{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:06Z","timestamp":1750309326966,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,20]]},"DOI":"10.1145\/3605390.3605417","type":"proceedings-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T22:22:36Z","timestamp":1694730156000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Share or Protect: Understanding the Interplay of Trust, Privacy Concerns, and Data Sharing Purposes in Health and Well-Being Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7384-4552","authenticated-orcid":false,"given":"Agnieszka","family":"Kitkowska","sequence":"first","affiliation":[{"name":"J\u00f6nk\u00f6ping University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2823-3837","authenticated-orcid":false,"given":"Farzaneh","family":"Karegar","sequence":"additional","affiliation":[{"name":"Karlstad University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8102-8168","authenticated-orcid":false,"given":"Erik","family":"W\u00e4stlund","sequence":"additional","affiliation":[{"name":"Karlstad University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1186\/s12910-016-0153-x"},{"key":"e_1_3_2_1_2_1","first-page":"109","article-title":"Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study","volume":"1","author":"Anderson Bonnie\u00a0Brinton","year":"2015","unstructured":"Bonnie\u00a0Brinton Anderson , C\u00a0Brock Kirwan , David Eargle , Scott\u00a0 R Jensen , and Anthony Vance . 2015 . Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study . Journal of Cybersecurity 1 , 1 (2015), 109 \u2013 120 . Bonnie\u00a0Brinton Anderson, C\u00a0Brock Kirwan, David Eargle, Scott\u00a0R Jensen, and Anthony Vance. 2015. Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study. Journal of Cybersecurity 1, 1 (2015), 109\u2013120.","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_2_1_3_1","volume-title":"Fake news and COVID-19: modelling the predictors of fake news sharing among social media users. Telematics and Informatics 56","author":"Apuke Destiny\u00a0Oberiri","year":"2021","unstructured":"Destiny\u00a0Oberiri Apuke and Bahiyah Omar . 2021. Fake news and COVID-19: modelling the predictors of fake news sharing among social media users. Telematics and Informatics 56 ( 2021 ). Destiny\u00a0Oberiri Apuke and Bahiyah Omar. 2021. Fake news and COVID-19: modelling the predictors of fake news sharing among social media users. Telematics and Informatics 56 (2021)."},{"unstructured":"American\u00a0Psychological Association. 2023. APA Dictionary of Psychology. https:\/\/dictionary.apa.org\/latent-variables  American\u00a0Psychological Association. 2023. APA Dictionary of Psychology. https:\/\/dictionary.apa.org\/latent-variables","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1080\/08874417.2016.1232981"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.dss.2015.01.009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.dss.2010.01.010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1002\/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1177\/0165551516653590"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1177\/20552076221089798"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.jebo.2011.06.007"},{"key":"e_1_3_2_1_12_1","volume-title":"Fitness App Revenue and Usage Statistics","author":"Curry David","year":"2023","unstructured":"David Curry . 2023. Fitness App Revenue and Usage Statistics ( 2023 ). https:\/\/www.businessofapps.com\/data\/fitness-app-market\/. Accessed : 2023-02-01. David Curry. 2023. Fitness App Revenue and Usage Statistics (2023). https:\/\/www.businessofapps.com\/data\/fitness-app-market\/. Accessed: 2023-02-01."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.2753\/JEC1086-4415100201"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1287\/isre.2015.0600"},{"key":"e_1_3_2_1_15_1","volume-title":"The His and Hers of Prosocial Behavior: An Examination of the Social Psychology of Gender. American Psychologist","author":"Eagly H.","year":"2009","unstructured":"Alice\u00a0 H. Eagly . 2009. The His and Hers of Prosocial Behavior: An Examination of the Social Psychology of Gender. American Psychologist ( 2009 ), 644\u2013658. Alice\u00a0H. Eagly. 