<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMU</journal-id>
            <journal-id journal-id-type="nlm-ta">JMIR mHealth uHealth</journal-id>
            <journal-title>JMIR mHealth and uHealth</journal-title>
            <issn pub-type="epub">2291-5222</issn>
            <publisher>
                <publisher-name>JMIR Publications Inc.</publisher-name>
                <publisher-loc>Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v3i1e8</article-id>
            <article-id pub-id-type="pmid">25599627</article-id>
            <article-id pub-id-type="doi">10.2196/mhealth.3672</article-id>
            <article-categories>
                <subj-group subj-group-type="heading">
                    <subject>Original Paper</subject>
                </subj-group>
                <subj-group subj-group-type="article-type">
                    <subject>Original Paper</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Eysenbach</surname>
                        <given-names>Gunther</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Knotts</surname>
                        <given-names>Adam</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Ning</surname>
                        <given-names>Lipeng</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Su</surname>
                        <given-names>Wu-Chen</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1">
                    <name name-style="western">
                        <surname>Dehling</surname>
                        <given-names>Tobias</given-names>
                    </name>
                    <degrees>Dipl -Wirt -Inf</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-3445-3003</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib2">
                    <name name-style="western">
                        <surname>Gao</surname>
                        <given-names>Fangjian</given-names>
                    </name>
                    <degrees>MSc</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-3471-0716</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Schneider</surname>
                        <given-names>Stephan</given-names>
                    </name>
                    <degrees>Dipl -Wirt -Inf</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5024-1126</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib4" corresp="yes">
                    <name name-style="western">
                        <surname>Sunyaev</surname>
                        <given-names>Ali</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <address>
                        <institution>Department of Information Systems</institution>
                        <institution>Faculty of Management, Economics and Social Sciences</institution>
                        <institution>University of Cologne</institution>
                        <addr-line>Albertus-Magnus-Platz</addr-line>
                        <addr-line>Cologne, D-50923</addr-line>
                        <country>Germany</country>
                        <phone>49 221 4705397</phone>
                        <fax>49 221 4705386</fax>
                        <email>sunyaev@wiso.uni-koeln.de</email>
                    </address>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-4353-8519</ext-link>
                </contrib>
            </contrib-group>
            <aff id="aff1">
                <sup>1</sup>
                <institution>Department of Information Systems</institution>
                <institution>Faculty of Management, Economics and Social Sciences</institution>
                <institution>University of Cologne</institution>
                <addr-line>Cologne</addr-line>
                <country>Germany</country>
            </aff>
            <author-notes>
                <corresp>Corresponding Author: Ali Sunyaev <email>sunyaev@wiso.uni-koeln.de</email>
                </corresp>
            </author-notes>
            <pub-date pub-type="collection">
                <season>Jan-Mar</season>
                <year>2015</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>19</day>
                <month>01</month>
                <year>2015</year>
            </pub-date>
            <volume>3</volume>
            <issue>1</issue>
            <elocation-id>e8</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>06</day>
                    <month>07</month>
                    <year>2014</year>
                </date>
                <date date-type="rev-request">
                    <day>19</day>
                    <month>09</month>
                    <year>2014</year>
                </date>
                <date date-type="rev-recd">
                    <day>21</day>
                    <month>10</month>
                    <year>2014</year>
                </date>
                <date date-type="accepted">
                    <day>03</day>
                    <month>11</month>
                    <year>2014</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Tobias Dehling, Fangjian Gao, Stephan Schneider, Ali Sunyaev. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 19.01.2015. </copyright-statement>
            <copyright-year>2015</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://mhealth.jmir.org/2015/1/e8/" xlink:type="simple" />
            <abstract>
                <sec sec-type="background">
                    <title>Background</title>
                    <p>Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex.</p>
                </sec>
                <sec sec-type="objective">
                    <title>Objective</title>
                    <p>The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements.</p>
                </sec>
                <sec sec-type="methods">
                    <title>Methods</title>
                    <p>We assessed apps available in English and offered in the categories &#8220;Medical&#8221; and &#8220;Health &#38; Fitness&#8221; in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties.</p>
                </sec>
                <sec sec-type="results">
                    <title>Results</title>
                    <p>We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages.</p>
                </sec>
                <sec sec-type="conclusions">
                    <title>Conclusions</title>
                    <p>Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements.</p>
                </sec>
            </abstract>
            <kwd-group>
                <kwd>mobile health</kwd>
                <kwd>mobile apps</kwd>
                <kwd>data security</kwd>
                <kwd>software and application security</kwd>
                <kwd>patient privacy</kwd>
                <kwd>health information technology</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title> Introduction</title>
            <sec>
                <title>mHealth Apps</title>
                <p>Mobile health (mHealth) leverages various wireless technologies to provide health-related information and services on diverse mobile devices and is a promising subset of health information technology (IT) [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. mHealth has the potential to alleviate global health burdens due to rising dissemination of mobile devices, standardized and easy access to cloud or Internet services, and the possibility of affordable global deployment [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. mHealth apps target, for instance, prevalent global diseases [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>] and offer vital health information at an individual as well as population level [<xref ref-type="bibr" rid="ref12">12</xref>]. On the other hand, users, albeit deeming access to health information and related services beneficial, are concerned with information security and privacy issues, and want to control access to their information [<xref ref-type="bibr" rid="ref13">13</xref>-<xref ref-type="bibr" rid="ref15">15</xref>].</p>
                <p>Information security and privacy issues impede users&#8217; willingness to share information [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>], and render thus the promising benefits to be reaped from mHealth apps moot, in order to tailor offered information and services to users&#8217; needs, mHealth apps require access to relevant personal health information. Thus, mHealth apps will only offer more general services or cannot be used at all if users are not willing to share their health information. Moreover, infringements of information security and privacy lead not only to leakage or manipulation of private, sensitive information, but make also serious consequences like worsened morbidity or death more likely [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
            </sec>
            <sec>
                <title>Mobile Devices for mHealth</title>
                <p>Typical mobile devices for mHealth are smartphones and tablets [<xref ref-type="bibr" rid="ref11">11</xref>], which are characterized by a rapidly rising market penetration and access to a wide range of embedded technology like sensors for audio, video, location, orientation, and acceleration [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. The main platforms for mobile devices are Google&#8217;s Android and Apple&#8217;s iOS [<xref ref-type="bibr" rid="ref8">8</xref>]. The associated app stores (Apple iTunes, Google Play) [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] offer a vast amount of mHealth apps. These mHealth apps provide a variety of functionality requiring access to different kinds of information and supporting users in different ways, for example, support for weight management, tracking of workouts or medication regimens, facilitation of physician patient communication, management of chronic diseases, or implementation of Web-based interventions [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
                <p>Mobile devices and apps have been addressed from various perspectives, for instance, security aspects [<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref26">26</xref>], privacy [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>], software engineering [<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref32">32</xref>], medical implications [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>], hardware [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], or user implications [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. In contrast, pertinent governmental regulations, for example, [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>], and extant reviews of mHealth apps, for example, [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref40">40</xref>-<xref ref-type="bibr" rid="ref55">55</xref>], focus mostly on functional aspects and utility of apps for specific diseases or health conditions. Information security and privacy of mHealth apps is only scarcely addressed by extant research. With respect to information security and privacy, extant research offers, to the best of our knowledge, neither clear analysis of the peculiarities that distinguish mHealth apps from &#8220;common apps&#8221; (eg, weather apps or games), nor of the differences distinguishing apps available from each other. In short, understanding of information security and privacy implications of mHealth apps is lacking and hard to grasp due to the diversity and range of mHealth apps available. In order to address this gap, the objective of our research is to establish an overview of mHealth apps offered on iOS and Android, with a special focus on potential damage to users through information security and privacy infringements.</p>
                <p>Our research contributes to practice and the knowledge base by shedding light on information security and privacy of mHealth apps. Aside from providing an overview of available mHealth apps, we contribute to the scientific knowledge base by deepening the understanding of information security and privacy of mHealth apps. Instead of treating mHealth apps as a monolithic technology, we focus on the multi-facetted nature of mHealth apps and identify different mHealth app archetypes with respect to information security and privacy. For practical audiences, our work fosters awareness of information security and privacy implications of mHealth apps. Besides substantiating the need for attention to information security and privacy of mHealth apps, our work demonstrates that mHealth apps are of a diverse nature and require tailored attention to information security and privacy. For developers and end users of mHealth apps, the identification of mHealth app archetypes is especially useful to recognize where and understand when attention to information security and privacy is of particular importance. Deepening the understanding of information security and privacy of mHealth apps is an important step toward realization of the promising potential of mHealth apps to transform and improve the health care environment [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
            </sec>
        </sec>
        <sec sec-type="methods">
            <title>Methods</title>
            <sec>
                <title>App Discovery</title>
                <p>We surveyed English language mHealth apps in the official iOS and Android App Stores. App stores organize their offerings in categories (eg, Books, Games, and News). We selected apps from the Medical and Health &#38; Fitness categories, offered in both stores in May 2013. The iOS app store lists all apps by category and offers the desired information in plain hypertext markup language (HTML), enabling us to automatically parse app information to extract data. The Android App Store employs dynamically generated HTML pages so that the HTML texts displayed in the browser do not convey useful information, which is dynamically loaded from an underlying database. Hence, we used a third party open-source interface for retrieving app information [<xref ref-type="bibr" rid="ref56">56</xref>]. However, Google imposes various constraints on app store access [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]; for instance, only a maximum of 500 apps is returned per search request, even if more apps match the query. Our approach for Android app discovery builds search queries based on words from a publicly available English word list [<xref ref-type="bibr" rid="ref58">58</xref>] appended once with the string &#8220;medical&#8221; and once with the string &#8220;health&#8221;. Supplemented with missing health-related words and phrases identified during app tagging (see next paragraph), the word list consists of 111,632 distinct words and phrases (see <xref ref-type="app" rid="app1">Multimedia Appendices 1</xref> or <xref ref-type="app" rid="app2">2</xref>).</p>
                <p>Apps that were not available in English, did not have an English description, or were not health-related, despite being offered in the categories Medical or Health &#38; Fitness (eg, apps offering wallpapers), were excluded from further assessment. We employed tagging, that is, assignment of arbitrary terms describing an object to that object, to filter the initially discovered apps (iOS, 32,614; Android, 4632). Instead of assigning tags directly to an app, we assigned tags to corresponding strings in app descriptions. Only tags referring to health-related information collected by apps, health-related app purposes, handling of information, or other health-related app characteristics were used. For example, apps that provide medication-related functionality should be tagged with the tag &#8220;Medication&#8221;. Yet, app descriptions use different wording (eg, medication, pharmaceutical, or drug). Assigning tags to all encountered strings referring to medication reduces the number of redundant tags and establishes a corpus of string tag relationships that facilitates automated tagging of apps. Since extant research offered no clear guidance to determine cut-off points for manual tagging or the number of required tag matches, cut-off points were determined according to the available data in group discussions of the authors. We manually tagged 200 frequently rated apps (100 Health &#38; Fitness, 100 Medical). Based on this initial tag corpus, we employed string matching [<xref ref-type="bibr" rid="ref59">59</xref>] to automatically tag the remaining apps. With this approach, apps that do not offer English descriptions or health-related functionality are not assigned any or assigned only a small number of tags, because tags are assigned based on English, health-related words. Apps not matched by at least four distinct tags were excluded from further assessment.</p>
