Skip to main content

ORIGINAL RESEARCH article

Front. Psychol., 29 June 2022
Sec. Human-Media Interaction

The Impact of Data Vulnerability in Online Health Communities: An Institutional Assurance Perspective

\r\nWei GaoWei Gao1Huiling Wang*Huiling Wang2*Ning JiangNing Jiang2
  • 1College of Economics and Management, Southwest University, Chongqing, China
  • 2Antai College of Economics and Management, Shanghai Jiao Tong University, Shanghai, China

In the last few years, online health communities (OHCs) have experienced rapid development due to advances in technology and the COVID-19 pandemic. However, the sensitive nature of medical information has also raised concerns from users about their privacy and reduced their intention to use OHCs. Considering the critical role of data privacy, this study explored the effect of data vulnerability on OHC users. Using online survey data collected from 438 OHC users in China, we found that data vulnerability significantly reduced psychological comfort, while the latter enhanced continuance intention. We also found that psychological comfort negatively mediated the impact of data vulnerability on continuance intention. Institutional assurance approaches, namely privacy policy, privacy protection technology, industry self-regulation, and government legislation, were also found to mitigate the negative impact of data vulnerability on psychological comfort. This study not only contributes to the data privacy, psychological comfort, and institutional assurance literature but also offers suggestions for OHC stakeholders.

Introduction

With the rapid development of digital information technologies, such as artificial intelligence, 5G, and big data analytics, medical and health information services on the Internet are becoming increasingly popular. In China, the number of online health or medical consultations rose by 49% from 2012 to 2016 and is likely to experience accelerated growth in the coming years, potentially surpassing 1.5 billion annually by 2025 (McKinsey, 2020). In addition, there is a growing number of people who participate in online health communities (OHCs) to search for health information and self-care advice (Zhang et al., 2018). An OHC is a “virtual social network where individuals can share health experiences, post health questions, seek, and/or provide support” (Chen et al., 2019, p. 195). Compared with traditional offline medical and health information services, OHCs not only enable individuals to acquire more abundant and diverse health information without the restrictions of time and space (Zhang et al., 2018; Virlée et al., 2020), but also reduce the perceived severity of their disease and enhance their quality of life (Tseng et al., 2022). Thus, OHCs have become useful channels for people seeking health information over the last dozen years (Zhang et al., 2018; Liu et al., 2020; Zhou, 2020; James et al., 2022). Especially because of the COVID-19 pandemic, people are increasingly acknowledging the benefits of OHCs and becoming users (Zhang et al., 2021; Shao et al., 2022).

Although OHCs have widely recognized advantages, their users face a higher risk of personal data vulnerability than in other online communities because they usually disclose sensitive information, such as their health information and medical records, to seek medical help. Data vulnerability is defined as individuals’ feelings of susceptibility to harm due to unwanted uses of their personal data (Martin et al., 2017). In this digital age, people have high awareness of information security (Mamonov and Benbunan-Fich, 2018; Mohr and Walter, 2019; Mombeuil and Uhde, 2021) and are increasingly emphasizing data privacy (Wang et al., 2019; Esmaeilzadeh, 2020b; Liyanaarachchi, 2021; Martínez-Navalón et al., 2021). A likely reason is that information leakage or data breach events have occurred frequently in recent years (Goode et al., 2017). In particular, medical data leaks, which are highly sensitive, can result in substantial psychological harm and deter individuals from using online health services (Hua et al., 2019; Maxwell and Grupac, 2021; Turner and Pera, 2021). When people use OHC services, they are concerned that their sensitive personal information may be leaked or misused without authorization (Zhang et al., 2018). This concern (i.e., data vulnerability) is likely to affect their intention to use in OHCs. Thus, how to manage user data safely and effectively and thereby decrease their data vulnerability is a critical issue for OHCs to solve.

Although researchers have illustrated the importance of data privacy protection or information security for online users (Wang et al., 2019; Yang et al., 2020; Tsai and Tiwasing, 2021), no study has examined the influence of data vulnerability on OHC users. Moreover, to the best of our knowledge, no study has explored how institutional assurance may reduce data vulnerability. Therefore, to fill these research gaps, this study investigated the following two interrelated research questions. First, how does OHC users’ data vulnerability affect their psychological comfort and continuance intention? Second, are the institutional assurance approaches of privacy policy, privacy protection technology, industry self-regulation, and government legislation effective in mitigating the negative impact of data vulnerability on OHC users?

More precisely, this research contributes to the literature in the following three aspects. First, although some studies have examined the effect of data vulnerability and promoted scrutiny of corporate data management practices over that user privacy concerns as a solution (Liyanaarachchi et al., 2021), data vulnerability in the context of OHCs has not been explored. By introducing the concept of data vulnerability in the study of OHCs, this study extends the contexts in which data vulnerability is researched.

Second, this research examined the mediating role of psychological comfort in the relationship between data vulnerability and continuance intention. Therefore, it provides a way to understand the mechanism by which data vulnerability operates from the perspective of psychological comfort. It enriches knowledge on data vulnerability and extends the comfort literature to include the OHC research context.

Third, this study identified and explored four data vulnerability suppressors from the perspective of institutional assurance. Although Martin et al. (2017) suggested that transparency and perceived control could effectively mitigate the negative impact of data vulnerability, no research has considered the impact of institutional mitigation strategies. As we examined how privacy policy, privacy protection technology, industry self-regulation, and government legislation could moderate the effect of data vulnerability on psychological comfort, this study not only facilitates a deeper understanding of data vulnerability but also a more holistic approach to governing relevant issues.

Research Background

Data Vulnerability

Vulnerability refers to an individual’s susceptibility to harm or injury (Smith and Cooper-Martin, 1997) and reflects an object’s inherent weakness (Lee, 2020). Research has found that consumer vulnerability (Baker et al., 2005; Kim, 2019; Glavas et al., 2020), financial vulnerability (O’Connor et al., 2019), and technology vulnerability (Lee, 2020) can have a negative impact on individuals. However, limited research has focused on the effects of data vulnerability, which refers to individuals’ feelings of susceptibility to harm due to an organization’s possession of their personal data (Martin et al., 2017). When an organization collects, stores, and uses the personal data of users, the possibility of data misuse enhances their vulnerability. That is, users perceive greater data vulnerability when they lose control of their personal data (Warner and Wang, 2019; Liyanaarachchi et al., 2021).

Individuals may be more vulnerable when they use an OHC rather than traditional offline medical services, because their online personal data can be easily disclosed, misused, and even sold to third parties by the OHC (Warner and Wang, 2019). In addition, Martin et al. (2017) found that data vulnerability could increase individuals’ feelings of violation, decrease their trust in the organization holding their data, and worsen firm performance. Therefore, it is important for OHCs to explore how data vulnerability affects their users and how they may reduce the negative impact of data vulnerability effectively.