2009. The His and Hers of Prosocial Behavior: An Examination of the Social Psychology of Gender. American Psychologist (2009), 644\u2013658."},{"key":"e_1_3_2_1_16_1","volume-title":"Eagly and Wendy Wood","author":"H.","year":"2012","unstructured":"Alice\u00a0 H. Eagly and Wendy Wood . 2012 . Social Role Theory. In Handbook of theories of social psychology. Alice\u00a0H. Eagly and Wendy Wood. 2012. Social Role Theory. In Handbook of theories of social psychology."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/S1574-0722(07)00113-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.2196\/31170"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Directive 2016\/680 of the European Parlement and the Council of the European Union","volume":"2014","author":"Union European","year":"2016","unstructured":"European Union . 2016 . Directive 2016\/680 of the European Parlement and the Council of the European Union . Official Journal of the European Communities 2014 (2016), 1 \u2013 43 . Issue April. European Union. 2016. Directive 2016\/680 of the European Parlement and the Council of the European Union. Official Journal of the European Communities 2014 (2016), 1\u201343. Issue April.","journal-title":"Official Journal of the European Communities"},{"unstructured":"European Union. 2022. Proposal for a Regulation of the European Parliament and of the Council on harmonised rules on fair access to and use of data (Data Act).  European Union. 2022. Proposal for a Regulation of the European Parliament and of the Council on harmonised rules on fair access to and use of data (Data Act).","key":"e_1_3_2_1_20_1"},{"unstructured":"European Union. 2022. REGULATION (EU) 2022\/868 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 30 May 2022 on European data governance and amending Regulation (EU) 2018\/1724 (Data Governance Act). (2022).  European Union. 2022. REGULATION (EU) 2022\/868 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 30 May 2022 on European data governance and amending Regulation (EU) 2018\/1724 (Data Governance Act). (2022).","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Overview. Retrieved","author":"Union European","year":"2023","unstructured":"European Union . NA. e Health : Digital health and care . Overview. Retrieved March 20, 2023 from https:\/\/health.ec.europa.eu\/ehealth-digital-health-and-care\/overview_en European Union. NA. eHealth: Digital health and care. Overview. Retrieved March 20, 2023 from https:\/\/health.ec.europa.eu\/ehealth-digital-health-and-care\/overview_en"},{"key":"e_1_3_2_1_23_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris . 2019 . A self-report measure of end-user security attitudes (SA-6) . In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019). Cori Faklaris. 2019. A self-report measure of end-user security attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/s10796-020-10053-0"},{"unstructured":"Stephen Franzoi. 2016. Social Psychology. BVT Publishing.  Stephen Franzoi. 2016. Social Psychology. BVT Publishing.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3491102.3517504"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/3313831.3376651"},{"key":"e_1_3_2_1_28_1","volume-title":"Psychology: The science of mind and behaviour","author":"Gross Richard","year":"2012","unstructured":"Richard Gross . 2012 . Psychology: The science of mind and behaviour 6 th Edition. Hachette UK. Richard Gross. 2012. Psychology: The science of mind and behaviour 6th Edition. Hachette UK.","edition":"6"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security","author":"Habib Hana","year":"2018","unstructured":"Hana Habib , Jessica Colnago , Vidya Gopalakrishnan , Sarah Pearman , Jeremy Thomas , Alessandro Acquisti , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2018 . Away from Prying Eyes: Analyzing Usage and Understanding of Private Browsing . In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security ( Baltimore, MD, USA) (SOUPS \u201918). USENIX Association, USA, 159\u2013175. Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2018. Away from Prying Eyes: Analyzing Usage and Understanding of Private Browsing. In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (Baltimore, MD, USA) (SOUPS \u201918). USENIX Association, USA, 159\u2013175."