            </sec>
            <sec>
                <title>App Clustering</title>
                <sec>
                    <title>Clustering Approach</title>
                    <p>App tagging created a machine-readable description of app functionality. Since all apps were tagged based on the same tag corpus, apps with similar characteristics are assigned similar tags. We clustered [<xref ref-type="bibr" rid="ref60">60</xref>] apps based on their tags to aggregate the data and identify the various kinds of apps in our sample. We used a graph&#8212;a set of vertices that are connected by a set of edges [<xref ref-type="bibr" rid="ref61">61</xref>]&#8212;to represent the apps and their tag relationships. Vertices represent apps and edges represent tags both vertices have in common.</p>
                    <p>For identification of clusters, we used a heuristic by Blondel et al [<xref ref-type="bibr" rid="ref62">62</xref>], called Louvain method, which is based on modularity optimization. Modularity is a measure for cluster quality introduced by Newman and Girvan [<xref ref-type="bibr" rid="ref63">63</xref>]. Basically, modularity measures the fraction of edges in the graph that connect vertices within the same cluster minus the expected value of connections within a cluster if edges were inserted at random. Hence, a higher modularity value indicates that detected clusters are less random. The Louvain method performed well in comparative analyses of clustering algorithms [<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>], has low runtime so that it breaks our dense app tag graph down into clusters within a feasible amount of time, and does not require a priori determination of the number of clusters to be discovered, which is unfeasible due to the large numbers of apps, tags, and possible combinations. The Louvain method is an agglomerative clustering algorithm [<xref ref-type="bibr" rid="ref60">60</xref>] that runs in multiple iterations until a maximum of modularity is reached [<xref ref-type="bibr" rid="ref62">62</xref>]. Required algorithms were implemented in the programming languages PHP and Java. The Java library JGraphT [<xref ref-type="bibr" rid="ref66">66</xref>] was used to represent graphs. The relational database management system MySQL was used for data management.</p>
                </sec>
                <sec>
                    <title>Cluster Assessment</title>
                    <p>Health IT faces various threats, for instance, intentional and unintentional disclosure or manipulation of information through insiders or outsiders, user errors, maintenance errors, software failures, or hardware failures, as well as environmental threats [<xref ref-type="bibr" rid="ref67">67</xref>-<xref ref-type="bibr" rid="ref70">70</xref>]. If such threats materialize, users will be in harms&#8217; way. Based on extant research on information security and privacy in health care [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref71">71</xref>-<xref ref-type="bibr" rid="ref79">79</xref>], we assess information security and privacy implications according to five characteristics: (1) health specificity of information available to apps, (2) potential damage through information leaks, (3) potential damage through information manipulation (change), (4) potential damage through information loss, and (5) potential value of information to third parties (<xref ref-type="table" rid="table1">Table 1</xref>). Cluster assessment is focused on risks specific to mHealth apps. Hence, risks associated with information ordinarily available to apps [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>], like location information or device identifier, do not contribute to a more grave assessment.</p>
                    <p>Characteristic&#160;1, health specificity of information available to apps, assesses whether the app has access to medical user information, access to other nonstandard information, or only access to standard information ordinarily available to apps like location information or device identifiers [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]. Characteristic&#160;2 assesses the potential damage through information leaks, which can be classified as none, low, or high. Depending on offered functionality, health IT has access to information with low sensitivity like users&#8217; height, weight, or common past illnesses and treatments like a cough or broken bones [<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref72">72</xref>]. Other health IT offerings have, however, access to information with high sensitivity like abortions, mental illness, sexually transmitted diseases, HIV status, substance abuse, or genetic predispositions to disease [<xref ref-type="bibr" rid="ref71">71</xref>-<xref ref-type="bibr" rid="ref73">73</xref>]. Leaks of such information increase the likelihood of potential damage to users through socioeconomic repercussions [<xref ref-type="bibr" rid="ref74">74</xref>], embarrassment or damage of reputation [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref71">71</xref>-<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref76">76</xref>], social stigma [<xref ref-type="bibr" rid="ref75">75</xref>], loss of affection or respect of family members [<xref ref-type="bibr" rid="ref77">77</xref>], monetary repercussions through medical fraud (billing for treatments never rendered) or medical identity theft (obtainment of medical services with a fake medical identity) [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>], more expensive insurance coverage or problems to obtain insurance coverage [<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref78">78</xref>], or lessened employment possibilities [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. Characteristic&#160;3 assesses potential damage through information manipulation (change), possible values are none, low, or high. Potential damage through information manipulation was, for instance, assessed as low for information on eating patterns or past workouts. Manipulation of such information is inconvenient and undesirable, but poses only low potential damage. Potential damage through information manipulation was assessed as high for apps where information manipulation causes greater harm to users. If, for example, erroneous information is added to users&#8217; information due to medical fraud, medical identity theft, negligence, malicious intent, or other threats, treatment can be based on erroneous information [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref73">73</xref>]. In addition, users&#8217; quality of care is affected, potential for harm to health or death is increased, and later efforts to obtain medical, life, or disability insurance are impeded [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>,<xref ref-type="bibr" rid="ref76">76</xref>]. Potential damage through loss of information is assessed with characteristic&#160;4, possible values are none, low, or high. Loss of uncritical information or information that can be restored was assessed as low. Loss of information was assessed as high in cases where, for instance, important information required for users&#8217; care is no longer available [<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref76">76</xref>]. Finally, the potential value of information for third parties is assessed by characteristic&#160;5, possible values are none, low, or high. If apps have access to information valuable to third parties, infringements of information security and privacy are more likely because they are more rewarding for third parties. For mHealth apps that have only access to information commonly available to mobile apps, value was assessed as none. Value was assessed as low for collected information that is not directly useful to third parties, like unspecific information or information not attributable to users. On the other hand, information like insurance policy information, date of birth, or social security numbers is highly valuable to third parties; for instance, to commit medical identity theft or medical fraud [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref73">73</xref>]. Further uses of others&#8217; private medical information that are not in the best interest of the data subject include the selling of medical information of celebrities [<xref ref-type="bibr" rid="ref71">71</xref>], better fitting of insurance policies to insurees&#8217; risks and selection of insurees [<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref79">79</xref>], selection of healthy employees [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref79">79</xref>], or targeted marketing [<xref ref-type="bibr" rid="ref71">71</xref>,<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref78">78</xref>].</p>
                    <table-wrap position="float" id="table1">
                        <label>Table 1</label>
                        <caption>
                            <p>Cluster assessment characteristics.</p>
                        </caption>
                        <table width="588" border="1" cellpadding="2" cellspacing="0" rules="groups" frame="hsides">
                            <col width="16" />
                            <col width="72" />
                            <col width="365" />
                            <col width="119" />
                            <thead>
                                <tr valign="top">
                                    <td>#</td>
                                    <td>Name</td>
                                    <td>Definition</td>
                                    <td>Possible values</td>
                                </tr>
                            </thead>
                            <tbody>
                                <tr valign="top">
                                    <td>1</td>
                                    <td>Specificity</td>
                                    <td>Health specificity of information available to apps (eg, phone identifiers, eating habits, disease history)</td>
                                    <td>Standard,  <break />  
            nonstandard, medical</td>
                                </tr>
                                <tr valign="top">
                                    <td>2</td>
                                    <td>Leaks</td>
                                    <td>Potential damage through leaks of information (eg, embarrassment, lessened employment prospects)</td>
                                    <td>None, low, high</td>
                                </tr>
                                <tr valign="top">
                                    <td>3</td>
                                    <td>Change</td>
                                    <td>Potential damage through manipulation (change) of information (eg, treatment errors)</td>
                                    <td>None, low, high</td>
                                </tr>
                                <tr valign="top">
                                    <td>4</td>
                                    <td>Loss</td>
                                    <td>Potential damage through loss of information (eg, loss of information important for treatment)</td>
                                    <td>None, low, high</td>
                                </tr>
                                <tr valign="top">
                                    <td>5</td>
                                    <td>Value</td>
                                    <td>Value of information to third parties (eg, medical identity theft, selection of employees)</td>
                                    <td>None, low, high</td>
                                </tr>
                            </tbody>
                        </table>
                    </table-wrap>
                </sec>
            </sec>
            <sec>
                <title>Assessing Discovered Clusters</title>
                <p>There were two researchers that assessed all discovered clusters. To maintain a consistent interpretation of clusters during assessment, each rater annotated each cluster with a short description based on connotation and prevalence of tags assigned to the cluster. These descriptions were verified through comparison to apps contained in the respective cluster. Subsequently, clusters were assessed according to the five characteristics addressing information security and privacy implications. Reliability assessment with Janson&#8217;s and Olsson&#8217;s &#953;, an multivariate extension of Cohen&#8217;s &#954; for multiple judges on the same scale [<xref ref-type="bibr" rid="ref80">80</xref>], led to a &#8220;substantial&#8221; [<xref ref-type="bibr" rid="ref81">81</xref>] agreement score of &#953;=0.71. All remaining differences were resolved by discussion; if necessary, a third researcher was consulted for dispute resolution.</p>
                <p>mHealth app archetypes (AT), with respect to information security and privacy are identified by grouping clusters with identical assessments in a final aggregation step. An archetype is &#8220;the original pattern or model of which all things of the same type are representations or copies&#8221; [<xref ref-type="bibr" rid="ref82">82</xref>]. Hence, archetypes constitute underlying or core conceptions of objects observed in the real world. Real-world representations of archetypes may, however, materialize in different forms. For example, from an information security and privacy perspective, a medication reminder, as well as a patient interaction app are real-world representations of the same archetype; they both have access to sensitive medical information that should not be leaked to third parties, must remain accurate, and is of value to third parties. Yet, there is only a low demand for data preservation; medication reminders only need to store information until they have reminded users to take their medication, and patient interaction apps only need to store the data until the interaction has happened. Identification of mHealth app archetypes, with respect to information security and privacy, establishes, thus, a graspable overview of the thousands of mHealth apps offered in the app stores. To foster interpretability of app archetypes, identified app archetypes are numbered and additionally characterized by a natural language descriptor. The medication reminder and patient interaction app from the previous example are, for instance, both representations of the archetype AT&#160;11 (Treatment Reminders). Due to the large diversity of possible real-world representations of mHealth app archetypes, it is unfeasible to identify meaningful descriptors capturing all facets of functionality offered by real-world archetype representations. The final descriptors were determined in group discussions of the authors. Hence, the archetype descriptors characterize exemplary functionality of real-world representations to foster archetype interpretability.</p>
            </sec>
        </sec>
        <sec sec-type="results">
            <title>Results</title>
            <sec>
                <title>Discovered Apps</title>
                <p>We discovered a total of 37,246 apps (iOS, 32,614; Android, 4632) in the categories Medical and Health &#38; Fitness (<xref ref-type="fig" rid="figure1">Figure 1</xref> shows this). After automatic tagging, 34.48% of apps (12,841/37,246; iOS, 32.69%, 10,661/32,614; Android, 47.06%, 2180/4632) were excluded from further assessment. The ratio of iOS mHealth apps to Android mHealth apps is 8.95 (21,953 to 2452).</p>
