. -

    Reinforced identity

  3. -

    Ambivalent identity

  4. -

    Redefined identity

Wu et al. (2017)New IT systemsSurvey and panel data
  1. -

    Giving-network closure

  2. -

    Seeking-network closure

  1. -

    Post-adoption IT use

  2. -

    Cognitive adaptation

  3. -

    Behavioral adaptation

  4. -

    Affective adaptation

Definitions of the five constructs

ConstructDefinition
Perceived usefulnessUsers' expected benefits from using Contact Tracing Mobile Apps (CTMA) in protecting their health during the COVID-19 pandemic (Bhattacherjee, 2001; Davis, 1989)
Perceived distress reliefUsers' perception of relieving their COVID-19-related distress through CTMA (Dholakia, 2006)
Privacy concernsUsers' concerns about opportunistic behavior related to private information collected by CTMA (Dinev and Hart, 2006)
Perceived response efficacyUsers' perception of the efficacy of protection offered by the CTMA providers in successfully attenuating privacy threats in CTMA use (Posey et al., 2015)
Continuance usageUsers' continued use of CTMA during the COVID-19 pandemic (Bhattacherjee, 2001)

Respondents' demographic profile

VariableItemsCountPercentage (%)
GenderMale33360.4
Female21739.4
Unwilling to disclose10.2
Age20–2917231.2
30–3918132.8
40–499717.6
50–597012.7
60–69315.6
EducationBasic education81.5
Upper secondary education (or vocational school)336.0
Bachelor's or equivalent level33460.6
Master's or equivalent level17030.9
Doctoral or equivalent level61.1
Coronavirus test statusTested33861.3
Not tested20737.6
Unwilling to disclose61.1

Construct measurement and convergent validity test results

ConstructsReferenceItemFactor loadingCACRAVE
Continuance usage (CU)Bhattacherjee (2001)CU1: I continue using CTMA, rather than discontinuing their use in recent days0.8490.8660.9030.650
CU2: I continue using CTMA, rather than using any alternative means of tracing in recent days0.788
CU3: I will continue my CTMA use in the following days during the COVID-19 pandemic0.825
Perceived distress relief (PDR)Dholakia (2006)PDR1: Using CTMA makes me feel self-assured0.8230.8230.8830.653
PDR2: Using CTMA makes me feel relieved0.820
PDR3: Using CTMA makes me feel contented0.820
PDR4: Using CTMA makes me feel calm0.794
PDR5: Using CTMA makes me feel tranquil0.773
Perceived usefulness (PU)Bhattacherjee (2001)PU1: Using CTMA improves my performance in protecting myself during the COVID-19 pandemic0.8250.7580.8610.674
PU2: Using CTMA increases my productivity in protecting myself during the COVID-19 pandemic0.797
PU3: Using CTMA enhances my effectiveness in protecting myself during the COVID-19 pandemic0.825
PU4: Overall, using CTMA is useful in protecting myself during the COVID-19 pandemic0.785
Privacy concern (PC)Dinev and Hart (2006)PC1: I am concerned that my information collected by CTMA could be misused0.8240.8710.9110.719
PC2: I am concerned that someone else can access my information through CTMA.0.855
PC3: I am concerned about information collected by CTMA because of what others might do with it0.871
PC4: I am concerned about information collected by CTMA because it could be used in a way I did not foresee0.843
Perceived response efficacy (PRE)Posey et al. (2015)PRE1: The efforts of CTMA providers to keep my privacy safe from information security threats are effective0.7830.7880.8630.611
PRE2: The available measures taken by CTMA providers to protect my privacy from security violations are effective0.773
PRE3: The preventive measures available to stop people from accessing my privacy taken by CTMA providers are adequate0.783
PRE4: The preventive measures available to keep people from misusing my privacy taken by CTMA providers are adequate0.788

Note(s): CR = composite reliability; CA = Cronbach's alpha; AVE = average variance extracted

Correlation matrix and discriminant validity

ConstructPDRPUCUPCPRE
Perceived distress relief (PDR)0.806
Perceived usefulness (PU)0.6750.808
Continuance usage (CU)0.6320.6500.821
Privacy concern (PC)0.3950.3050.3010.848
Perceived response efficacy (PRE)0.7380.6490.7140.3100.782