},{"key":"e_1_3_2_1_30_1","volume-title":"Gender Differences in Risk Assessment : Why do Women Take Fewer Risks than Men ?Judgment and Decision Making 1, 1","author":"Harris R.","year":"2006","unstructured":"Christine\u00a0 R. Harris , Michael Jenkins , and Dale Glaser . 2006. Gender Differences in Risk Assessment : Why do Women Take Fewer Risks than Men ?Judgment and Decision Making 1, 1 ( 2006 ), 48\u201363. Christine\u00a0R. Harris, Michael Jenkins, and Dale Glaser. 2006. Gender Differences in Risk Assessment : Why do Women Take Fewer Risks than Men ?Judgment and Decision Making 1, 1 (2006), 48\u201363."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.2196\/11671"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1080\/00273171.2014.962683"},{"key":"e_1_3_2_1_33_1","volume-title":"Digital Nudging for Online Social Sharing: Evidence from A Randomized Field Experiment. 9","author":"Huang Ni","year":"2018","unstructured":"Ni Huang , Yili Hong , Pei-Yu Chen , and Shin-Yi Wu. 2018. Digital Nudging for Online Social Sharing: Evidence from A Randomized Field Experiment. 9 ( 2018 ), 1483\u20131491. https:\/\/scholarspace.manoa.hawaii.edu\/bitstream\/10125\/50072\/1\/paper0185.pdf Ni Huang, Yili Hong, Pei-Yu Chen, and Shin-Yi Wu. 2018. Digital Nudging for Online Social Sharing: Evidence from A Randomized Field Experiment. 9 (2018), 1483\u20131491. https:\/\/scholarspace.manoa.hawaii.edu\/bitstream\/10125\/50072\/1\/paper0185.pdf"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1146\/annurev-psych-010213-115057"},{"key":"e_1_3_2_1_35_1","volume-title":"Privacy Theater: Why Social Networks Only Pretend To Protect You. https:\/\/techcrunch.com\/2009\/12\/27\/privacy-theater\/","author":"Khare Rohit","year":"2022","unstructured":"Rohit Khare . 2022 . Privacy Theater: Why Social Networks Only Pretend To Protect You. https:\/\/techcrunch.com\/2009\/12\/27\/privacy-theater\/ Rohit Khare. 2022. Privacy Theater: Why Social Networks Only Pretend To Protect You. https:\/\/techcrunch.com\/2009\/12\/27\/privacy-theater\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/3025453.3025556"},{"volume-title":"Modern socio-technical perspectives on privacy","author":"Knijnenburg P","unstructured":"Bart\u00a0 P Knijnenburg , Xinru Page , Pamela Wisniewski , Heather\u00a0Richter Lipford , Nicholas Proferes , and Jennifer Romano . 2022. Modern socio-technical perspectives on privacy . Springer Nature . Bart\u00a0P Knijnenburg, Xinru Page, Pamela Wisniewski, Heather\u00a0Richter Lipford, Nicholas Proferes, and Jennifer Romano. 2022. Modern socio-technical perspectives on privacy. Springer Nature.","key":"e_1_3_2_1_37_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.3389\/fpsyg.2013.00863"},{"key":"e_1_3_2_1_39_1","volume-title":"Elizabeth Austin","author":"Lavallee C.","year":"2020","unstructured":"Danielle\u00a0 C. Lavallee , Jenney\u00a0 R. Lee , Elizabeth Austin , Richard Bloch, Sarah\u00a0O. Lawrence, Debbe McCall, Sean\u00a0A. Munson, Mara\u00a0B. Nery-Hurwit, and Dagmar Amtmann. 2020 . mHealth and patient generated health data: stakeholder perspectives on opportunities and barriers for transforming healthcare. Mhealth 6 (2020). Danielle\u00a0C. Lavallee, Jenney\u00a0R. Lee, Elizabeth Austin, Richard Bloch, Sarah\u00a0O. Lawrence, Debbe McCall, Sean\u00a0A. Munson, Mara\u00a0B. Nery-Hurwit, and Dagmar Amtmann. 2020. mHealth and patient generated health data: stakeholder perspectives on opportunities and barriers for transforming healthcare. Mhealth 6 (2020)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.2478\/popets-2021-0052"},{"key":"e_1_3_2_1_41_1","volume-title":"Modeling users","author":"Lin Jialiu","year":"2014","unstructured":"Jialiu Lin , Bin Liu , Norman Sadeh , and Jason\u00a0 I Hong . 2014. Modeling users \u2019 mobile app privacy preferences: Restoring usability in a sea of permission settings. ( 2014 ). Jialiu Lin, Bin Liu, Norman Sadeh, and Jason\u00a0I Hong. 2014. Modeling users\u2019 mobile app privacy preferences: Restoring usability in a sea of permission settings. (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1111\/j.1751-9004.2010.00320.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1016\/j.chb.2014.06.015"},{"key":"e_1_3_2_1_44_1","volume-title":"Internet users","author":"Malhotra K.","year":"2004","unstructured":"Naresh\u00a0 K. Malhotra , Sung\u00a0 S. Kim , and James Agarwal . 