Psychological Comfort

Psychological comfort refers to individuals’ emotional feelings of comfort and security toward disclosing personal data to others (Yang et al., 2020). In this study, it refers to OHC users’ emotional feelings of comfort in revealing their personal data when using OHCs (Sutanto et al., 2013). High levels of psychological comfort indicate that individuals are not concerned about the security of their personal data (Robinson, 2018). Research has found that psychological comfort can induce positive outcomes, such as users’ higher intention to disclose personal information (Yang et al., 2020), save advertisements intention (Sutanto et al., 2013), and repeat purchase intentions (Akhtar et al., 2019). Thus, psychological comfort is an important predictor of individuals’ behavioral intentions, and its improvement is critical for the success of OHCs.

Institutional Assurance Approaches

Institutional assurance is regarded as a salient environmental factor that affects individuals’ decisions to disclose their personal information (Xu et al., 2011). It refers to interventions made by powerful agents to assure individuals that considerable effort has been invested in protecting their data privacy and that the organizations holding their data have fair and reasonable data practices (McKnight et al., 2002; Xu et al., 2011, 2012). These powerful agents include service providers, industry regulators, and government (Gong et al., 2019; Yang et al., 2020). Specifically, previous pieces of literature propose four types of institutional assurance approaches, such as privacy policy, privacy protection technology, industry self-regulation, and government legislation (Zhao et al., 2012; Gong et al., 2019; Wang et al., 2019), all of which were examined in this research.

Privacy policy and privacy protection technology are institutional assurance approaches provided by service providers (Culnan and Bies, 2003; Wang et al., 2019). A privacy policy is a statement that details the service provider’s promise to protect and manage individuals’ personal data (Karwatzki et al., 2017). The privacy policy informs users of what data will be collected, and how the data will be used. Privacy protection technology refers to technological measures that protect the security of individuals’ personal data (Wang et al., 2019). Industry self-regulation is established by independent industry groups or certifying agencies (Xu et al., 2011) and consists of the rules and enforcement procedures developed by industries to ensure companies’ fair data practices (Culnan and Bies, 2003). Government legislation refers to the measures made by a government’s judicial and legislative branches to protect individuals’ personal data (Gong et al., 2019). All of these institutional assurance approaches are critical for solving data privacy issues, but little research has integrated and examined the four types simultaneously. Therefore, this study investigated the moderating effects of privacy policy, privacy protection technology, industry self-regulation, and government legislation in the context of OHCs.

Conceptual Model and Hypotheses

The conceptual model of this study is shown in Figure 1. We first explored the effect of data vulnerability on psychological comfort and the effect of psychological comfort on continuance intention. We then examined the mediating role of psychological comfort in the relationship between data vulnerability and continuance intention. Finally, we explored the moderating role of four institutional assurance approaches (i.e., privacy policy, privacy protection technology, industry self-regulation, and government legislation) in the relationship between data vulnerability and psychological comfort.

FIGURE 1
www.frontiersin.org

Figure 1. Conceptual model.

The Impact of Data Vulnerability on Psychological Comfort and Continuance Intention

Data vulnerability involves feelings of violation (Martin et al., 2017), which cause negative responses (Liyanaarachchi et al., 2021). In the OHC environment, data vulnerability indicates that the users feel insecure, vulnerable, and exposed since the OHCs have their personal health data, including disease-related information and medical records. This perception of vulnerability makes OHC users feel susceptible (Martin et al., 2017), because the leaks of these data can result in reputation damage, mental stress, embarrassment, blackmail, disease discrimination, and identity theft (Slepchuk et al., 2022; Sun et al., 2022; Wu et al., 2022). Hence, the OHC users may not feel comfortable providing their sensitive data to the OHCs. In addition, the OHCs that have users’ medical data can also suffer a security lapse, such as data breach, which put the users in a risky situation (Wu et al., 2022). Consequently, a high level of data vulnerability indicates that OHC users are concerned their personal data will be associated with great unauthorized access and illegal use (Dinev et al., 2013; Sun et al., 2022). These concerns for their personal data security will make OHC users feel uncomfortable and anxiety (Sutanto et al., 2013; Robinson, 2018), and their psychological contracts with OHCs will be breached (Liu et al., 2021). We accordingly propose the following hypothesis:

H1: Data vulnerability is negatively related to psychological comfort.

Psychological comfort is a state of mind where individuals feel calm and at ease (Spake et al., 2003) and reflects a feeling of worry-free in an environment (Radia et al., 2022). In this study, psychological comfort demonstrates the comfortable feeling of disclosing personal data when individuals use the service of OHC (Yang et al., 2020). When OHC users feel reliable and comfortable providing personal data to the OHCs, the relationship quality between users and service providers of OHCs will be enhanced (Mahmood and Tayib, 2021; Radia et al., 2022). Furthermore, the improved psychological comfort indicates reduced psychological tension, which suggests the OHC users are worry-free concerning service encounters with the service provider of OHCs. So, psychological promotes OHC users to go beyond the available cognitive pieces of evidence to feel at ease and assured toward continued using OHC (Dinev et al., 2015). In addition, according to the comfort pieces of literature, comfortable psychological state is an important emotional motivator that can induce positive outcomes, such as repeat purchases (Liang et al., 2018), positive word of mouth (Akhtar et al., 2019), disclosing personal information (Yang et al., 2020), and purchase intention (Otterbring et al., 2021). In the context of an OHC, high degree of psychological comfort suggests that users perceive the provision of personal data to an OHC as being emotional comfortable, which then enhances the users’ continuance intention to adopt the OHC. Therefore, we propose the following hypothesis:

H2: Psychological comfort is positively related to continuance intention.

Combining the logic of H1 and H2, we conjecture that psychological comfort plays an important role in the relationship between data vulnerability and continuance intention. When OHC users perceive a high level of data vulnerability, they are likely to feel uncomfortable disclosing their health-related information. Given their lack of confidence in the OHCs’ ability and willingness to protect their data security, they are likely to be reluctant to continue using the service of OHCs. Besides, psychological comfort has been identified as important mediating construct (e.g., Yang et al., 2020; Radia et al., 2022). Therefore, we propose the following hypothesis:

H3: Psychological comfort negatively mediates the impact of data vulnerability on continuance intention.