Loadings and cross-loadings

ConstructConstruct itemCUDRPUPCRE
Continuance usage (CU)CU10.8490.5530.5510.2590.627
CU20.7880.5210.5130.2610.563
CU30.8250.4820.5380.2210.567
Perceived distress relief (PDR)PDR10.5760.8230.6300.3550.628
PDR20.5410.8200.5620.3130.604
PDR30.5010.8200.5540.3230.610
PDR40.4680.7940.4950.3030.576
PDR50.4450.7730.4560.2920.550
Perceived usefulness (PU)PU10.5500.5550.8250.2490.561
PU20.5190.5580.7970.2470.533
PU30.5390.5390.8250.2480.507
PU40.4910.5300.7850.2440.493
Privacy concern (PC)PC10.2220.2750.2240.8240.225
PC20.2770.3500.2600.8550.290
PC30.2900.3670.2940.8710.288
PC40.2180.3370.2490.8430.234
Perceived response efficacy (PRE)PRE10.5440.6020.4920.2460.783
PRE20.5470.5420.5120.2040.773
PRE30.5800.5880.5310.2510.783
PRE40.5610.5740.4920.2660.788

Correlations' heterotrait-monotrait ratio (HTMT)

ConstructPDRPUCUPCPRE
Perceived distress relief (PDR)
Perceived usefulness (PU)0.792
Continuance usage (CU)0.7740.822
Privacy concerns (PC)0.4490.3580.365
Perceived response efficacy (PRE)0.8900.8040.8770.369

Testing for age as a moderator

Comparison by ageSeparate structural models' path coefficients
Young vs seniorYoung vs middle-agedYoung vs seniorYoung (n = 172)Middle (n = 278)Senior (n = 101)
H1p < 0.01n.sn.s0.198*0.267***0.586***
H2n.sn.sn.sn.sn.sn.s
H3n.sn.sn.sn.sn.sn.s
H4n.sn.sn.s0.464***0.432***0.496**

Note(s): *** = p < 0.001; ** = p < 0.01; * = p < 0.05; n.s. = not significant

Coronavirus test status as a moderator

Comparison by coronavirus test statusPath coefficients of separate structural models
Tested vs not testedNot tested (n = 207)Tested (n = 338)
H1n.s.0.325***0.280***
H2n.s.0.283*n.s.
H3n.s.n.s.n.s.
H4p < 0.050.276**0.548***

Note(s): *** = p < 0.001; ** = p < 0.01; * = p < 0.05; n.s. = not significant

References

Apple and Google (2021), “Privacy-preserving contact tracing”, available at: https://covid19.apple.com/contacttracing (accessed 8 September 2021).

Bala, H. and Venkatesh, V. (2016), “Adaptation to information technology: a holistic nomological network from implementation to job outcomes”, Management Science, Vol. 62 No. 1, pp. 156-179.

Beaudry and Pinsonneault (2005), “Understanding user responses to information technology: a coping model of user adaptation”, MIS Quarterly, Vol. 29 No. 3, pp. 493-524.

Bhattacharya, D. and Ramos, L. (2021), “COVID-19: privacy and confidentiality issues with contact tracing apps”, Proceedings of 54th Hawaii International Conference on System Sciences, Hawaii, pp. 2009-2018.

Bhattacherjee, A. (2001), “Understanding information systems continuance: an expectation-confirmation model”, MIS Quarterly, Vol. 25 No. 3, pp. 351-370.

Bhattacherjee, A., Davis, C.J., Connolly, A.J. and Hikmet, N. (2018), “User response to mandatory IT use: a coping theory perspective”, European Journal of Information Systems, Vol. 27 No. 4, pp. 395-414.

Bhopal, S.S., Bagaria, J., Olabi, B. and Bhopal, R. (2021), “Children and young people remain at low risk of COVID-19 mortality”, The Lancet Child & Adolescent Health, Vol. 5 No. 5, pp. e12-e13.