2004. Internet users \u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 ( 2004 ), 336\u2013355. Naresh\u00a0K. Malhotra, Sung\u00a0S. Kim, and James Agarwal. 2004. Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336\u2013355."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1093\/hcr"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.2196\/17046"},{"unstructured":"OECD. 2022. Recommendation of the Council on Enhancing Access to and Sharing of Data. http:\/\/legalinstruments.oecd.org  OECD. 2022. Recommendation of the Council on Enhancing Access to and Sharing of Data. http:\/\/legalinstruments.oecd.org","key":"e_1_3_2_1_47_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1016\/j.chb.2015.04.011"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1093\/jamia"},{"key":"e_1_3_2_1_50_1","volume-title":"A qualitative study of user perceptions of mobile health apps. BMC public health 16, 1","author":"Peng Wei","year":"2016","unstructured":"Wei Peng , Shaheen Kanthawala , Shupei Yuan , and Syed\u00a0Ali Hussain . 2016. A qualitative study of user perceptions of mobile health apps. BMC public health 16, 1 ( 2016 ), 1\u201311. Wei Peng, Shaheen Kanthawala, Shupei Yuan, and Syed\u00a0Ali Hussain. 2016. A qualitative study of user perceptions of mobile health apps. BMC public health 16, 1 (2016), 1\u201311."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1007\/s10796-017-9821-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/2381966.2381983"},{"key":"e_1_3_2_1_53_1","volume-title":"Until you have something to lose! Loss aversion and two-factor authentication adoption. Applied Computing and Informaticsahead-of-print","author":"Pratama R","year":"2021","unstructured":"Ahmad\u00a0 R Pratama and Firman\u00a0 M Firmansyah . 2021. Until you have something to lose! Loss aversion and two-factor authentication adoption. Applied Computing and Informaticsahead-of-print ( 2021 ). Ahmad\u00a0R Pratama and Firman\u00a0M Firmansyah. 2021. Until you have something to lose! Loss aversion and two-factor authentication adoption. Applied Computing and Informaticsahead-of-print (2021)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1145\/1978942.1978945"},{"key":"e_1_3_2_1_55_1","volume-title":"USENIX Security Symposium. 143\u2013157","author":"Rashidi Yasmeen","year":"2018","unstructured":"Yasmeen Rashidi , Tousif Ahmed , Felicia Patel , Emily Fath , Apu Kapadia , Christena Nippert-Eng , and Norman\u00a0Makoto Su . 2018 . \" You don\u2019t want to be the next meme\": College Students\u2019 Workarounds to Manage Privacy in the Era of Pervasive Photography.. In SOUPS@ USENIX Security Symposium. 143\u2013157 . Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman\u00a0Makoto Su. 2018. \" You don\u2019t want to be the next meme\": College Students\u2019 Workarounds to Manage Privacy in the Era of Pervasive Photography.. In SOUPS@ USENIX Security Symposium. 143\u2013157."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.2196\/jmir.7740"},{"unstructured":"Nicholas Rizzo. 2021. 100+ Fitness App Statistics 2021\/2022 [Research Review]. https:\/\/runrepeat.com\/fitness-app-statistics. Accessed: 2023-02-01.  Nicholas Rizzo. 2021. 100+ Fitness App Statistics 2021\/2022 [Research Review]. https:\/\/runrepeat.com\/fitness-app-statistics. Accessed: 2023-02-01.","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS","author":"Samat Sonam","year":"2017","unstructured":"Sonam Samat and Alessandro Acquisti . 2017 . Format vs. content: the impact of risk and presentation on disclosure decisions . In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017). 377\u2013384. Sonam Samat and Alessandro Acquisti. 2017. Format vs. content: the impact of risk and presentation on disclosure decisions. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017). 377\u2013384."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.3389\/fpsyg.2019.00813"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1108\/01443580710830989"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.3389\/fpubh.2021.641424"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1016\/j.healthpol.2019.03.012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.2307\/249477"},{"key":"e_1_3_2_1_64_1","first-page":"989","article-title":"Information Privacy Research","author":"Smith H.","year":"2011","unstructured":"Jeff\u00a0 H. Smith , Tamara Dinev , and Heng Xu . 