The Moderating Effect of Institutional Assurance Approaches

When OHC users perceive a privacy policy to be highly effective, they believe that it provides reliable information about how the OHC collects and uses their personal data (Xu et al., 2011; Yang et al., 2020). The privacy policy therefore offers users the promise to be able to securely disclose their personal data and use OHC services (Gong et al., 2019; Zeng et al., 2022). Under these circumstances, users perceive a high level of information control, which can mitigate their feelings of violation and promote trust-related behaviors (Esmaeilzadeh, 2020a; Mutimukwe et al., 2020; Guo et al., 2022). Moreover, the principles of privacy policy should demonstrate fair information practices (Culnan, 2019), which can effectively decrease privacy concerns (Nikkhah and Sabherwal, 2021) and increase the willingness to disclose personal data (Liu et al., 2022). Therefore, the perception of insecure and vulnerable associated with data vulnerability (Liyanaarachchi et al., 2021) may be reduced through the establishment of an effective privacy policy. We accordingly propose the following hypothesis:

H4: Privacy policy positively moderates the relationship between data vulnerability and psychological comfort.

Privacy protection technology offered by service providers allows users to make personalized technological choices to guarantee the safety of their personal data online (Duan and Wang, 2015). OHCs that adopt privacy protection technology can decrease the risk of unauthorized or improper personal data access, thus reducing their users’ data vulnerability (Van der Schyff et al., 2020). Some privacy protection technologies can also maintain the anonymity of users’ data and allow them to adjust the level and scope of personal data available to other parties (Wang and Li, 2021). In addition, advanced mainstream cryptography and blockchain technology can facilitate the safe storage and transfer of health data (Abdellatif et al., 2021). Therefore, users may perceive high levels of control over their personal data in OHCs with highly effective privacy protection technology (Wang et al., 2019). Martin et al. (2017) suggested that the perception of information control could reduce the negative impact of data vulnerability on cognitive trust. Hence, effective privacy protection technology could weaken the negative effect of data vulnerability on psychological comfort through offering OHC users perceived control over their personal data. Furthermore, various privacy protection technologies empower individuals to deal with firms’ data collection practices and provide them with more choices to protect their data privacy (Wang et al., 2019). Therefore, we propose the following hypothesis:

H5: Privacy protection technology positively moderates the relationship between data vulnerability and psychological comfort.

Industry self-regulation refers to the enforcement procedures and rules developed by industry regulators to enhance the trustworthiness of companies in that industry (Xu et al., 2012). The independent industry regulator is responsible for protecting the data privacy of users in relation to personal data collection and usage (Gong et al., 2019). Effective industry self-regulation for OHCs entails fair monitoring and governance of their data practices and enables users to form positive expectations of these practices (Hemphill and Banerjee, 2021). Thus, when industry self-regulation is high, OHC users perceive a low risk of data misuse and high levels of information control (Xu et al., 2011). The negative impact of data vulnerability on psychological comfort may thus be weakened. What’s more, industry self-regulation signals to users that the service providers of OHCs will not behave opportunistically with their personal data (Nikkhah and Sabherwal, 2021). Even if their data security is compromised, the industry self-regulation programs will provide recourse (Xu et al., 2009). Therefore, we propose the following hypothesis:

H6: Industry self-regulation positively moderates the relationship between data vulnerability and psychological comfort.

In this study, government legislation refers to the measures enacted by the legislative and judicial branches of a government to protect the safety of individuals’ personal data (Xu et al., 2012; Gong et al., 2019). It indicates that the government, as an independent third party, will protect users’ sensitive personal data through effective regulation of organizations’ data practices (Gong et al., 2019; Hong et al., 2021). Thus, when there is highly effective government legislation, OHC users may perceive a lower risk of data misuse. In addition, the strict government legislations indicate that the OHCs will pay a high price when behaving opportunistically with users’ personal data (Hong et al., 2021). Therefore, OHC users could have high-level control of their own data, and then, the negative impact of data vulnerability on psychological comfort may be mitigated by effective government legislation. Moreover, research has found that effective government laws and regulations are important forms of assurance that can reduce individuals’ data privacy concerns by offering them high-level control of their personal data (Lee, 2020; Hong et al., 2021). Hence, we propose the following hypothesis:

H7: Government legislation positively moderates the relationship between data vulnerability and psychological comfort.

Research Methods

Sample and Data Collection

In this study, we focused on general-purpose OHCs in China, such as Dingxiangyuan1, Haodaifu2, and Xunyiwenyao3. To test our conceptual model and hypotheses, we conducted an online survey to collect data through the professional third-party platform Sojump, which provides access to large samples in China. Before sending out the questionnaire, we invited experts to check its terminology, logical consistency, and clarity. We then modified our questionnaire according to their advice and formulated the final version. The questionnaire consisted of four parts. The first section introduced the purpose of this research and guaranteed the anonymity and absolute confidentiality of the participants’ information. The second section collected the participants’ demographic information, namely their gender, age, education, and monthly income. In the third section, we asked the participants whether they had experience using OHCs. Only the participants who had registered with and used OHCs could continue filling in the questionnaire. These participants were asked to choose one OHC that they had used and answer the subsequent questions based on their selected OHC. The fourth section presented the core constructs of our study. Our final sample consisted of 438 valid responses obtained in 2 weeks. Of the participants, 51.4% were male, 50.2% were between 31 and 40 years old, and 81.5% had a bachelor’s degree or above (see Table 1). To check for non-response bias, we compared the first 25% and last 25% of the participants. Our results indicated that non-response bias was not a major issue in this study.

TABLE 1
www.frontiersin.org

Table 1. Demographic information.

Measurements

All of the measures in this research were adapted from previous studies (see Supplementary Appendix). The items for data vulnerability were adapted from Martin et al. (2017); the three items for psychological comfort were adapted from Yang et al. (2020); the three items for privacy policy were adapted from Xu et al. (2011); the items for privacy protection technology were adapted from Wang et al. (2019); the three items for industry self-regulation were adapted from Xu et al. (2011); the three items for government legislation were adapted from Gong et al. (2019); and the four items for continuance intention were adapted from Kim et al. (2019). All of the items were scored on a seven-point Likert scale. As seen in Table 2, the means of the core constructs ranged from 4.283 to 5.198, and the standard deviations ranged from 1.137 to 1.766. We controlled for gender (mean = 0.510, SD = 0.500), age (mean = 33.610, SD = 5.826), education (mean = 1.970, SD = 0.602), and monthly income (mean = 2.468, SD = 1.047) as the control variables.

TABLE 2
www.frontiersin.org

Table 2. Correlations.