Bitzer, T., Morana, S., Bitzer, T., Wiener, M. and Morana, S. (2021), “Algorithmic transparency and contact-tracing apps – an empirical investigation”, Proceedings of the 27th Americas Conference on Information Systems, Montreal, pp. 1-10.

Boss, S.R., Galletta, D.F., Lowry, P.B., Moody, G.D. and Polak, P. (2015), “What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors”, MIS Quarterly, Vol. 39 No. 4, pp. 837-864.

Campos-Mercade, P., Meier, A.N., Schneider, F.H. and Wengström, E. (2021), “Prosociality predicts health behaviors during the COVID-19 pandemic”, Journal of Public Economics, Vol. 195 No. 1, pp. 1-24.

Chan, E.Y. and Saqib, N.U. (2021), “Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high”, Computers in Human Behavior, Vol. 119 No. 1, pp. 1-12.

Cheikh-Ammar, M. (2020), “The bittersweet escape to information technology: an investigation of the stress paradox of social network sites”, Information & Management, Vol. 57 No. 8, pp. 1-23.

Chen, J.V., Tran, A. and Nguyen, T. (2019), “Understanding the discontinuance behavior of mobile shoppers as a consequence of technostress: an application of the stress-coping theory”, Computers in Human Behavior, Vol. 95 No. 1, pp. 83-93.

Chin, W.W., Marcelin, B.L. and Newsted, P.R. (2003), “A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study”, Information Systems Research, Vol. 14 No. 2, pp. 189-217.

Christophe, M., Elie-Dit-Cosaque, C.M. and Straub, D.W. (2011), “Opening the black box of system usage: user adaptation to disruptive IT”, European Journal of Information Systems, Vol. 20 No. 5, pp. 589-607.

Cruz-Jesus, F., Vicente, M.R., Bacao, F. and Oliveira, T. (2016), “The education-related digital divide: an analysis for the EU-28”, Computers in Human Behavior, Vol. 56 No. 3, pp. 72-82.

Culnan, M.J. and Armstrong, P.K. (1999), “Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation”, Organization Science, Vol. 10 No. 1, pp. 104-115.

Curran, P.J., West, S.G. and Finch, J.F. (1996), “The robustness of test statistics to nonnormality and specification error in confirmatory factor analysis”, Psychological Methods, Vol. 1 No. 1, pp. 16-29.

Czaja, S.J., Charness, N., Fisk, A.D., Hertzog, C., Nair, S.N., Rogers, W.A. and Sharit, J. (2006), “Factors predicting the use of technology: findings from the center for research and education on aging and technology enhancement (CREATE)”, Psychology and Aging, Vol. 21 No. 2, pp. 333-352.

Davis, F.D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology”, MIS Quarterly, Vol. 13 No. 3, pp. 319-340.

Davis, D.W. and Silver, B.D. (2004), “Civil liberties vs security: public opinion in the context of the terrorist attacks on America”, American Journal of Political Science, Vol. 48 No. 1, pp. 28-46.

Dholakia, U.M. (2006), “How customer self-determination influences relational marketing outcomes: evidence from longitudinal field studies”, Journal of Marketing Research, Vol. 43 No. 1, pp. 109-120.

Dinev, T. and Hart, P. (2006), “An extended privacy calculus model for e-commerce transactions”, Information Systems Research, Vol. 17 No. 1, pp. 61-80.

D'Arcy, J., Herath, T. and Shoss, M.K. (2014), “Understanding employee responses to stressful information security requirements: a coping perspective”, Journal of Management Information Systems, Vol. 31 No. 2, pp. 285-318.

Eisel, M., Schmidt, J., Nastjuk, I., Ebermann, C. and Kolbe, L. (2014), “Can information systems reduce stress? He impact of information systems on perceived stress and attitude”, Proceedings of 35th International Conference on Information Systems, Auckland, pp. 1-16.

Fadel, K.J. and Brown, S.A. (2010), “Information systems appraisal and coping: the role of user perceptions”, Communications of the Association for Information Systems, Vol. 26 No. 1, pp. 107-126.