                <p>In both stores, users rate apps on 5-star integer rating scales, ranging from 1 to 5 stars. Mean rating scores of rated iOS and Android mHealth apps are 3.1 (median 3, SD 1.01) and 3.7 (median 3.92, SD 1.08), respectively. <xref ref-type="fig" rid="figure2">Figures 2</xref> and <xref ref-type="fig" rid="figure3">3</xref> illustrate app ratings and rating counts in more detail. There are 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps that have been rated less than 10 times. There are 75.76% (16,631/21,953) of iOS and 42.37% (1039/2452) of Android apps that have not been rated. There are 1.38% (302/21,953) of iOS and 1.55% (38/2452) of Android apps that have been rated more than 1000 times. There are 39.36% (2095/5322) of rated iOS apps that are rated four stars or more and 27.85% (1482/5322) of rated iOS apps are rated two stars or less. On Android, 64.83% (916/1413) of rated apps are rated four stars or more and 14.23% (201/1413) of rated apps are rated two stars or less. As illustrated in <xref ref-type="fig" rid="figure2">Figure 2</xref>, Android mHealth apps are rated higher than iOS mHealth apps (Mann Whitney U(6733)=2,592,190; <italic>P</italic>&#60;.001; <italic>r</italic>=0.31; 95% CI 0.99997-0.99998). App category has no significant influence on app rating (iOS, Mann Whitney U(5320)=3,516,696; <italic>P</italic>=.92; <italic>r</italic>=0.002; Android, Mann Whitney U(1411)=203,559.5; <italic>P</italic>=.13; <italic>r</italic>=0.05).</p>
                <p>For Android apps, rating count and download count are strongly positively correlated (Spearman &#961;=0.89, n=2452, <italic>P</italic>&#60;.001), indicating that rating count is a good proxy for download count (<xref ref-type="fig" rid="figure4">Figure 4</xref> shows this).</p>
                <fig id="figure1" position="float">
                    <label>Figure 1</label>
                    <caption>
                        <p>Flow chart of apps selection.</p>
                    </caption>
                    <graphic xlink:href="mhealth_v3i1e8_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure2" position="float">
                    <label>Figure 2</label>
                    <caption>
                        <p>Rating count of mHealth apps by store. Number of ratings increases from left to right.</p>
                    </caption>
                    <graphic xlink:href="mhealth_v3i1e8_fig2.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure3" position="float">
                    <label>Figure 3</label>
                    <caption>
                        <p>Rating of rated mHealth apps by store.</p>
                    </caption>
                    <graphic xlink:href="mhealth_v3i1e8_fig3.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure4" position="float">
                    <label>Figure 4</label>
                    <caption>
                        <p>Boxplot of Android app rating count (log-scaled) and download count. Mean values are indicated with asterisks.</p>
                    </caption>
                    <graphic xlink:href="mhealth_v3i1e8_fig4.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>App Clustering</title>
                <p>Application of the Louvain method [<xref ref-type="bibr" rid="ref62">62</xref>] grouped the 24,405 apps applicable for clustering into 245 distinct clusters with a modularity score of 0.47, which indicates a good division of the graph [<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref83">83</xref>]. Discovered clusters have a mean size of 99.6 apps (minimum 2; maximum 910; median 90; SD 113.6). There are 28.6% (70/245) of clusters containing 26.33% (6426/24,405) of apps that conveyed no information relevant to our research scope and were excluded from further assessment. Some clusters are, for instance, too ambiguous because contained apps match mainly a single tag (eg, &#8220;Pain&#8221; or &#8220;Care Giver&#8221;) that is uninformative on its own with respect to our research scope. Cluster assessment, according to the five characteristics, led to further consolidation of the 175 informative clusters into 12 app archetypes, grouping clusters with identical characteristic assessments. The 12 app archetypes have a mean size of 14.6 clusters (minimum 3; maximum 58; median 8; SD 4.6) and 1498.25 apps (minimum 60; maximum 5603; median 615; SD 506.18). <xref ref-type="fig" rid="figure5">Figure 5</xref> shows the clustering process.</p>
                <p>
                    <xref ref-type="table" rid="table2">Table 2</xref> provides an overview of the cluster assessments with respect to health specificity of information, potential damage through leaks, manipulation, loss of information, and value of collected information to third parties. Medical information is available to apps in 33.7% (59/175) of clusters. There are 16.0% (28/175) of clusters that have access to information not available to ordinary apps [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>], and apps in 50.3% (88/175) of clusters do not have access to more information than ordinary apps. Apps in 73.7% (129/175) of clusters have no or low potential damage through leaks of information. There are 39.4% (69/175) of clusters that are comprised of apps with high potential damage through manipulation of information. There is no potential damage through loss of information in 67.4% (118/175) of clusters. There are 77.7% (136/175) of clusters that consist of apps that have only access to information with no or low value for third parties.</p>
                <table-wrap position="float" id="table2">
                    <label>Table 2</label>
                    <caption>
                        <p>Cluster assessments with respect to the five information security and privacy characteristics.</p>
                    </caption>
                    <table width="452" border="1" cellpadding="7" cellspacing="0" rules="groups" frame="hsides">
                        <col width="34" />
                        <col width="116" />
                        <col width="122" />
                        <col width="122" />
                        <thead>
                            <tr valign="bottom">
                                <td colspan="2">
                                    <break />
                                </td>
                                <td>Clusters n (%)<sup>a</sup>
                                    <break />N=175</td>
                                <td>Apps n (%)<sup>a</sup>
                                    <break />N=17,979</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="bottom">
                                <td colspan="2">
                                    <bold>Specificity</bold>
                                    <sup>b</sup>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="bottom">
                                <td>
                                    <break />
                                </td>
                                <td>Standard<sup>c</sup>
                                </td>
                                <td>88 (50.3)</td>
                                <td>8463 (47.07)</td>
                            </tr>
                            <tr valign="bottom">
                                <td>
                                    <break />
                                </td>
                                <td>Nonstandard<sup>d</sup>
                                </td>
                                <td>28 (16.0)</td>
                                <td>4818 (26.80)</td>
                            </tr>
                            <tr valign="bottom">
                                <td>
                                    <break />
                                </td>
                                <td>Medical<sup>e</sup>
                                </td>
                                <td>59 (33.7)</td>
                                <td>4698 (26.13)</td>
                            </tr>
                            <tr valign="bottom">
                                <td colspan="2">
                                    <bold>Leaks</bold>
                                    <sup>f</sup>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>None</td>
                                <td>88 (50.3)</td>
                                <td>8463 (47.07)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Low</td>
                                <td>41 (23.4)</td>
                                <td>5388 (29.97)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>High</td>
                                <td>46 (26.3)</td>
                                <td>4128 (22.96)</td>
                            </tr>
                            <tr valign="bottom">
                                <td colspan="2">
                                    <bold>Change</bold>
                                    <sup>g</sup>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>None</td>
                                <td>9 (5.1)</td>
                                <td>786 (4.37)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Low</td>
                                <td>97 (55.4)</td>
                                <td>11,641 (64.75)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>High</td>
                                <td>69 (39.4)</td>
                                <td>5552 (30.88)</td>
                            </tr>
                            <tr valign="bottom">
                                <td colspan="2">
                                    <bold>Loss</bold>
                                    <sup>h</sup>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>None</td>
                                <td>118 (67.4)</td>
                                <td>10,049 (55.89)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Low</td>
                                <td>32 (18.3)</td>
                                <td>5832 (32.44)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>High</td>
                                <td>25 (14.3)</td>
                                <td>2098 (11.67)</td>
                            </tr>
                            <tr valign="bottom">
                                <td colspan="2">
                                    <bold>Value</bold>
                                    <sup>i</sup>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>None</td>
                                <td>88 (50.3)</td>
                                <td>8463 (47.07)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Low</td>
                                <td>48 (27.4)</td>
                                <td>6108 (33.97)</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>High</td>
                                <td>39 (22.3)</td>
                                <td>3408 (18.96)</td>
                            </tr>
                        </tbody>
                    </table>
                    <table-wrap-foot>
                        <fn id="table2fn1">
                            <p>
                                <sup>a</sup> Uninformative clusters are not included in percentages</p>
                        </fn>
                        <fn id="table2fn2">
                            <p>
                                <sup>b</sup> Health specificity of information available to apps</p>
                        </fn>
                        <fn id="table2fn3">
                            <p>
                                <sup>c</sup> Apps only have access to information ordinarily available to apps, for example, phone identifiers or location information</p>
                        </fn>
                        <fn id="table2fn4">
                            <p>
                                <sup>d</sup> Apps have access to information not ordinarily available to apps, but no access to medical information, for example, workout history or eating habits</p>
                        </fn>
                        <fn id="table2fn5">
                            <p>
                                <sup>e</sup> Apps have access to medical information, for example, disease history or health insurance information</p>
                        </fn>
                        <fn id="table2fn6">
                            <p>
                                <sup>f</sup> Potential damage through leaks of information, for example, embarrassment, lessened employment possibilities</p>
                        </fn>
                        <fn id="table2fn7">
                            <p>
                                <sup>g</sup> Potential damage through manipulation, change, of information, for example, treatment based on erroneous information</p>
                        </fn>
                        <fn id="table2fn8">
                            <p>
                                <sup>h</sup> Potential damage through loss of information, for example, loss of information important for treatment</p>
                        </fn>
                        <fn id="table2fn9">
                            <p>
                                <sup>i</sup> Value of information to third parties, for example, medical identity theft, selection of employees</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
                <fig id="figure5" position="float">
                    <label>Figure 5</label>
                    <caption>
                        <p>Outline of clustering process (AT = archetype).</p>
                    </caption>
                    <graphic xlink:href="mhealth_v3i1e8_fig5.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>App Archetypes</title>
                <p>Archetype descriptors and examples for functionality offered by apps of the different app archetypes are listed in <xref ref-type="table" rid="table3">Table 3</xref>. <xref ref-type="table" rid="table4">Table 4</xref> illustrates the twelve discovered app archetypes with distinct value combinations according to the five characteristics. AT 1 (Casual Tools) represents 5.1% (9/175) of clusters and 4.37% (786/17,979) of apps. Apps of AT 1 only have access to information also available to ordinary apps and provide no critical functionality, so that their use cannot cause more damage than the use of any other app. Apps of AT&#160;1 offer mostly generic information and are only marginally health-related. AT&#160;2 (Common Knowledge Providers) is the archetype with the most representations in our sample (33.1%, 58/175 of clusters; 31.16%, 5603/17,979 of apps). Apps of AT&#160;2 also have no access to other information than ordinary apps, so that there is no damage through leaks or loss of information. Apps of AT&#160;2 have low potential damage through manipulation of information. More critical information is provided by apps of AT&#160;3 (Treatment Guides), which provide information directly relevant for (self-)treatment or intended to guide users in emergency situations. Information provided by apps of AT&#160;3 needs to be correct to serve as reliable foundation for (self-)treatment decisions; accidental or malicious provision of erroneous information promotes wrong or counterproductive treatment decisions. AT&#160;3 represents 12.0% (21/175) of clusters and 11.54% (2074/17,979) of apps. AT&#160;4 and AT&#160;5 (Fitness Ad-Hoc Tools and Fitness Trackers; 16.0%, 28/175 of clusters; 26.80%, 4818/17,979 of apps) have access to more information than ordinary apps. Yet, they do not collect medical information, so that there is at most low potential damage because collected information is not sensitive, not crucial for provision of medical services, not important for future endeavors, and not valuable to third parties. The remaining seven app archetypes collect medical information (33.7%, 59/175 of clusters; 26.13%, 4698/17,979 of apps). AT&#160;6 (Treatment Support Tools) is the only app archetype that collects medical information and has low potential damage through leaks of information. AT&#160;6 represents calculators and tools for medical professionals or tools offering very specific functionality, so that collected information is either not attributable to patients or not informative. Hence, there is only low potential damage through leaks of information and low value of information to third parties. AT&#160;3 (Treatment Guides), AT&#160;6 (Treatment Support Tools), AT&#160;10 (Health Monitors), AT&#160;11 (Treatment Reminders), and AT&#160;12 (Health Records) offer functionality directly relevant for treatment or decision making so that there is high potential damage through information manipulation. There are four app archetypes, AT&#160;8 (State of Health Tests), AT&#160;10 (Health Monitors), AT&#160;11 (Treatment Reminders), and AT&#160;12 (Health Records) that collect medical information detailed enough to be of high value to third parties (eg, blood test results, medication histories, or health records). While the other app archetypes do not require long storage times of collected information, apps of AT&#160;12 (Health Records) collect medical information relevant for future decision making (eg, disease management tools, medication history, or health records), so that potential damage through loss of information is high. Since apps of AT&#160;12 also tend to collect very detailed, personal information, potential damage through leaks or manipulation and value of information to third parties is high as well.</p>