Measurement Assessment

We conducted a confirmatory factor analysis (CFA) to test the reliability and validity of our measures. The CFA results indicated that our data had a good fit with the conceptual model (χ2 = 416.992, df = 231, RMSEA = 0.043, CFI = 0.972, TLI = 0.967, SRMR = 0.030). As presented in Table 3, all of the Cronbach’s α and composite reliability (CR) values were also greater than 0.7, suggesting that all of the variables had good reliability (Fornell and Larcker, 1981). The average variance extracted (AVE) scores were greater than 0.5, indicating that the constructs had adequate convergent validity (Fornell and Larcker, 1981). As shown in Table 2, the square roots of the AVE for all of the variables were greater than the correlation coefficients, indicating good discriminant validity (Fornell and Larcker, 1981). In addition, following the method recommended by Lindell and Whitney (2001) to examine common method variance (CMV), we adjusted the correlations according to the lowest positive correlation (r = 0.006; see Table 2) and compared the results with the unadjusted correlation matrix. The original significant correlations maintained their significance, indicating that CMV was not a serious issue in this research.

TABLE 3
www.frontiersin.org

Table 3. Reliability and validity.

Analysis Results

Mplus 7 was used to analyze the data. The multiple regression results are presented in Table 4. The result of Model 1 showed that the coefficient between data vulnerability and psychological comfort was significantly negative (β = −0.280, p < 0.001), indicating that data vulnerability had a negative effect on the participants’ psychological comfort. H1 was thus supported. In Model 3, the coefficient between psychological comfort and continuance intention was significant and positive (β = 0.143, p < 0.001), suggesting that psychological comfort positively affected continuance intention. H2 was thus supported.

TABLE 4
www.frontiersin.org

Table 4. Regression results.

To test the mediating effect of psychological comfort, we adopted the bootstrap method recommended by Zhao et al. (2010). First, to calculate the mediating effect (−0.040 = −0.280 × 0.143), we multiplied the coefficient between data vulnerability and psychological comfort (−0.280) by the coefficient between psychological comfort and continuance intention (0.143). Then, we performed a bootstrap analysis with 5000 resamples to test the significance of the mediating effect of psychological comfort. The result showed that the 95% bias-corrected confidence interval did not contain zero (−0.069, −0.020), suggesting that data vulnerability had a negative mediating effect on the participants’ continuance intention through psychological comfort. H3 was thus supported.

The results of Model 2 are as follows. The interaction term between privacy policy and data vulnerability was significantly positive (β = 0.086, p < 0.001). As shown in Figure 2, when the participants perceived a high level of privacy policy implementation, the negative impact of data vulnerability on psychological comfort was reduced. Thus, H4 was supported. The interaction term between privacy protection technology and data vulnerability was also positive and significant (β = 0.085, p < 0.05). As shown in Figure 3, when the participants perceived a high level of privacy protection technology implementation, the negative impact of data vulnerability on psychological comfort was reduced. Therefore, H5 was supported. The interaction term between industry self-regulation and data vulnerability was similarly significantly positive (β = 0.077, p < 0.05). As shown in Figure 4, the negative effect of data vulnerability on psychological comfort was mitigated when industry self-regulation was perceived to be at a high level. Hence, H6 was supported. The interaction term between government legislation and data vulnerability was again significant and positive (β = 0.078, p < 0.01). As shown in Figure 5, when the amount of government legislation was perceived to be high, the negative effect of data vulnerability on psychological comfort was significantly decreased. Thus, H7 was supported. A summary of the hypothesis testing results is presented in Table 5.

FIGURE 2
www.frontiersin.org

Figure 2. Moderating effect of PPO. PPO, privacy policy; DUV, data vulnerability; PCO, psychological comfort.

FIGURE 3
www.frontiersin.org

Figure 3. Moderating effect of PPT. PPT, privacy protection technology; DUV, data vulnerability; PCO, psychological comfort.

FIGURE 4
www.frontiersin.org

Figure 4. Moderating effect of ISR. ISR, industry self-regulation; DUV, data vulnerability; PCO, psychological comfort.

FIGURE 5
www.frontiersin.org

Figure 5. Moderating effect of GLE. GLE, government legislation; DUV, data vulnerability; PCO, psychological comfort.

TABLE 5
www.frontiersin.org

Table 5. Summary of hypotheses testing.

Discussion and Conclusion

Discussion

This study examined the influence of OHC users’ data vulnerability on their psychological comfort and continuance intention, as well as the mediating effect of psychological comfort on the relationship between data vulnerability and continuance intention, and the moderating effect of four types of institutional assurance approaches, namely privacy policy, privacy protection technology, industry self-regulation, and government legislation, on the relationship between data vulnerability and psychological comfort.

First, our results showed that data vulnerability could significantly reduce psychological comfort, which suggests that data privacy is a critical negative factor affecting OHC users’ psychology. Second, the results of our mediation analysis showed that psychological comfort negatively mediated the effect of data vulnerability on the participants’ continuance intention. This result is similar to those in previous research (Martin et al., 2017; Liyanaarachchi et al., 2021) and confirms that data vulnerability has negative effects on individuals’ psychology and behavior. It also suggests that psychological comfort plays an important mediating role in the mechanism by which data vulnerability affects continuance intention. Third, this study found that privacy policy, privacy protection technology, industry self-regulation, and government legislation positively moderated the effect of data vulnerability on psychological comfort. This result suggests that institutional assurance approaches play important roles in improving OHC users’ psychological comfort, as they can effectively weaken the negative effect of data vulnerability on users’ psychology. It also suggests that the success of OHCs relies on institutional assurance approaches provided by different OHC stakeholders.

Theoretical Contributions

This study makes several theoretical contributions to the literature. First, our research extends the data privacy literature by introducing data vulnerability in the OHC context to elucidate individuals’ behavioral intentions, and by finding that OHC users’ data vulnerability can negatively affect their psychological comfort and continuance intention. Although studies have devoted great effort to exploring privacy issues in the online health environment, most have focused on the antecedents and outcomes of users’ privacy concerns (Zhang et al., 2018; Xu, 2019). In addition, while research on vulnerability has examined the influence of consumer vulnerability, legal vulnerability, financial vulnerability, and technology vulnerability (Baker et al., 2005; Kim, 2019; O’Connor et al., 2019; Lee, 2020), few studies have focused on the effect of data vulnerability. By integrating the vulnerability and data privacy literature, this work extends the application of the data vulnerability concept to the OHC context and offers a unique angle from which to understand and analyze data privacy issues in the online health environment.

Second, this study applied psychological comfort theory to explain how OHC users’ data vulnerability influences their continuance intention. While studies have suggested that psychological comfort plays a significant role in affecting the behavior of individuals (Akhtar et al., 2019), most have focused on the contexts of mobile applications, online tourism services, and e-commerce (Sutanto et al., 2013; Liang et al., 2018; Robinson, 2018; Yang et al., 2020). In contrast, this study examined users’ psychological comfort in disclosing their personal information in the context of OHCs and found that it negatively mediated the influence of data vulnerability on continuance intention. We therefore enrich the psychological comfort literature and provide a new perspective from which to understand the impact of data vulnerability.