Ferretti, L., Wymant, C., Kendall, M., Zhao, L., Nurtay, A., Abeler-Dörner, L., Parker, M., Bonsall, D. and Fraser, C. (2020), “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing”, Science, Vol. 368 No. 6491, pp. 0-7.

Folkman, S. and Moskowitz, J.T. (2004), “Coping: pitfalls and promise”, Annual Review of Psychology, Vol. 55 No. 1, pp. 745-774.

Fornell, C. and Larcker, D.F. (1981), “Structural equation models with unobservable variables and measurement error: algebra and statistics”, Journal of Marketing Research, Vol. 18 No. 3, pp. 382-388.

Geisser, S. (1974), “A predictive approach to the random effect model”, Biometrika, Vol. 61 No. 1, pp. 101-107.

Gong, X., Zhang, K.Z.K., Chen, C., Cheung, C.M.K. and Lee, M.K.O. (2020), “Transition from web to mobile payment services: the triple effects of status quo inertia”, International Journal of Information Management, Vol. 50 No. 7, pp. 310-324.

Hair, J.F., Black, W.C., Babin, B.J. and Anderson, R.E. (2014), Multivariate Data Analysis, 7th ed., Pearson Education, Harlow, Chichester.

Hair, J.F., Hult, G.T.M., Ringle, C.M. and Sarstedt, M. (2017), A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2nd ed., SAGE Publications, Los Angeles.

Hair, J.F., Risher, J.J., Sarstedt, M. and Ringle, C.M. (2019), “When to use and how to report the results of PLS-SEM”, European Business Review, Vol. 31 No. 1, pp. 2-24.

Henseler, J., Dijkstra, T.K., Sarstedt, M., Ringle, C.M., Diamantopoulos, A., Straub, D.W., Ketchen, D.J., et al. (2014), “Common beliefs and reality about PLS: comments on rönkkö and evermann (2013)”, Organizational Research Methods, Vol. 17 No. 2, pp. 182-209.

Henseler, J., Ringle, C.M. and Sarstedt, M. (2015), “A new criterion for assessing discriminant validity in variance-based structural equation modeling”, Journal of the Academy of Marketing Science, Vol. 43 No. 1, pp. 115-135.

Henseler, J., Ringle, C.M. and Sarstedt, M. (2016), “Testing measurement invariance of composites using partial least squares”, International Marketing Review, Vol. 33 No. 3, pp. 405-431.

Hinch, R., Probert, W., Kendall, M., Wymant, C., Hall, M., Lythgoe, K., Cruz, B.A., et al. (2020), “Effective configurations of a digital contact tracing app: a report to NHSX”, Effective Configurations of a Digital Contact Tracing App: A Report to NHSX, available at: https://cdn.theconversation.com/static_files/files/1009/Report_-_Effective_App_Configurations.pdf (accessed 20 August 2021).

Hu, L. and Bentler, P.M. (1998), “Fit indices in covariance structure modeling: sensitivity to underparameterized model misspecification”, Psychological Methods, Vol. 3 No. 4, pp. 424-453.

Kock, N. and Lynn, G.S. (2012), “Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations”, Journal of the Association for Information Systems, Vol. 13 No. 7, pp. 546-580.

Lazarus, R.S. and Folkman, S. (1984), Stress, Appraisal, and Coping, Springer Publishing Company, New York.

Li, W., Zhang, H., Zhang, C., Luo, J., Wang, H., Wu, H., Zhu, Y., et al. (2021), “The prevalence of psychological status during the COVID-19 epidemic in China: a systemic review and meta-analysis”, Frontiers in Psychology, Vol. 12 No. 5, pp. 1-12.

Liang, H., Xue, Y., Pinsonneault, A. and Wu, Y.“Andy”. (2019), “What users do besides problem-focused coping when facing IT security threats: an emotion-focused coping perspective”, MIS Quarterly, Vol. 43 No. 2, pp. 373-394.

Lin, D., Friedman, D.B., Qiao, S., Tam, C.C., Li, X. and Li, X. (2020), “Information uncertainty: a correlate for acute stress disorder during the COVID-19 outbreak in China”, BMC Public Health, Vol. 20 No. 1, pp. 1-9.