                <table-wrap position="float" id="table3">
                    <label>Table 3</label>
                    <caption>
                        <p>Exemplary functionality of apps represented by the AT.</p>
                    </caption>
                    <table width="575" border="1" cellpadding="2" cellspacing="0" rules="groups" frame="hsides">
                        <col width="76" />
                        <col width="164" />
                        <col width="321" />
                        <thead>
                            <tr valign="top">
                                <td>Archetype</td>
                                <td>Descriptor</td>
                                <td>Exemplary kinds of contained apps</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>AT&#160;1</td>
                                <td>Casual Tools</td>
                                <td>Life improvement guides; mosquito repellents; brain fitness trainer</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;2</td>
                                <td>Common Knowledge Providers</td>
                                <td>Information provision for education; alarm clocks; fitness guides</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;3</td>
                                <td>Treatment Guides</td>
                                <td>First aid guides; home remedy guides; medication guides</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;4</td>
                                <td>Fitness Ad-Hoc Tools</td>
                                <td>Diet calculators; weight control calculators; fitness calculators</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;5</td>
                                <td>Fitness Trackers</td>
                                <td>Workout tracker; smoking cessation tools; diet tracker</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;6</td>
                                <td>Treatment Support Tools</td>
                                <td>Diabetes calculators; dosage calculators; diagnosis support tools</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;7</td>
                                <td>Intimate Ad-Hoc Tools</td>
                                <td>Fertility calculators; pregnancy calculators; physician finder</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;8</td>
                                <td>State of Health Tests</td>
                                <td>Acuity tests; color vision tests; blood alcohol calculators</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;9</td>
                                <td>Intimate Trackers</td>
                                <td>Menstruation, intercourse, fertility, and pregnancy tracker</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;10</td>
                                <td>Health Monitors</td>
                                <td>Heart rate monitors; disease counseling; tools for blood test analysis</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;11</td>
                                <td>Treatment Reminders</td>
                                <td>Medication reminder; patient interaction and communities</td>
                            </tr>
                            <tr valign="top">
                                <td>AT&#160;12</td>
                                <td>Health Records</td>
                                <td>Health/emergency records; disease management tools; medication tracker</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <table-wrap position="float" id="table4">
                    <label>Table 4</label>
                    <caption>
                        <p>AT with respective assessments of the five information security and privacy characteristics and contained clusters and apps.</p>
                    </caption>
                    <table width="589" border="1" cellpadding="1" cellspacing="0" rules="groups" frame="hsides">
                        <col width="22" />
                        <col width="99" />
                        <col width="60" />
                        <col width="60" />
                        <col width="60" />
                        <col width="60" />
                        <col width="106" />
                        <col width="105" />
                        <thead>
                            <tr valign="bottom">
                                <td>AT</td>
                                <td>Specificity<sup>a</sup>
                                </td>
                                <td>Leaks<sup>e</sup>
                                </td>
                                <td>Change<sup>f</sup>
                                </td>
                                <td>Loss<sup>g</sup>
                                </td>
                                <td>Value<sup>h</sup>
                                </td>
                                <td>Clusters n (%)<sup>i</sup>
                                    <break />N=175</td>
                                <td>Apps n (%)<sup>i</sup>
                                    <break />N=17,979</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="bottom">
                                <td>1</td>
                                <td>Standard<sup>b</sup>
                                </td>
                                <td>None</td>
                                <td>None</td>
                                <td>None</td>
                                <td>None</td>
                                <td>9 (5.1)</td>
                                <td>786 (4.37)</td>
                            </tr>
                            <tr valign="top">
                                <td>2</td>
                                <td>Standard</td>
                                <td>None</td>
                                <td>Low</td>
                                <td>None</td>
                                <td>None</td>
                                <td>58 (33.1)</td>
                                <td>5603 (31.16)</td>
                            </tr>
                            <tr valign="top">
                                <td>3</td>
                                <td>Standard</td>
                                <td>None</td>
                                <td>High</td>
                                <td>None</td>
                                <td>None</td>
                                <td>21 (12.0)</td>
                                <td>2074 (11.54)</td>
                            </tr>
                            <tr valign="bottom">
                                <td>4</td>
                                <td>Nonstandard<sup>c</sup>
                                </td>
                                <td>Low</td>
                                <td>Low</td>
                                <td>None</td>
                                <td>Low</td>
                                <td>7 (4.0)</td>
                                <td>216 (1.20)</td>
                            </tr>
                            <tr valign="top">
                                <td>5</td>
                                <td>Nonstandard</td>
                                <td>Low</td>
                                <td>Low</td>
                                <td>Low</td>
                                <td>Low</td>
                                <td>21 (12.0)</td>
                                <td>4602 (25.60)</td>
                            </tr>
                            <tr valign="bottom">
                                <td>6</td>
                                <td>Medical<sup>d</sup>
                                </td>
                                <td>Low</td>
                                <td>High</td>
                                <td>None</td>
                                <td>Low</td>
                                <td>13 (7.4)</td>
                                <td>570 (3.17)</td>
                            </tr>
                            <tr valign="top">
                                <td>7</td>
                                <td>Medical</td>
                                <td>High</td>
                                <td>Low</td>
                                <td>None</td>
                                <td>Low</td>
                                <td>3 (1.7)</td>
                                <td>60 (0.33)</td>
                            </tr>
                            <tr valign="top">
                                <td>8</td>
                                <td>Medical</td>
                                <td>High</td>
                                <td>Low</td>
                                <td>None</td>
                                <td>High</td>
                                <td>4 (2.3)</td>
                                <td>500 (2.78)</td>
                            </tr>
                            <tr valign="top">
                                <td>9</td>
                                <td>Medical</td>
                                <td>High</td>
                                <td>Low</td>
                                <td>Low</td>
                                <td>Low</td>
                                <td>4 (2.3)</td>
                                <td>660 (3.67)</td>
                            </tr>
                            <tr valign="top">
                                <td>10</td>
                                <td>Medical</td>
                                <td>High</td>
                                <td>High</td>
                                <td>None</td>
                                <td>High</td>
                                <td>3 (1.7)</td>
                                <td>240 (1.33)</td>
                            </tr>
                            <tr valign="top">
                                <td>11</td>
                                <td>Medical</td>
                                <td>High</td>
                                <td>High</td>
                                <td>Low</td>
                                <td>High</td>
                                <td>7 (4.0)</td>
                                <td>570 (3.17)</td>
                            </tr>
                            <tr valign="top">
                                <td>12</td>
                                <td>Medical</td>
                                <td>High</td>
                                <td>High</td>
                                <td>High</td>
                                <td>High</td>
                                <td>25 (14.3)</td>
                                <td>2098 (11.67)</td>
                            </tr>
                        </tbody>
                    </table>
                    <table-wrap-foot>
                        <fn id="table4fn1">
                            <p>
                                <sup>a</sup> Health specificity of information available to apps</p>
                        </fn>
                        <fn id="table4fn2">
                            <p>
                                <sup>b</sup> Apps only have access to information ordinarily available to apps, for example, phone identifiers or location information</p>
                        </fn>
                        <fn id="table4fn3">
                            <p>
                                <sup>c</sup> Apps have access to information not ordinarily available to apps, but no access to medical information, for example, workout history or eating habits</p>
                        </fn>
                        <fn id="table4fn4">
                            <p>
                                <sup>d</sup> Apps have access to medical information, for example, disease history or health insurance information</p>
                        </fn>
                        <fn id="table4fn5">
                            <p>
                                <sup>e</sup> Potential damage through leaks of information, for example, embarrassment, lessened employment possibilities</p>
                        </fn>
                        <fn id="table4fn6">
                            <p>
                                <sup>f</sup> Potential damage through manipulation, change, of information, for example, treatment based on erroneous information</p>
                        </fn>
                        <fn id="table4fn7">
                            <p>
                                <sup>g</sup> Potential damage through loss of information, for example, loss of information important for treatment</p>
                        </fn>
                        <fn id="table4fn8">
                            <p>
                                <sup>h</sup> Value of information to third parties, for example, medical identity theft, selection of employees</p>
                        </fn>
                        <fn id="table4fn9">
                            <p>
                                <sup>i</sup> Uninformative clusters are not included in percentages</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
            </sec>
        </sec>
        <sec sec-type="discussion">
            <title>Discussion</title>
            <sec>
                <title>Principal Results</title>
                <sec>
                    <title>Discovered Apps</title>
                    <p>Since their inception in 2008, the iOS and Android App Stores underwent a rapid development. After a few years, the app portfolios of both stores encompass hundreds of thousands of apps [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref57">57</xref>], which include thousands of mHealth apps. However, absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that over three quarters of mHealth apps are not in widespread use. A fraction of users who download apps provide ratings [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref84">84</xref>]. Hence, apps less often rated are likely to be less often used than more often rated apps. An explanation for this is the increased visibility of better-rated apps [<xref ref-type="bibr" rid="ref85">85</xref>], apps with higher and more ratings are more prominently displayed in app stores and thus more likely to be discovered by potential users. More ratings make the resulting app assessment also more reliable, which attracts more users. Furthermore, many apps offer similar or competing functionality (eg, calculation of the body mass index, tracking of workouts, or prediction of date of birth), so that only a few first-movers, heavily promoted apps, or high quality apps will gain a large user base. App ratings indicate that most users are not dissatisfied with rated apps, 72.15% (3840/5322) of iOS and 85.77% (1212/1413) of Android apps are rated average or above. Another impediment for more widespread use of mHealth apps might be users&#8217; concerns about information security and privacy implications [<xref ref-type="bibr" rid="ref15">15</xref>]. Our cluster analysis of mHealth apps sheds some light on the potential damage through information security and privacy infringements.</p>