Third, this research examined whether the four institutional assurance approaches of privacy policy, privacy protection technology, industry self-regulation, and government legislation could reduce the negative effect of data vulnerability on psychological comfort. Our results showed that they all positively moderated the relationship between data vulnerability and psychological comfort. Although studies have identified different institutional assurance approaches (Xu et al., 2011; Gong et al., 2019; Yang et al., 2020), no study has considered the influence of privacy policy, privacy protection technology, industry self-regulation, and government legislation simultaneously. Furthermore, most studies have only examined the direct effects of these approaches (Gong et al., 2019; Wang et al., 2019) and overlooked their potential moderating effects. By exploring the mitigating effects of privacy policy, privacy protection technology, industry self-regulation, and government legislation on the relationship between data vulnerability and psychological comfort, this study not only adds to the understanding of institutional assurance mechanisms, but also offers a unique perspective from which to learn how to reduce the negative impact of data vulnerability.

Managerial Contributions

This research also has managerial implications for different OHC stakeholders. First, this study found that privacy policy and privacy protection technology developed by OHC service providers were effective in reducing the negative impact of data vulnerability on psychological comfort. Consequently, we recommend that OHC service providers provide users with privacy policies that contain clear explanations of what personal data will be collected, how these personal data will be used, and what compensation users will receive if the OHC fails to maintain the safety of their personal data (Gong et al., 2019; Zeng et al., 2022). Moreover, OHC service providers should employ advanced privacy protection technology, such as blockchain technology, to protect users’ personal data and earn their trust (Abdellatif et al., 2021). OHC service providers should also inform users, in straightforward and simple language, of the technology used and how it works (Wang et al., 2019).

Second, this research found that industry self-regulation could decrease the negative impact of data vulnerability on psychological comfort. Thus, industry self-regulators are advised to formulate and publish data privacy regulations to protect OHC users against unauthorized data practices (Hemphill and Banerjee, 2021). In this scenario, OHC users are likely to have faith in the OHC industry and transfer their trust to OHC service providers (Xu et al., 2012).

Third, the results of this research also suggest that government legislation can reduce the negative effect of data vulnerability on psychological comfort. Therefore, governments should be aware of the critical role of data vulnerability in deterring individuals from using OHC services (Gong et al., 2019). To alleviate OHC users’ concerns, governments are advised to establish suitable data privacy legal frameworks to regulate OHC service providers’ behavior and provide safe macroenvironments for OHC use (Hong et al., 2021).

Limitations and Future Research

Despite its contributions, this study also has some limitations. First, this research used subjective survey data to test the conceptual model and hypotheses. Future research could collect secondary data on OHCs (e.g., Wei and Hsu, 2022) or adopt more objective research designs to improve the validity of this study and check the research findings. Second, we only focused on a single mediating variable, that is, psychological comfort. Future research could explore other mechanisms by which data vulnerability affects continuance intention in the context of OHCs. Third, this research only examined how to reduce data vulnerability from an institutional assurance perspective. Future studies could consider other possible mitigating factors in the context of OHCs from another perspective. In addition, future research could explore the effects of data vulnerability in other research contexts, especially in relation to data-driven machine learning algorithms (e.g., Kliestik et al., 2022a,b) and cognitive decision-making algorithms (e.g., Andronie et al., 2021; Pelau et al., 2021), which involve a large amount of personal data.

Conclusion

Considering the rapid development of OHCs, it is important for OHCs to understand how certain factors obstruct users’ behaviors and how to mitigate these negative effects. This research explored the influence of OHC users’ data vulnerability on their psychological comfort and continuance intention, and the moderating effects of institutional assurance approaches. First, the results indicated that data vulnerability decreased psychological comfort, while the latter increased continuance intention. Second, the mediation analysis results showed that data vulnerability had a negative indirect effect on continuance intention through psychological comfort. Third, the moderation analysis results demonstrated that the institutional assurance approaches of privacy policy, privacy protection technology, industry self-regulation, and government legislation effectively reduced the negative impact of data vulnerability on psychological comfort.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.

Author Contributions

WG designed the study. HW and NJ collected and analyzed the data. WG, HW, and NJ drafted the manuscript. All authors contributed to the article and approved the submitted version.

Funding

This study was supported by the Fundamental Research Funds for the Central Universities (SWU2109521) and Chongqing Social Science Planning Project (2020BS60).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary Material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpsyg.2022.908309/full#supplementary-material

Footnotes

  1. ^ https://www.dxy.cn/bbs/newweb/pc/home
  2. ^ https://www.haodf.com/
  3. ^ https://www.xywy.com/

References

Abdellatif, A. A., Samara, L., Mohamed, A., Erbad, A., Chiasserini, C. F., Guizani, M., et al. (2021). Medge-chain: Leveraging edge computing and blockchain for efficient medical data exchange. IEEE Intern. Things J. 8, 15762–15775. doi: 10.1109/JIOT.2021.3052910

CrossRef Full Text | Google Scholar

Akhtar, N., Kim, W. G., Ahmad, W., Akhtar, M. N., Siddiqi, U. I., and Riaz, M. (2019). Mechanisms of consumers’ trust development in reviewers’ supplementary reviews: A reviewer-reader similarity perspective. Tour. Manag. Perspect. 31, 95–108. doi: 10.1016/j.tmp.2019.04.001

CrossRef Full Text | Google Scholar

Andronie, M., Lăzăroiu, G., ştefănescu, R., Ionescu, L., and Cocoşatu, M. (2021). Neuromanagement decision-making and cognitive algorithmic processes in the technological adoption of mobile commerce apps. Oeconomia Copernicana 12, 1033–1062. doi: 10.24136/oc.2021.034

CrossRef Full Text | Google Scholar

Baker, S. M., Gentry, J. W., and Rittenburg, T. L. (2005). Building understanding of the domain of consumer vulnerability. J. Macromark. 25, 128–139. doi: 10.1177/0276146705280622

CrossRef Full Text | Google Scholar

Chen, L., Baird, A., and Straub, D. (2019). Fostering participant health knowledge and attitudes: an econometric study of a chronic disease-focused online health community. J. Manag. Inform. Syst. 36, 194–229. doi: 10.1080/07421222.2018.1550547

CrossRef Full Text | Google Scholar

Culnan, M. J. (2019). Policy to Avoid a Privacy Disaster. J. Assoc. Inform. Syst. 20, 848–856. doi: 10.17705/1jais.00554

CrossRef Full Text | Google Scholar

Culnan, M. J., and Bies, R. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. J. Soc. Issues 59, 323–342. doi: 10.1111/1540-4560.00067

CrossRef Full Text | Google Scholar

Dinev, T., McConnell, A. R., and Smith, H. J. (2015). Informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the “APCO” box. Inform. Syst. Res. 26, 639–655. doi: 10.1287/isre.2015.0600