Lin, J., Carter, L. and Liu, D. (2021), “Privacy concerns and digital government: exploring citizen willingness to adopt the COVIDSafe app”, European Journal of Information Systems, Vol. 30 No. 4, pp. 389-402.

Marakhimov, A. and Joo, J. (2017), “Consumer adaptation and infusion of wearable devices for healthcare”, Computers in Human Behavior, Vol. 76, pp. 135-148.

Matud, M.P. (2004), “Gender differences in stress and coping styles”, Personality and Individual Differences, Vol. 37 No. 7, pp. 1401-1415.

Maxouri, C. (2020), “December is the deadliest month in the US since the coronavirus pandemic began -- and projections for January are ‘nightmarish,’ expert says”, CNN, available at: https://edition.cnn.com/2020/12/27/health/us-coronavirus-sunday/index.html (accessed 3 October 2021).

Nach, H. and Lejeune, A. (2010), “Coping with information technology challenges to identity: a theoretical framework”, Computers in Human Behavior, Vol. 26 No. 4, pp. 618-629.

Ojo, A. and Rizun, N. (2021), “Public perception of digital contact tracing app and implications for technology acceptance and use models”, Proccedings of the 27th Americas Conference on Information Systems, Montreal, pp. 0-10.

Owusu Kwateng, K., Osei Atiemo, K.A. and Appiah, C. (2019), “Acceptance and use of mobile banking: an application of UTAUT2”, Journal of Enterprise Information Management, Vol. 32 No. 1, pp. 118-151.

Peters, A., McEwen, B.S. and Friston, K. (2017), “Uncertainty and stress: why it causes diseases and how it is mastered by the brain”, Progress in Neurobiology, Vol. 156, pp. 164-188.

Podsakoff, P.M., Mackenzie, S.B., Lee, J. and Podsakoff, N.P. (2003), “Common method biases in behavioral research: a critical review of the literature and recommended remedies”, Journal of Applied Psychology, Vol. 88 No. 5, pp. 879-903.

Posey, C., Roberts, T.L. and Lowry, P.B. (2015), “The impact of organizational commitment on insiders' motivation to protect organizational information assets”, Journal of Management Information Systems, Vol. 32 No. 4, pp. 179-214.

Potts, H. (2020), “The CORSAIR study on use of the NHS COVID-19 app”, National Institute for Health Research, available at: http://epr.hpru.nihr.ac.uk/our-research/research-themes/response/corsair-study (accessed 6 September 2022).

Rehse, D. and Tremöhlen, F. (2022), “Fostering participation in digital contact tracing”, Information Economics and Policy, Vol. 58 No. 7, pp. 1-15.

Rettie, H. and Daniels, J. (2021), “Supplemental material for coping and tolerance of uncertainty: predictors and mediators of mental health during the COVID-19 pandemic”, American Psychologist, Vol. 76 No. 3, pp. 427-437.

Riemer, K., Ciriello, R., Peter, S. and Schlagwein, D. (2020), “Digital contact-tracing adoption in the COVID-19 pandemic: IT governance for collective action at the societal level”, European Journal of Information Systems, Vol. 29 No. 6, pp. 731-745.

Rowe, F., Ngwenyama, O. and Richet, J.L. (2020), “Contact-tracing apps and alienation in the age of COVID-19”, European Journal of Information Systems, Vol. 29 No. 5, pp. 545-562.

Salo, M., Makkonen, M. and Hekkala, R. (2020), “The interplay of IT users' coping strategies:uncovering momentary emotional load, routes, and sequences”, MIS Quarterly, Vol. 44 No. 3, pp. 1143-1175.

Sowmiya, B., Abhijith, V.S., Sudersan, S., Sakthi Jaya Sundar, R., Thangavel, M. and Varalakshmi, P. (2021), “A survey on security and privacy issues in contact tracing application of covid-19”, SN Computer Science, Vol. 2 No. 3, pp. 1-11.

Stone, M. (1974), “Cross-validatory choice and assessment of statistical predictions”, Journal of the Royal Statistical Society: Series B (Methodological), Vol. 36 No. 2, pp. 111-133.