                </sec>
                <sec>
                    <title>App Clustering</title>
                    <p>Since mHealth apps usually offer functionality related to users&#8217; health, it is not a surprising finding that information security and privacy infringements cause potential damage for the majority of apps (94.9%, 166/175 of clusters; 95.63%, 17,193/17,979 of apps). mHealth apps offer, however, diverse functionality so that potential for damage through information security and privacy infringements differs. Manipulation of information is a threat common to most mHealth apps (94.9%, 166/175 of clusters; 95.63%, 17,193/17,979 of apps). Even apps that do not collect any medical information, like AT&#160;2 (Common Knowledge Providers) or AT&#160;3 (Treatment Guides), must ensure that information they provide is correct and stays correct because, at least some, users will act on offered information and base (self&#160;)treatment decisions on provided information. Apps offering information or functionality directly relevant for treatment or care must especially ensure that offered information is not accidentally or maliciously manipulated. mHealth apps that only provide information have, however, no information security and privacy implications through leaks or loss of collected information since no information is collected. About one half of the apps in our sample (50.3%, 88/175 of clusters; 47.07%, 8463/17,979 of apps) only provide information. Such apps are probably the most &#8220;pleasant&#8221; apps when it comes to protecting information security and privacy since no user-collected information must be protected. Thus, providers can focus on protection of integrity of information in rest and during transport, as well as offering accurate information from the onset. Still, extant research shows that information provided by some apps does not concur with current evidence and recommendations or is even contradicting [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>].</p>
                    <p>There are 33.7% (59/175) of clusters and 26.13% (4698/17,979) of apps that have access to medical user information. All of these apps have high potential damage through information security and privacy infringements in at least one characteristic. Some apps, for example, AT&#160;6 (Treatment Support Tools) do not collect detailed information or information attributable to users and do not retain entered information, so that there is no potential damage through loss of information, low potential damage through leaks of information, and low value of information for third parties. Yet, they serve as foundation for treatment decisions (eg, appropriate medication dosage), so that there is high potential damage through manipulation of information. Other apps collect information users want to keep private, for example, AT&#160;9 (Intimate Trackers), so that there is high potential damage through leaks of information, but collected information is not directly relevant for treatment or state of health, so that the other characteristics pose only low potential damage. Potential damage of other apps, for example, AT&#160;12 (Health Records) was rated with the most critical assessment in all five characteristics since contained information is sensitive and must be kept private, has to be accurate and accessible to inform treatment decisions, and allows for misuse motivated by financial gain. Consequentially, there is no one-size-fits-all approach for ensuring information security and privacy of mHealth apps. mHealth apps offer different functionality so that they are also subject to different threats. Accordingly, measures for protection of information security and privacy must be tailored to the app to be protected [<xref ref-type="bibr" rid="ref70">70</xref>].</p>
                    <p>Our identification of the twelve mHealth app archetypes elucidates information security and privacy of mHealth apps, instead of a hazy collection comprised of the thousands of mHealth apps available in the app stores, the archetypes constitute a lucid, descriptive collection of twelve mHealth app archetypes with different information security and privacy characteristics. Future research can build on the archetypes, for instance, to prioritize information security and privacy requirements with respect to app type, devise collections of security measures ensuring sound protection of information security and privacy, analyze user perceptions of information security and privacy with respect to different kinds of apps, or to further theory and methodology for app development that takes information security and privacy implications into account. For example, potential damage through information security and privacy infringements would obviously be reduced if apps that mainly provide information did not store any user information and focused rather on secure interoperability with specialized storage apps. An overview of app archetypes with respect to information security is also helpful for practical audiences. Associating an mHealth app of interest with the respective archetype improves, for instance, the understanding of perks and perils associated with app use. The overview of the archetypes alone is useful to foster user comprehension and awareness of information security and privacy implications of mHealth app use. In order to continuously benefit from mHealth apps, users must be able to make informed decisions about mHealth app adoption and use.</p>
                    <p>The apps with the most serious assessment of potential damage through information security and privacy infractions (AT&#160;12, Health Records; 14.3%, 25/175 of clusters; 11.67%, 2098/17,979 of apps) may also offer the most benefits to users [<xref ref-type="bibr" rid="ref2">2</xref>]. AT&#160;12 represents all the different facets of health records and disease management tools [<xref ref-type="bibr" rid="ref86">86</xref>-<xref ref-type="bibr" rid="ref89">89</xref>], which collect detailed health information, allowing them to offer functionality tailored to users&#8217; needs and individual peculiarities or to provide other apps with the information required for tailoring offered functionality. Apps of AT&#160;12 could rise to central hubs in the emerging mHealth environment if interoperability issues are solved [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref90">90</xref>] and information security and privacy is sufficiently addressed so that users can safely trust apps of AT&#160;12 to protect their information [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref91">91</xref>,<xref ref-type="bibr" rid="ref92">92</xref>].</p>
                    <p>It is noteworthy that some threats are common to all kinds of mHealth apps, even those without any data collection. Users&#8217; behavior, or the sole fact that a guide for stress relief or fighting depression, a support tool for hypertension, or an app providing information on cancer, chronic diseases, infertility, or incontinence, is installed on a device reveals sensitive, private, or embarrassing information [<xref ref-type="bibr" rid="ref93">93</xref>]. In the end, it is up to users which apps they use and what information they intend to share. To support users in this decision, it is important that they are sensitized to the risks associated with sharing private, sensitive, medical information [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref94">94</xref>] and offered means to gauge, configure, and control information security and privacy practices of mHealth apps [<xref ref-type="bibr" rid="ref95">95</xref>,<xref ref-type="bibr" rid="ref96">96</xref>]. Moreover, app stores need to establish processes that ensure protection of information security and privacy prior to making apps publicly accessible, at least, for apps with high potential damage and value to third parties. App developers and providers need to implement appropriate security measures to protect information security and privacy. While ease of app development, free access to helpful apps, and fast dissemination of innovations is desirable, it is imperative that these do not come at the price of lacking information security and privacy. Last, but not least, experienced users, researchers, and further independent entities need to contribute as well by identifying malicious and harmful apps, publishing their findings, and eliminating sources of harm and malice.</p>
                </sec>
            </sec>
            <sec>
                <title>Limitations</title>
                <p>Since we established a broad overview of available mHealth apps and assessed all discovered apps fitting our selection criteria, it was unfeasible to install and test all apps, so that we focused on the information provided in app stores. This is, however, a common approach, for example, [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>], which allowed us to analyze a large sample of over 30,000 apps. Moreover, we cannot ascertain how many of the English apps available on the Android App Store we discovered because the app store offers no complete listing of available apps and search results are limited to 500 apps. Extant reviews of apps in all categories offered in the Android App Store report around 20,000 apps offered in the categories Medial and Health &#38; Fitness. However, these reviews collected apps independent of language and did not assess whether the apps actually offer functionality fitting the categories Medical or Health &#38; Fitness. Our diverse wordlist, comprised of 111,632 distinct words and phrases (see <xref ref-type="app" rid="app1">Multimedia Appendices 1</xref> or <xref ref-type="app" rid="app2">2</xref>), introduced diversity to search queries and led to the discovery of a wide array of apps, while avoiding bias towards specific types of apps. Creation of search strings based on English words favored discovery of apps offered in English. While this may have reduced the number of discovered Android apps, it suits our research approach and objectives because apps not available in English were excluded from further assessment. Nevertheless, the reported difference in number of apps available on iOS and Android should be treated with care. For now, the iOS and Android App Stores offer far more apps than any other app store [<xref ref-type="bibr" rid="ref8">8</xref>]. The dominant position of iOS and Android supports our focus on the iOS and Android App Store.</p>
            </sec>
            <sec>
                <title>Conclusions</title>
                <p>The iOS and Android App Stores offer a wide selection of mHealth apps. Analysis of rating counts indicates, however, that less than a quarter of available apps are in more or less widespread use. An issue impeding app dissemination might be users&#8217; information security and privacy concerns [<xref ref-type="bibr" rid="ref15">15</xref>]. Our cluster analysis shows that most mHealth apps require access to sensitive personal information or offer other services potentially impacting users&#8217; treatment or state of health, which increases the potential damage through information security and privacy infringements. The diversity of mHealth apps prevents, however, a one-size-fits-all approach to ensuring information security and privacy of mHealth apps. To address arising challenges, app providers, developers, stores, as well as users, must be sensitized to potential threats and further research and development efforts are required to facilitate protection from information security and privacy infringements. It would be undesirable to diminish or undermine the promising potential of mHealth apps to transform and improve the health care environment [<xref ref-type="bibr" rid="ref2">2</xref>] through lacking attention to information security and privacy.</p>
            </sec>
        </sec>
    </body>
    <back>
        <app-group>
            <app id="app1">
                <title>Multimedia Appendix 1</title>
                <p>Word list used for construction of search queries for Android app discovery.</p>
                <media xlink:href="mhealth_v3i1e8_app1.csv" xlink:title="CSV File, 1MB" />
            </app>
            <app id="app2">
                <title>Multimedia Appendix 2</title>
                <p>Word list used for construction of search queries for Android app discovery (alternate version in Microsoft Word format with new lines as seperator).</p>
                <media xlink:href="mhealth_v3i1e8_app2.doc" xlink:title="DOC File, 3MB" />
            </app>
        </app-group>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb2">AT</term>
                    <def>
                        <p>app archetype</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">HTML</term>
                    <def>
                        <p>Hyper Text Markup Language</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">IT</term>
                    <def>
                        <p>information technology</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">mHealth</term>
                    <def>
                        <p>mobile health</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ack>
            <p>Required computing resources were provided by the Regional Computing Center of the University of Cologne.</p>
        </ack>
        <fn-group>
            <fn fn-type="con">
                <p>AS, SS, and TD conceived of the project. AS, FG, and TD wrote the manuscript. FG, SS, and TD conducted data acquisition and analysis. TD performed the statistical analyses. SS and TD implemented required custom software.</p>
            </fn>
            <fn fn-type="conflict">
                <p>None declared.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Collins</surname>
                            <given-names>F</given-names>
                        </name>
                    </person-group>
                    <source>Sci Am</source>
                    <year>2012</year>
                    <month>07</month>
                    <day>10</day>
                    <access-date>2014-12-29</access-date>
                    <comment>The real promise of mobile health apps<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.scientificamerican.com/article/real-promise-mobile-health-apps/">http://www.scientificamerican.com/article/real-promise-mobile-health-apps/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VBe0HmL4</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Steinhubl</surname>
                            <given-names>SR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Muse</surname>
                            <given-names>ED</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Topol</surname>
                            <given-names>EJ</given-names>
                        </name>
                    </person-group>
                    <article-title>Can mobile health technologies transform health care?</article-title>
                    <source>JAMA</source>
                    <year>2013</year>
                    <month>12</month>
                    <day>11</day>
                    <volume>310</volume>
                    <issue>22</issue>
                    <fpage>2395</fpage>
                    <lpage>2396</lpage>
                    <pub-id pub-id-type="doi">10.1001/jama.2013.281078</pub-id>
                    <pub-id pub-id-type="medline">24158428</pub-id>
                    <pub-id pub-id-type="pii">1762473</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kumar</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nilsen</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pavel</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Srivastava</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Mobile health: Revolutionizing healthcare through transdisciplinary research</article-title>