PubMed Abstract | CrossRef Full Text | Google Scholar

Dinev, T., Xu, H., Smith, H. J., and Hart, P. J. (2013). Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts. Eur. J. Inform. Syst. 22, 295–316. doi: 10.1057/ejis.2012.23

CrossRef Full Text | Google Scholar

Duan, X., and Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun. Magaz. 53, 28–35. doi: 10.1109/MCOM.2015.7081072

CrossRef Full Text | Google Scholar

Esmaeilzadeh, P. (2020a). The effect of the privacy policy of health information exchange (HIE) on patients’ information disclosure intention. Comput. Security 95:101819. doi: 10.1016/j.cose.2020.101819

CrossRef Full Text | Google Scholar

Esmaeilzadeh, P. (2020b). The impacts of the privacy policy on individual trust in health information exchanges (HIEs). Int. Res. 30, 811–843. doi: 10.1108/INTR-01-2019-0003

CrossRef Full Text | Google Scholar

Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res. 18, 39–50. doi: 10.1177/002224378101800104

CrossRef Full Text | Google Scholar

Glavas, C., Letheren, K., Russell-Bennett, R., McAndrew, R., and Bedggood, R. E. (2020). Exploring the resources associated with consumer vulnerability: Designing nuanced retail hardship programs. J. Retail. Consum. Serv. 57:102212. doi: 10.1016/j.jretconser.2020.102212

CrossRef Full Text | Google Scholar

Gong, X., Zhang, K. Z. K., Chen, C., Cheung, C. M. K., and Lee, M. K. O. (2019). What drives self-disclosure in mobile payment applications? The effect of privacy assurance approaches, network externality, and technology complementarity. Inform. Technol. People 33, 1174–1213. doi: 10.1108/ITP-03-2018-0132

CrossRef Full Text | Google Scholar

Goode, S., Hoehle, H., Venkatesh, V., and Brown, S. A. (2017). User compensation as a data breach recovery action: An investigation of the sony playstation network breach. MIS Q. 41, 703–727. doi: 10.25300/MISQ/2017/41.3.03

CrossRef Full Text | Google Scholar

Guo, Y., Wang, X., and Wang, C. (2022). Impact of privacy policy content on perceived effectiveness of privacy policy: the role of vulnerability, benevolence and privacy concern. J. Enterp. Inform. Manag. 35, 774–795. doi: 10.1108/JEIM-12-2020-0481

CrossRef Full Text | Google Scholar

Hemphill, T. A., and Banerjee, S. (2021). Facebook and self-regulation: Efficacious proposals-Or ‘smoke-and-mirrors’? Technol. Soc. 67:101797. doi: 10.1016/j.techsoc.2021.101797

CrossRef Full Text | Google Scholar

Hong, W., Chan, F. K., and Thong, J. Y. (2021). Drivers and inhibitors of internet privacy concern: a multidimensional development theory perspective. J. Business Ethics 168, 539–564. doi: 10.1007/s10551-019-04237-1

CrossRef Full Text | Google Scholar

Hua, J., Zhu, H., Wang, F., Liu, X., Lu, R., Li, H., et al. (2019). CINEMA: Efficient and privacy-preserving online medical primary diagnosis with skyline query. IEEE Intern. Things J. 6, 1450–1461. doi: 10.1109/JIOT.2018.2834156

CrossRef Full Text | Google Scholar

James, T. L., Calderon, E. D. V., Bélanger, F., and Lowry, P. B. (2022). The mediating role of group dynamics in shaping received social support from active and passive use in online health communities. Inform. Manag. 59:103606. doi: 10.1016/j.im.2022.103606

CrossRef Full Text | Google Scholar

Karwatzki, S., Dytynko, O., Trenz, M., and Veit, D. (2017). Beyond the personalization-privacy paradox: privacy valuation, transparency features, and service personalization. J. Manag. Inform. Syst. 34, 369–400. doi: 10.1080/07421222.2017.1334467

CrossRef Full Text | Google Scholar

Kim, J. (2019). Customers’ value co-creation with healthcare service network partners: The moderating effect of consumer vulnerability. J. Serv. Theor. Pract. 29, 309–328. doi: 10.1108/JSTP-08-2018-0178

CrossRef Full Text | Google Scholar

Kim, K.-H., Kim, K.-J., Lee, D.-H., and Kim, M.-G. (2019). Identification of critical quality dimensions for continuance intention in mHealth services: Case study of onecare service. Int. J. Inform. Manag. 46, 187–197. doi: 10.1016/j.ijinfomgt.2018.12.008

CrossRef Full Text | Google Scholar

Kliestik, T., Kovalova, E., and Lăzăroiu, G. (2022a). Cognitive decision-making algorithms in data-driven retail intelligence: Consumer sentiments, choices, and shopping behaviors. J. Self Govern. Manag. Econ. 10, 30–42. doi: 10.22381/jsme1012022

CrossRef Full Text | Google Scholar

Kliestik, T., Zvarikova, K., and Lãzãroiu, G. (2022b). Data-driven machine learning and neural network algorithms in the retailing environment: Consumer engagement, experience, and purchase behaviors. Econ. Manag. Financial Markets 17, 57–69. doi: 10.22381/emfm17120224

CrossRef Full Text | Google Scholar

Lee, H. (2020). Home IoT resistance: Extended privacy and vulnerability perspective. Telematics Inform. 49:101377. doi: 10.1016/j.tele.2020.101377

CrossRef Full Text | Google Scholar

Liang, L. J., Choi, H. C., and Joppe, M. (2018). Exploring the relationship between satisfaction, trust and switching intention, repurchase intention in the context of Airbnb. Int. J. Hospitality Manag. 69, 41–48. doi: 10.1016/j.ijhm.2017.10.015

CrossRef Full Text | Google Scholar

Lindell, M. K., and Whitney, D. J. (2001). Accounting for common method variance in cross-sectional research designs. J. Appl. Psychol. 86, 114–121. doi: 10.1037/0021-9010.86.1.114

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, B., Pavlou, P. A., and Cheng, X. (2022). Achieving a balance between privacy protection and data collection: A field experimental examination of a theory-driven information technology solution. Inform. Syst. Res. 33, 203–223. doi: 10.1287/isre.2021.1045

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, S., Xiao, W., Fang, C., Zhang, X., and Lin, J. (2020). Social support, belongingness, and value co-creation behaviors in online health communities. Telematics Inform. 50:101398. doi: 10.1016/j.tele.2020.101398

CrossRef Full Text | Google Scholar

Liu, W., Chen, X., Lu, X., and Fan, X. (2021). Exploring the Relationship Between Users’ Psychological Contracts and Their Knowledge Contribution in Online Health Communities. Front. Psychol. 2021:612030. doi: 10.3389/fpsyg.2021.612030