Tams, S., Grover, V. and Thatcher, J. (2014), “Modern information technology in an old workforce: toward a strategic research agenda”, The Journal of Strategic Information Systems, Vol. 23 No. 4, pp. 284-304.

Trang, S., Trenz, M., Weiger, W.H., Tarafdar, M. and Cheung, C.M.K. (2020), “One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps”, European Journal of Information Systems, Vol. 29 No. 4, pp. 415-428.

Urbaczewski, A. and Lee, Y.J. (2020), “Information Technology and the pandemic: a preliminary multinational analysis of the impact of mobile tracking technology on the COVID-19 contagion control”, European Journal of Information Systems, Vol. 29 No. 4, pp. 405-414.

Venkatesh, Morris, Davis and Davis (2003), “User acceptance of information technology: toward a unified view”, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.

Wagner, A., Olt, C.M. and Abramova, O. (2021), “Calculating versus herding in adoption and continuance use of a privacy-invasive information system: the case of covid-19 tracing apps”, Proceedings of 29th European Conference on Information Systems, pp. 1-17, A Virtual AIS Conference.

Walter Thiée, L., Petrowsky, H., Frech, M., Loschelder, D. and Funk, B. (2021), “‘Spread the app, not the virus’ — an extensive sem-approach to understand pandemic tracing app usage in Germany”, Proceedings of 29th European Conference on Information Systems, pp. 1-18, A Virtual AIS Conference.

West, S.G., Finch, J.F. and Curran, P.J. (1995), “Structural equation models with nonnormal variables: problems and remedies”, in Hoyle, R.H. (Ed.), Structural Equation Modeling: Concepts, Issues, and Applications, Sage Publications Inc, New York, pp. 56-75.

World Health Organization (2021a), “WHO coronavirus (COVID-19) dashboard”, available at: https://covid19.who.int/ (accessed 6 September 2021).

World Health Organization (2021b), “Older people and COVID-19”, available at: https://www.who.int/teams/social-determinants-of-health/demographic-change-and-healthy-ageing/covid-19 (accessed 13 September 2021).

Wu, Y., Choi, B., Guo, X. and Chang, K. (2017), “Understanding user adaptation toward a new it system in organizations: a social network perspective”, Journal of the Association for Information Systems, Vol. 18 No. 11, pp. 787-813.

Wymant, C., Ferretti, L., Tsallis, D., Charalambides, M., Abeler-Dörner, L., Bonsall, D., Hinch, R., et al. (2021), “The epidemiological impact of the NHS COVID-19 app”, Nature, Vol. 594 No. 7863, pp. 408-412.

Yan, M., Filieri, R. and Gorton, M. (2021), “Continuance intention of online technologies: a systematic literature review”, International Journal of Information Management, Vol. 58 No. 7, pp. 1-13.

Yang, X., Li, Y. and Liao, Q. (2016), “Exploring continued use of mobile shopping channel in China: the effects of active coping and its antecedents”, Electronic Commerce Research, Vol. 16 No. 2, pp. 245-267.

Zhang, B., Kreps, S., McMurry, N. and McCain, R.M. (2020), “Americans' perceptions of privacy and surveillance in the COVID-19 pandemic”, PLoS ONE, Vol. 15 No. 12, pp. 1-57.

Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B. and Zhu, Q. (2018), “Health information privacy concerns, antecedents, and information disclosure intention in online health communities”, Information & Management, Vol. 55 No. 4, pp. 482-493.

Zhao, Y., Ni, Q. and Zhou, R. (2018), “What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age”, International Journal of Information Management, Vol. 43 No. 10, pp. 342-350.

Zhou, T. (2016), “The effect of perceived justice on LBS users' privacy concern”, Information Development, Vol. 32 No. 5, pp. 1730-1740.

Zhou, T. and Li, H. (2014), “Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern”, Computers in Human Behavior, Vol. 37 No. 8, pp. 283-289.

Acknowledgements

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Corresponding author

Chenglong Li can be contacted at: chenglong.li@tuni.fi

Related articles