                    <source>Computer</source>
                    <year>2013</year>
                    <month>01</month>
                    <volume>46</volume>
                    <issue>1</issue>
                    <fpage>28</fpage>
                    <lpage>35</lpage>
                    <pub-id pub-id-type="doi">10.1109/MC.2012.392</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mechael</surname>
                            <given-names>PN</given-names>
                        </name>
                    </person-group>
                    <article-title>The case for mHealth in developing countries</article-title>
                    <source>Innovations: Technology, Governance, Globalization</source>
                    <year>2009</year>
                    <month>01</month>
                    <volume>4</volume>
                    <issue>1</issue>
                    <fpage>103</fpage>
                    <lpage>118</lpage>
                    <pub-id pub-id-type="doi">10.1162/itgg.2009.4.1.103</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Istepanian</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jovanov</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Zhang</surname>
                            <given-names>YT</given-names>
                        </name>
                    </person-group>
                    <article-title>Introduction to the special section on M-Health: Beyond seamless mobility and global wireless health-care connectivity</article-title>
                    <source>IEEE Trans Inf Technol Biomed</source>
                    <year>2004</year>
                    <month>12</month>
                    <volume>8</volume>
                    <issue>4</issue>
                    <fpage>405</fpage>
                    <lpage>414</lpage>
                    <pub-id pub-id-type="medline">15615031</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sunyaev</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Consumer facing health care systems</article-title>
                    <source>e-Service Journal</source>
                    <year>2014</year>
                    <month>01</month>
                    <volume>9</volume>
                    <issue>2</issue>
                    <fpage>1</fpage>
                    <lpage>23</lpage>
                    <pub-id pub-id-type="doi">10.2979/eservicej.9.2.1</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Anthes</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>HTML5 leads a web revolution</article-title>
                    <source>Commun. ACM</source>
                    <year>2012</year>
                    <month>07</month>
                    <day>01</day>
                    <volume>55</volume>
                    <issue>7</issue>
                    <fpage>16</fpage>
                    <lpage>17</lpage>
                    <pub-id pub-id-type="doi">10.1145/2209249.2209256</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>d'Heureuse</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Huici</surname>
                            <given-names>F</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arumaithurai</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ahmed</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Papagiannaki</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Niccolini</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>What's app?</article-title>
                    <source>SIGMOBILE Mob. Comput. Commun. Rev</source>
                    <year>2012</year>
                    <month>11</month>
                    <day>12</day>
                    <volume>16</volume>
                    <issue>2</issue>
                    <fpage>16</fpage>
                    <lpage>27</lpage>
                    <pub-id pub-id-type="doi">10.1145/2396756.2396759</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mu&#241;oz</surname>
                            <given-names>Rf</given-names>
                        </name>
                    </person-group>
                    <article-title>Using evidence-based internet interventions to reduce health disparities worldwide</article-title>
                    <source>J Med Internet Res</source>
                    <year>2010</year>
                    <volume>12</volume>
                    <issue>5</issue>
                    <fpage>e60</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2010/5/e60/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1463</pub-id>
                    <pub-id pub-id-type="medline">21169162</pub-id>
                    <pub-id pub-id-type="pii">v12i5e60</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3057307</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Chomutare</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fernandez-Luque</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arsand</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hartvigsen</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Features of mobile diabetes applications: Review of the literature and analysis of current applications compared against evidence-based guidelines</article-title>
                    <source>J Med Internet Res</source>
                    <year>2011</year>
                    <volume>13</volume>
                    <issue>3</issue>
                    <fpage>e65</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/3/e65/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1874</pub-id>
                    <pub-id pub-id-type="medline">21979293</pub-id>
                    <pub-id pub-id-type="pii">v13i3e65</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3222161</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mart&#237;nez-P&#233;rez</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>de la Torre-D&#237;ez</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>L&#243;pez-Coronado</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Mobile health applications for the most prevalent conditions by the World Health Organization: Review and analysis</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>6</issue>
                    <fpage>e120</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/6/e120/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2600</pub-id>
                    <pub-id pub-id-type="medline">23770578</pub-id>
                    <pub-id pub-id-type="pii">v15i6e120</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3713954</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Haddad</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Selsky</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hoffman</surname>
                            <given-names>JE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kravitz</surname>
                            <given-names>RL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Estrin</surname>
                            <given-names>DE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sim</surname>
                            <given-names>I</given-names>
                        </name>
                    </person-group>
                    <article-title>Making sense of mobile health data: An open architecture to improve individual- and population-level health</article-title>
                    <source>J Med Internet Res</source>
                    <year>2012</year>
                    <volume>14</volume>
                    <issue>4</issue>
                    <fpage>e112</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2012/4/e112/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2152</pub-id>
                    <pub-id pub-id-type="medline">22875563</pub-id>
                    <pub-id pub-id-type="pii">v14i4e112</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3510692</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Simon</surname>
                            <given-names>SR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Evans</surname>
                            <given-names>JS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Benjamin</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Delano</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                    </person-group>
                    <article-title>Patients' attitudes toward electronic health information exchange: Qualitative study</article-title>
                    <source>J Med Internet Res</source>
                    <year>2009</year>
                    <volume>11</volume>
                    <issue>3</issue>
                    <fpage>e30</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2009/3/e30/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1164</pub-id>
                    <pub-id pub-id-type="medline">19674960</pub-id>
                    <pub-id pub-id-type="pii">v11i3e30</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2762851</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dhopeshwarkar</surname>
                            <given-names>RV</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kern</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>O'Donnell</surname>
                            <given-names>HC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Edwards</surname>
                            <given-names>AM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kaushal</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <article-title>Health care consumers' preferences around health information exchange</article-title>
                    <source>Ann Fam Med</source>
                    <year>2012</year>
                    <volume>10</volume>
                    <issue>5</issue>
                    <fpage>428</fpage>
                    <lpage>434</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.annfammed.org/cgi/pmidlookup?view=long&#38;pmid=22966106" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1370/afm.1396</pub-id>
                    <pub-id pub-id-type="medline">22966106</pub-id>
                    <pub-id pub-id-type="pii">10/5/428</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3438210</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Khalid</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Shihab</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nagappan</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hassan</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>What do mobile app users complain about? A study on free iOS apps</article-title>
                    <source>IEEE Softw</source>
                    <year>2014</year>
                    <volume>PrePrints</volume>
                    <fpage>1</fpage>
                    <lpage>1</lpage>
                    <pub-id pub-id-type="doi">10.1109/MS.2014.50</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>B&#233;langer</surname>
                            <given-names>F</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Crossler</surname>
                            <given-names>RE</given-names>
                        </name>
                    </person-group>
                    <source>MIS Q</source>
                    <year>2011</year>
                    <access-date>2015-01-12</access-date>
                    <comment>Privacy in the digital age: A review of information privacy research in information systems<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://misq.org/cat-articles/privacy-in-the-digital-age-a-review-of-information-privacy-research-in-information-systems.html">http://misq.org/cat-articles/privacy-in-the-digital-age-a-review-of-information-privacy-research-in-information-systems.html</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VbJ8Iq6s</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Anderson</surname>
                            <given-names>CL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Agarwal</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <article-title>The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information</article-title>
                    <source>Information Systems Research</source>
                    <year>2011</year>
                    <month>09</month>
                    <volume>22</volume>
                    <issue>3</issue>
                    <fpage>469</fpage>
                    <lpage>490</lpage>
                    <pub-id pub-id-type="doi">10.1287/isre.1100.0335</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Avancha</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Baxi</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kotz</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy in mobile technology for personal healthcare</article-title>
                    <source>ACM Comput. Surv</source>
                    <year>2012</year>
                    <month>11</month>
                    <day>01</day>
                    <volume>45</volume>
                    <issue>1</issue>
                    <fpage>1</fpage>
                    <lpage>54</lpage>
                    <pub-id pub-id-type="doi">10.1145/2379776.2379779</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lane</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Miluzzo</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lu</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Peebles</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Choudhury</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Campbell</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>A survey of mobile phone sensing</article-title>
                    <source>IEEE Commun. Mag</source>
                    <year>2010</year>
                    <month>09</month>
                    <volume>48</volume>
                    <issue>9</issue>
                    <fpage>140</fpage>
                    <lpage>150</lpage>
                    <pub-id pub-id-type="doi">10.1109/MCOM.2010.5560598</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Weiss</surname>
                            <given-names>GM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lockhart</surname>
                            <given-names>JW</given-names>
                        </name>
                    </person-group>
                    <article-title>The impact of personalization on smartphone-based activity recognition</article-title>
                    <year>2012</year>
                    <conf-name>Proc Act Context Represent Workshop</conf-name>
                    <conf-date>July 22-23, 2012</conf-date>
                    <conf-loc>Toronto, Canada</conf-loc>
                    <fpage>98</fpage>
                    <lpage>104</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.aaai.org/ocs/index.php/WS/AAAIW12/paper/viewFile/5203/5564" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="web">
                    <source>Apple</source>
                    <year>2014</year>
                    <access-date>2014-12-29</access-date>
                    <comment>Apple iTunes App Store<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://itunes.apple.com/us/genre/ios/id36?mt=8">https://itunes.apple.com/us/genre/ios/id36?mt=8</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VBeRBI0n</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="web">
                    <source>Google</source>
                    <year>2014</year>
                    <access-date>2014-12-29</access-date>
                    <comment>Google Play App Store<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://play.google.com/store/apps">https://play.google.com/store/apps</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VBeUxkIm</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Barak</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Klein</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Proudfoot</surname>
                            <given-names>JG</given-names>
                        </name>
                    </person-group>
                    <article-title>Defining internet-supported therapeutic interventions</article-title>
                    <source>Ann Behav Med</source>