PubMed Abstract | CrossRef Full Text | Google Scholar

Liyanaarachchi, G. (2021). Managing privacy paradox through national culture: Reshaping online retailing strategy. J. Retail. Consumer Serv. 60:102500. doi: 10.1016/j.jretconser.2021.102500

CrossRef Full Text | Google Scholar

Liyanaarachchi, G., Deshpande, S., and Weaven, S. (2021). Market-oriented corporate digital responsibility to manage data vulnerability in online banking. Int. J. Bank Market. 39, 571–591. doi: 10.1108/IJBM-06-2020-0313

CrossRef Full Text | Google Scholar

Mahmood, F. J., and Tayib, A. Y. (2021). Healing environment correlated with patients’ psychological comfort: Post-occupancy evaluation of general hospitals. Indoor Built Environ. 30, 180–194. doi: 10.1177/1937586719894549

PubMed Abstract | CrossRef Full Text | Google Scholar

Mamonov, S., and Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Comput. Hum. Behav. 83, 32–44. doi: 10.1016/j.chb.2018.01.028

CrossRef Full Text | Google Scholar

Martin, K. D., Borah, A., and Palmatier, R. W. (2017). Data Privacy: Effects on Customer and Firm Performance. J. Market. 81, 36–58. doi: 10.1509/jm.15.0497

PubMed Abstract | CrossRef Full Text | Google Scholar

Martínez-Navalón, J. G., Gelashvili, V., and Gómez-Ortega, A. (2021). Evaluation of user satisfaction and trust of review platforms: Analysis of the impact of privacy and E-WOM in the case of TripAdvisor. Front. Psychol. 12:750527. doi: 10.3389/fpsyg.2021.750527

PubMed Abstract | CrossRef Full Text | Google Scholar

Maxwell, S., and Grupac, M. (2021). Virtual care technologies, wearable health monitoring sensors, and internet of medical things-based smart disease surveillance systems in the diagnosis and treatment of COVID-19 patients. Am. J. Med. Res. 8, 118–131. doi: 10.22381/ajmr8220219

CrossRef Full Text | Google Scholar

McKinsey (2020). How COVID-19 changes the game for biopharma in China. https://www.mckinsey.com/industries/life-sciences/our-insights/how-covid-19-changes-the-game-for-biopharma-in-china (accessed April 24, 2020).

Google Scholar

McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: an integrative typology. Inform. Syst. Res. 13, 334–359. doi: 10.1287/isre.13.3.334.81

PubMed Abstract | CrossRef Full Text | Google Scholar

Mohr, H., and Walter, Z. (2019). Formation of consumers’ perceived information security: examining the transfer of trust in online retailers. Inform. Syst. Front. 21, 1231–1250. doi: 10.1007/s10796-019-09961-7

CrossRef Full Text | Google Scholar

Mombeuil, C., and Uhde, H. (2021). Relative convenience, relative advantage, perceived security, perceived privacy, and continuous use intention of China’s WeChat Pay: A mixed-method two-phase design study. J. Retail. Consum. Services 59:102384. doi: 10.1016/j.jretconser.2020.102384

CrossRef Full Text | Google Scholar

Mutimukwe, C., Kolkowska, E., and Grönlund, Å (2020). Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Govern. Inform. Q. 37:101413. doi: 10.1016/j.giq.2019.101413

CrossRef Full Text | Google Scholar

Nikkhah, H. R., and Sabherwal, R. (2021). Information disclosure willingness and mobile cloud computing collaboration apps: the impact of security and assurance mechanisms. Inform. Technol. People [Epub ahead of print]. doi: 10.1108/ITP-12-2019-0630

CrossRef Full Text | Google Scholar

O’Connor, G. E., Newmeyer, C. E., Wong, N. Y. C., Bayuk, J. B., Cook, L. A., Komarova, Y., et al. (2019). Conceptualizing the multiple dimensions of consumer financial vulnerability. J. Bus. Res. 100, 421–430. doi: 10.1016/j.jbusres.2018.12.033

CrossRef Full Text | Google Scholar

Otterbring, T., Wu, F., and Kristensson, P. (2021). Too close for comfort? The impact of salesperson-customer proximity on consumers’ purchase behavior. Psychol. Market. 38, 1576–1590. doi: 10.1002/mar.21519

CrossRef Full Text | Google Scholar

Pelau, C., Dabija, D. C., and Ene, I. (2021). What makes an AI device human-like? The role of interaction quality, empathy and perceived psychological anthropomorphic characteristics in the acceptance of artificial intelligence in the service industry. Comput. Hum. Behav. 122:106855. doi: 10.1016/j.chb.2021.106855

CrossRef Full Text | Google Scholar

Radia, K. N., Purohit, S., Desai, S., and Nenavani, J. (2022). Psychological comfort in service relationships: A mixed-method approach. J. Retail. Consumer Serv. 64:102824. doi: 10.1016/j.jretconser.2021.102824

CrossRef Full Text | Google Scholar

Robinson, S. C. (2018). Factors predicting attitude toward disclosing personal data online. J. Organizational Comput. Elect. Commerce 28, 214–233. doi: 10.1080/10919392.2018.1482601

CrossRef Full Text | Google Scholar

Shao, M., Zhao, X., and Li, Y. (2022). User engagement and user loyalty under different online healthcare community incentives: An experimental study. Front. Psychol. 13:903186. doi: 10.3389/fpsyg.2022.903186

PubMed Abstract | CrossRef Full Text | Google Scholar

Slepchuk, A. N., Milne, G. R., and Swani, K. (2022). Overcoming privacy concerns in consumers’ use of health information technologies: A justice framework. J. Bus. Res. 141, 782–793. doi: 10.1016/j.jbusres.2021.11.073

CrossRef Full Text | Google Scholar

Smith, N. C., and Cooper-Martin, E. (1997). Ethics and target marketing: the role of product harm and consumer vulnerability. J. Market. 61, 1–20. doi: 10.1177/002224299706100301

CrossRef Full Text | Google Scholar

Spake, D. F., Beatty, S. E., Brockman, B. K., and Crutchfield, T. N. (2003). Consumer comfort in service relationships: Measurement and importance. J. Service Res. 5, 316–332. doi: 10.1177/1094670503005004004

CrossRef Full Text | Google Scholar

Sun, S., Zhang, J., Zhu, Y., Jiang, M., and Chen, S. (2022). Exploring users’ willingness to disclose personal information in online healthcare communities: The role of satisfaction. Technol. Forecast. Soc. Change 178:121596. doi: 10.1016/j.techfore.2022.121596

CrossRef Full Text | Google Scholar

Sutanto, J., Palme, E., Tan, C.-H., and Phang, C. W. (2013). Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. Manag. Inform. Syst. Q. 37, 1141–1164. doi: 10.25300/MISQ/2013/37.4.07