2011 . Information Privacy Research : An Interdisciplinary Review. MIS Quarterly 35 , December (2011), 989 \u2013 1015 . Jeff\u00a0H. Smith, Tamara Dinev, and Heng Xu. 2011. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, December (2011), 989\u20131015.","journal-title":"An Interdisciplinary Review. MIS Quarterly 35"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.12688\/wellcomeopenres.13531.1"},{"key":"e_1_3_2_1_66_1","volume-title":"Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. arXiv preprint arXiv:2301.06534","author":"Tahaei Mohammad","year":"2023","unstructured":"Mohammad Tahaei , Ruba Abu-Salma , and Awais Rashid . 2023. Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. arXiv preprint arXiv:2301.06534 ( 2023 ). Mohammad Tahaei, Ruba Abu-Salma, and Awais Rashid. 2023. Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. arXiv preprint arXiv:2301.06534 (2023)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1145\/2556288.2557400"},{"unstructured":"Sensor Tower. 2022. The State of Health & Fitness Apps in Europe-An Analysis of Mobile Health & Fitness App Market Trends in Europe.  Sensor Tower. 2022. The State of Health & Fitness Apps in Europe-An Analysis of Mobile Health & Fitness App Market Trends in Europe.","key":"e_1_3_2_1_68_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1057\/s41599-020-00641-5"},{"key":"e_1_3_2_1_70_1","volume-title":"AMIA Annual Symposium Proceedings, Vol.\u00a02020","author":"Turner M","year":"2020","unstructured":"Anne\u00a0 M Turner , Thomas Engelsma , Jean\u00a0 O Taylor , Rashmi\u00a0 K Sharma , and George Demiris . 2020 . Recruiting older adult participants through crowdsourcing platforms: Mechanical Turk versus Prolific Academic . In AMIA Annual Symposium Proceedings, Vol.\u00a02020 . American Medical Informatics Association, 1230. Anne\u00a0M Turner, Thomas Engelsma, Jean\u00a0O Taylor, Rashmi\u00a0K Sharma, and George Demiris. 2020. Recruiting older adult participants through crowdsourcing platforms: Mechanical Turk versus Prolific Academic. In AMIA Annual Symposium Proceedings, Vol.\u00a02020. American Medical Informatics Association, 1230."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_3_2_1_72_1","volume-title":"2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 397\u2013414","author":"Wei Miranda","year":"2022","unstructured":"Miranda Wei , Pardis Emami-Naeini , Franziska Roesner , and Tadayoshi Kohno . 2022 . Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy . In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 397\u2013414 . Miranda Wei, Pardis Emami-Naeini, Franziska Roesner, and Tadayoshi Kohno. 2022. Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 397\u2013414."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_73_1","DOI":"10.1007\/s11199-010-9761-y"},{"key":"e_1_3_2_1_74_1","volume-title":"Retrieved","author":"World Health Organization","year":"2023","unstructured":"World Health Organization . NA. Gender and health . Retrieved March 20, 2023 from https:\/\/www.who.int\/health-topics\/gender#tab=tab_1 World Health Organization. NA. Gender and health. Retrieved March 20, 2023 from https:\/\/www.who.int\/health-topics\/gender#tab=tab_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_75_1","DOI":"10.2196\/31633"}],"event":{"acronym":"CHItaly 2023","name":"CHItaly 2023: 15th Biannual Conference of the Italian SIGCHI Chapter","location":"Torino Italy"},"container-title":["Proceedings of the 15th Biannual Conference of the Italian SIGCHI Chapter"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605390.3605417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605390.3605417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:03Z","timestamp":1750291443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605390.3605417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":75,"alternative-id":["10.1145\/3605390.3605417","10.1145\/3605390"],"URL":"https:\/\/doi.org\/10.1145\/3605390.3605417","relation":{},"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"2023-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}