                    <year>2009</year>
                    <month>08</month>
                    <volume>38</volume>
                    <issue>1</issue>
                    <fpage>4</fpage>
                    <lpage>17</lpage>
                    <pub-id pub-id-type="doi">10.1007/s12160-009-9130-7</pub-id>
                    <pub-id pub-id-type="medline">19787305</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Enck</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Octeau</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McDaniel</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chaudhuri</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <source>A study of Android application security</source>
                    <year>2011</year>
                    <access-date>2015-01-12</access-date>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>USENIX Association</publisher-name>
                    <comment>A study of Android application security<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://static.usenix.org/legacy/events/sec11/tech/full_papers/Enck.pdf">http://static.usenix.org/legacy/events/sec11/tech/full_papers/Enck.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VbJsumQl</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Goth</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Analyzing medical data</article-title>
                    <source>Commun. ACM</source>
                    <year>2012</year>
                    <month>06</month>
                    <day>01</day>
                    <volume>55</volume>
                    <issue>6</issue>
                    <fpage>13</fpage>
                    <lpage>15</lpage>
                    <pub-id pub-id-type="doi">10.1145/2184319.2184324</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Chin</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Felt</surname>
                            <given-names>AP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Greenwood</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wagner</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Analyzing inter-application communication in Android</article-title>
                    <year>2011</year>
                    <conf-name>Int Conf Mob Syst Appl Serv</conf-name>
                    <conf-date>June 28 - July 1, 2011</conf-date>
                    <conf-loc>Washington, DC, USA</conf-loc>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>239</fpage>
                    <lpage>252</lpage>
                    <pub-id pub-id-type="doi">10.1145/1999995.2000018</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Egele</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kruegel</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kirda</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Vigna</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>PiOS: Detecting privacy leaks in iOS applications</article-title>
                    <year>2011</year>
                    <conf-name>Netw Distrib Syst Secur Symp</conf-name>
                    <conf-date>February 6-9, 2011</conf-date>
                    <conf-loc>San Dieg0, CA, USA</conf-loc>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>The Internet Society</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.internetsociety.org/sites/default/files/egel.pdf" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wicker</surname>
                            <given-names>SB</given-names>
                        </name>
                    </person-group>
                    <article-title>The loss of location privacy in the cellular age</article-title>
                    <source>Commun. ACM</source>
                    <year>2012</year>
                    <month>08</month>
                    <day>01</day>
                    <volume>55</volume>
                    <issue>8</issue>
                    <fpage>60</fpage>
                    <lpage>68</lpage>
                    <pub-id pub-id-type="doi">10.1145/2240236.2240255</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Liccardi</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pato</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Weitzner</surname>
                            <given-names>DJ</given-names>
                        </name>
                    </person-group>
                    <source>J Priv Confidentiality</source>
                    <year>2013</year>
                    <access-date>2015-01-12</access-date>
                    <comment>Improving mobile app selection through transparency and better permission analysis<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://repository.cmu.edu/cgi/viewcontent.cgi?article=1102&#38;context=jpc">http://repository.cmu.edu/cgi/viewcontent.cgi?article=1102&#38;context=jpc</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VbKZXQeN</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Estrin</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sim</surname>
                            <given-names>I</given-names>
                        </name>
                    </person-group>
                    <article-title>Health care delivery. Open mHealth architecture: An engine for health care innovation</article-title>
                    <source>Science</source>
                    <year>2010</year>
                    <month>11</month>
                    <day>5</day>
                    <volume>330</volume>
                    <issue>6005</issue>
                    <fpage>759</fpage>
                    <lpage>760</lpage>
                    <pub-id pub-id-type="doi">10.1126/science.1196187</pub-id>
                    <pub-id pub-id-type="medline">21051617</pub-id>
                    <pub-id pub-id-type="pii">330/6005/759</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Heitk&#246;tter</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Majchrzak</surname>
                            <given-names>TA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kuchen</surname>
                            <given-names>H</given-names>
                        </name>
                    </person-group>
                    <article-title>Cross-platform model-driven development of mobile applications with md2</article-title>
                    <year>2013</year>
                    <conf-name>Annu ACM Symp Appl Comput</conf-name>
                    <conf-date>March 18-22, 2013</conf-date>
                    <conf-loc>Coimbra, Portugal</conf-loc>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>526</fpage>
                    <lpage>533</lpage>
                    <pub-id pub-id-type="doi">10.1145/2480362.2480464</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mojica</surname>
                            <given-names>IJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Adams</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nagappan</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dienst</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Berger</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hassan</surname>
                            <given-names>AE</given-names>
                        </name>
                    </person-group>
                    <article-title>A large-scale empirical study on software reuse in mobile apps</article-title>
                    <source>IEEE Softw</source>
                    <year>2014</year>
                    <month>3</month>
                    <volume>31</volume>
                    <issue>2</issue>
                    <fpage>78</fpage>
                    <lpage>86</lpage>
                    <pub-id pub-id-type="doi">10.1109/MS.2013.142</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Freifeld</surname>
                            <given-names>CC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chunara</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mekaru</surname>
                            <given-names>SR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chan</surname>
                            <given-names>EH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kass-Hout</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ayala Iacucci</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Brownstein</surname>
                            <given-names>JS</given-names>
                        </name>
                    </person-group>
                    <article-title>Participatory epidemiology: Use of mobile phones for community-based health reporting</article-title>
                    <source>PLoS Med</source>
                    <year>2010</year>
                    <volume>7</volume>
                    <issue>12</issue>
                    <fpage>e1000376</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pmed.1000376" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1371/journal.pmed.1000376</pub-id>
                    <pub-id pub-id-type="medline">21151888</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2998443</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ozdalga</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ozdalga</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ahuja</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <article-title>The smartphone in medicine: A review of current and potential use among physicians and students</article-title>
                    <source>J Med Internet Res</source>
                    <year>2012</year>
                    <volume>14</volume>
                    <issue>5</issue>
                    <fpage>e128</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2012/5/e128/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1994</pub-id>
                    <pub-id pub-id-type="medline">23017375</pub-id>
                    <pub-id pub-id-type="pii">v14i5e128</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3510747</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Pathak</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hu</surname>
                            <given-names>YC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Zhang</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Where is the energy spent inside my App?: Fine grained energy accounting on smartphones with Eprof</article-title>
                    <year>2012</year>
                    <conf-name>ACM Eur Conf Comput Syst</conf-name>
                    <conf-date>April 10–13, 2012</conf-date>
                    <conf-loc>Bern, Switzerland</conf-loc>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>29</fpage>
                    <lpage>42</lpage>
                    <pub-id pub-id-type="doi">10.1145/2168836.2168841</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Xu</surname>
                            <given-names>Q</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Erman</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gerber</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mao</surname>
                            <given-names>ZM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pang</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Venkataraman</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Identifying diverse usage behaviors of smartphone apps</article-title>
                    <year>2011</year>
                    <conf-name>ACM SIGCOMM Conf Internet Meas Conf</conf-name>
                    <conf-date>November 2–4, 2011</conf-date>
                    <conf-loc>Berlin, Germany</conf-loc>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>329</fpage>
                    <lpage>344</lpage>
                    <pub-id pub-id-type="doi">10.1145/2068816.2068847</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Xu</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gupta</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rosson</surname>
                            <given-names>MB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carroll</surname>
                            <given-names>JM</given-names>
                        </name>
                    </person-group>
                    <article-title>Measuring mobile users' concerns for information privacy</article-title>
                    <year>2012</year>
                    <conf-name>Int Conf Inf Syst</conf-name>
                    <conf-date>December 16-19, 2012</conf-date>
                    <conf-loc>Orlando, FL, USA</conf-loc>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1108&#38;context=icis2012" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref38">
                <label>38</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Food and Drug Administration</collab>
                    </person-group>
                    <source>Mobile medical applications - guidance for industry and food and drug administration staff</source>
                    <year>2013</year>
                    <access-date>2015-01-01</access-date>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>Food and Drug Administration</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM263366.pdf">http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM263366.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VGNj7A6h</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref39">
                <label>39</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>European Commision</collab>
                    </person-group>
                    <source>Proposal for a regulation of the European Parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation)</source>
                    <year>2012</year>
                    <access-date>2015-01-01</access-date>
                    <publisher-loc>Brussels, Belgium</publisher-loc>
                    <publisher-name>European Commission</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52012PC0011&#38;from=en">http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52012PC0011&#38;from=en</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VGO0XR8G</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref40">
                <label>40</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>West</surname>
                            <given-names>JH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hall</surname>
                            <given-names>PC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hanson</surname>
                            <given-names>CL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Barnes</surname>
                            <given-names>MD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Giraud-Carrier</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Barrett</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>There's an app for that: Content analysis of paid health and fitness apps</article-title>
                    <source>J Med Internet Res</source>
                    <year>2012</year>
                    <volume>14</volume>
                    <issue>3</issue>
                    <fpage>e72</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2012/3/e72/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1977</pub-id>
                    <pub-id pub-id-type="medline">22584372</pub-id>
                    <pub-id pub-id-type="pii">v14i3e72</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3799565</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref41">
                <label>41</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Plaza</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Demarzo</surname>
                            <given-names>MM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Herrera-Mercadal</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Garc&#237;a-Campayo</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Mindfulness-based mobile applications: Literature review and analysis of current features</article-title>
                    <source>JMIR Mhealth Uhealth</source>
                    <year>2013</year>
                    <volume>1</volume>
                    <issue>2</issue>
                    <fpage>e24</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2013/2/e24/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/mhealth.2733</pub-id>