CrossRef Full Text | Google Scholar

Tsai, Y. T., and Tiwasing, P. (2021). Customers’ intention to adopt smart lockers in last-mile delivery service: A multi-theory perspective. J. Retail. Consumer Services 61:102514. doi: 10.1016/j.jretconser.2021.102514

CrossRef Full Text | Google Scholar

Tseng, H. T., Ibrahim, F., Hajli, N., Nisar, T. M., and Shabbir, H. (2022). Effect of privacy concerns and engagement on social support behaviour in online health community platforms. Technol. Forecast. Soc. Change 178:121592. doi: 10.1016/j.techfore.2022.121592

PubMed Abstract | CrossRef Full Text | Google Scholar

Turner, D., and Pera, A. (2021). Wearable internet of medical things sensor devices, big healthcare data, and artificial intelligence-based diagnostic algorithms in real-time covid-19 detection and monitoring systems. Am. J. Med. Res. 8, 132–145. doi: 10.22381/ajmr82202110

CrossRef Full Text | Google Scholar

Van der Schyff, K., Flowerday, S., and Furnell, S. (2020). Privacy risk and the use of Facebook apps: A gender-focused vulnerability assessment. Comput. Security 96:101866. doi: 10.1016/j.cose.2020.101866

CrossRef Full Text | Google Scholar

Virlée, J., van Riel, A. C., and Hammedi, W. (2020). Health literacy and its effects on well-being: how vulnerable healthcare service users integrate online resources. J. Serv. Market. 34, 697–715. doi: 10.1108/JSM-02-2019-0057

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, B., and Li, Z. (2021). Healthchain: A privacy protection system for medical data based on blockchain. Future Intern. 13:247. doi: 10.3390/fi13100247

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, L., Sun, Z., Dai, X., Zhang, Y., and Hu, H. (2019). Retaining users after privacy invasions. Inform. Technol. People 32, 1679–1703. doi: 10.1108/ITP-01-2018-0020

CrossRef Full Text | Google Scholar

Warner, M., and Wang, V. (2019). Self-censorship in social networking sites (SNSs)-privacy concerns, privacy awareness, perceived vulnerability and information management. J. Inform. Commun. Ethics Soc. 17, 375–394. doi: 10.1108/JICES-07-2018-0060

CrossRef Full Text | Google Scholar

Wei, X., and Hsu, Y. T. (2022). Extracting additional influences from physician profiles with topic modeling: impact on ratings and page views in online healthcare communities. Front. Psychol. 13:830841. doi: 10.3389/fpsyg.2022.830841

PubMed Abstract | CrossRef Full Text | Google Scholar

Wu, B., Luo, P., Li, M., and Hu, X. (2022). The impact of health information privacy concerns on engagement and payment behaviors in online health communities. Front. Psychol. 13:861903. doi: 10.3389/fpsyg.2022.861903

PubMed Abstract | CrossRef Full Text | Google Scholar

Xu, H., Dinev, T., Smith, H. J., and Hart, P. J. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. J. Assoc. Inform. Syst. 12, 798–824. doi: 10.17705/1jais.00281

CrossRef Full Text | Google Scholar

Xu, H., Teo, H.-H., Tan, B., and Agarwal, R. (2009). The Role of Push-Pull Technology in Privacy Calculus. J. Manag. Inform. Syst. 26, 135–174. doi: 10.2753/MIS0742-1222260305

CrossRef Full Text | Google Scholar

Xu, H., Teo, H.-H., Tan, B. C. Y., and Agarwal, R. (2012). Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Inform. Syst. Res. 23, 1342–1363. doi: 10.1287/isre.1120.0416

PubMed Abstract | CrossRef Full Text | Google Scholar

Xu, Z. (2019). An empirical study of patients’ privacy concerns for health informatics as a service. Technol. Forecast. Soc. Change 143, 297–306. doi: 10.1016/j.techfore.2019.01.018

CrossRef Full Text | Google Scholar

Yang, Q., Gong, X., Zhang, K. Z. K., Liu, H., and Lee, M. K. O. (2020). Self-disclosure in mobile payment applications: Common and differential effects of personal and proxy control enhancing mechanisms. Int. J. Inform. Manag. 52:102065. doi: 10.1016/j.ijinfomgt.2019.102065

CrossRef Full Text | Google Scholar

Zeng, F., Ye, Q., Yang, Z., Li, J., and Song, Y. A. (2022). Which privacy policy works, privacy assurance or personalization declaration? An investigation of privacy policies and privacy concerns. J. Bus. Ethics 176, 781–798. doi: 10.1007/s10551-020-04626-x

CrossRef Full Text | Google Scholar

Zhang, X., Dong, X., Xu, X., Guo, J., and Guo, F. (2021). What influences physicians’ online knowledge sharing? A stimulus-response perspective. Front. Psychol. 12:808432. doi: 10.3389/fpsyg.2021.808432

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., and Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Inform. Manag. 55, 482–493. doi: 10.1016/j.im.2017.11.003

CrossRef Full Text | Google Scholar

Zhao, L., Lu, Y., and Gupta, S. (2012). Disclosure Intention of Location-Related Information in Location-Based Social Network Services. Int. J. Elect. Commerce 16, 53–90. doi: 10.2753/JEC1086-4415160403

CrossRef Full Text | Google Scholar

Zhao, X., Lynch, J. G. Jr., and Chen, Q. (2010). Reconsidering Baron and Kenny: Myths and truths about mediation analysis. J. Consumer Res. 37, 197–206. doi: 10.1086/651257

CrossRef Full Text | Google Scholar

Zhou, T. (2020). Understanding users’ participation in online health communities: A social capital perspective. Inform. Dev. 36, 403–413. doi: 10.1177/0266666919864620

CrossRef Full Text | Google Scholar

Keywords: data vulnerability, psychological comfort, institutional assurance approach, online health communities, continuance intention

Citation: Gao W, Wang H and Jiang N (2022) The Impact of Data Vulnerability in Online Health Communities: An Institutional Assurance Perspective. Front. Psychol. 13:908309. doi: 10.3389/fpsyg.2022.908309

Received: 30 March 2022; Accepted: 06 June 2022;
Published: 29 June 2022.

Edited by:

George Lazaroiu, Spiru Haret University, Romania

Reviewed by:

Luminita Ionescu, Spiru Haret University, Romania
Kuo-Lun Hsiao, National Taichung University of Science and Technology, Taiwan
Kwame Simpe Ofori, International University of Grand-Bassam, Côte d’Ivoire

Copyright © 2022 Gao, Wang and Jiang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Huiling Wang, dmFub3Jhd29uZ0AxMjYuY29t

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.