                    <pub-id pub-id-type="medline">25099314</pub-id>
                    <pub-id pub-id-type="pii">v1i2e24</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4114453</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref42">
                <label>42</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mart&#237;nez-P&#233;rez</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>de la Torre-D&#237;ez</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>L&#243;pez-Coronado</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Herreros-Gonz&#225;lez</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Mobile apps in cardiology: Review</article-title>
                    <source>JMIR Mhealth Uhealth</source>
                    <year>2013</year>
                    <month>07</month>
                    <day>24</day>
                    <volume>1</volume>
                    <issue>2</issue>
                    <fpage>e15</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2013/2/e15/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/mhealth.2737</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref43">
                <label>43</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bierbrier</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lo</surname>
                            <given-names>V</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wu</surname>
                            <given-names>RC</given-names>
                        </name>
                    </person-group>
                    <article-title>Evaluation of the accuracy of smartphone medical calculation apps</article-title>
                    <source>J Med Internet Res</source>
                    <year>2014</year>
                    <volume>16</volume>
                    <issue>2</issue>
                    <fpage>e32</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2014/2/e32/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.3062</pub-id>
                    <pub-id pub-id-type="medline">24491911</pub-id>
                    <pub-id pub-id-type="pii">v16i2e32</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3936266</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref44">
                <label>44</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bender</surname>
                            <given-names>JL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Yue</surname>
                            <given-names>RY</given-names>
                        </name>
                        <name name-style="western">
                            <surname>To</surname>
                            <given-names>MJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Deacken</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jadad</surname>
                            <given-names>AR</given-names>
                        </name>
                    </person-group>
                    <article-title>A lot of action, but not in the right direction: Systematic review and content analysis of smartphone applications for the prevention, detection, and management of cancer</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>12</issue>
                    <fpage>e287</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/12/e287/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2661</pub-id>
                    <pub-id pub-id-type="medline">24366061</pub-id>
                    <pub-id pub-id-type="pii">v15i12e287</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3875901</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref45">
                <label>45</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Donker</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Petrie</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Proudfoot</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Clarke</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Birch</surname>
                            <given-names>MR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Christensen</surname>
                            <given-names>H</given-names>
                        </name>
                    </person-group>
                    <article-title>Smartphones for smarter delivery of mental health programs: A systematic review</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>11</issue>
                    <fpage>e247</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/11/e247/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2791</pub-id>
                    <pub-id pub-id-type="medline">24240579</pub-id>
                    <pub-id pub-id-type="pii">v15i11e247</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3841358</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref46">
                <label>46</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Muessig</surname>
                            <given-names>KE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pike</surname>
                            <given-names>EC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Legrand</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hightow-Weidman</surname>
                            <given-names>LB</given-names>
                        </name>
                    </person-group>
                    <article-title>Mobile phone applications for the care and prevention of HIV and other sexually transmitted diseases: A review</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>1</issue>
                    <fpage>e1</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/1/e1/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2301</pub-id>
                    <pub-id pub-id-type="medline">23291245</pub-id>
                    <pub-id pub-id-type="pii">v15i1e1</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3636069</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref47">
                <label>47</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mosa</surname>
                            <given-names>AS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Yoo</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sheets</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>A systematic review of healthcare applications for smartphones</article-title>
                    <source>BMC Med Inform Decis Mak</source>
                    <year>2012</year>
                    <volume>12</volume>
                    <fpage>67</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1472-6947/12/67" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1186/1472-6947-12-67</pub-id>
                    <pub-id pub-id-type="medline">22781312</pub-id>
                    <pub-id pub-id-type="pii">1472-6947-12-67</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3534499</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref48">
                <label>48</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mart&#237;nez-P&#233;rez</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>de la Torre-D&#237;ez</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>L&#243;pez-Coronado</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sainz-De-Abajo</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <article-title>Comparison of mobile apps for the leading causes of death among different income zones: A review of the literature and app stores</article-title>
                    <source>JMIR Mhealth Uhealth</source>
                    <year>2014</year>
                    <volume>2</volume>
                    <issue>1</issue>
                    <fpage>e1</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2014/1/e1/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/mhealth.2779</pub-id>
                    <pub-id pub-id-type="medline">25099695</pub-id>
                    <pub-id pub-id-type="pii">v2i1e1</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4114467</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref49">
                <label>49</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Huckvale</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Car</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Morrison</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Car</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Apps for asthma self-management: A systematic assessment of content and tools</article-title>
                    <source>BMC Med</source>
                    <year>2012</year>
                    <volume>10</volume>
                    <fpage>144</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1741-7015/10/144" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1186/1741-7015-10-144</pub-id>
                    <pub-id pub-id-type="medline">23171675</pub-id>
                    <pub-id pub-id-type="pii">1741-7015-10-144</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3523082</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref50">
                <label>50</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wolf</surname>
                            <given-names>JA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Moreau</surname>
                            <given-names>JF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Akilov</surname>
                            <given-names>O</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Patton</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>English</surname>
                            <given-names>JC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ho</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ferris</surname>
                            <given-names>LK</given-names>
                        </name>
                    </person-group>
                    <article-title>Diagnostic inaccuracy of smartphone applications for melanoma detection</article-title>
                    <source>JAMA Dermatol</source>
                    <year>2013</year>
                    <month>04</month>
                    <volume>149</volume>
                    <issue>4</issue>
                    <fpage>422</fpage>
                    <lpage>426</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23325302" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1001/jamadermatol.2013.2382</pub-id>
                    <pub-id pub-id-type="medline">23325302</pub-id>
                    <pub-id pub-id-type="pii">1557488</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4019431</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref51">
                <label>51</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Breton</surname>
                            <given-names>ER</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fuemmeler</surname>
                            <given-names>BF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Abroms</surname>
                            <given-names>LC</given-names>
                        </name>
                    </person-group>
                    <article-title>Weight loss-there is an app for that! But does it adhere to evidence-informed practices?</article-title>
                    <source>Transl Behav Med</source>
                    <year>2011</year>
                    <month>12</month>
                    <volume>1</volume>
                    <issue>4</issue>
                    <fpage>523</fpage>
                    <lpage>529</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24073074" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1007/s13142-011-0076-5</pub-id>
                    <pub-id pub-id-type="medline">24073074</pub-id>
                    <pub-id pub-id-type="pii">76</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3717669</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref52">
                <label>52</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rosser</surname>
                            <given-names>BA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Eccleston</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <article-title>Smartphone applications for pain management</article-title>
                    <source>J Telemed Telecare</source>
                    <year>2011</year>
                    <volume>17</volume>
                    <issue>6</issue>
                    <fpage>308</fpage>
                    <lpage>312</lpage>
                    <pub-id pub-id-type="doi">10.1258/jtt.2011.101102</pub-id>
                    <pub-id pub-id-type="medline">21844177</pub-id>
                    <pub-id pub-id-type="pii">jtt.2011.101102</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref53">
                <label>53</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Abroms</surname>
                            <given-names>LC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Padmanabhan</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Thaweethai</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Phillips</surname>
                            <given-names>T</given-names>
                        </name>
                    </person-group>
                    <article-title>iPhone apps for smoking cessation: A content analysis</article-title>
                    <source>Am J Prev Med</source>
                    <year>2011</year>
                    <month>03</month>
                    <volume>40</volume>
                    <issue>3</issue>
                    <fpage>279</fpage>
                    <lpage>285</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21335258" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1016/j.amepre.2010.10.032</pub-id>
                    <pub-id pub-id-type="medline">21335258</pub-id>
                    <pub-id pub-id-type="pii">S0749-3797(10)00708-7</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3395318</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref54">
                <label>54</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Liu</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Zhu</surname>
                            <given-names>Q</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Holroyd</surname>
                            <given-names>KA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Seng</surname>
                            <given-names>EK</given-names>
                        </name>
                    </person-group>
                    <article-title>Status and trends of mobile-health applications for iOS devices: A developer's perspective</article-title>
                    <source>Journal of Systems and Software</source>
                    <year>2011</year>
                    <month>11</month>
                    <volume>84</volume>
                    <issue>11</issue>
                    <fpage>2022</fpage>
                    <lpage>2033</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.jss.2011.06.049</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref55">
                <label>55</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lewis</surname>
                            <given-names>TL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wyatt</surname>
                            <given-names>JC</given-names>
                        </name>
                    </person-group>
                    <article-title>mHealth and mobile medical Apps: A framework to assess risk and promote safer use</article-title>
                    <source>J Med Internet Res</source>
                    <year>2014</year>
                    <volume>16</volume>
                    <issue>9</issue>
                    <fpage>e210</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2014/9/e210/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.3133</pub-id>
                    <pub-id pub-id-type="medline">25223398</pub-id>
                    <pub-id pub-id-type="pii">v16i9e210</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4180335</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref56">
                <label>56</label>
                <nlm-citation citation-type="web">
                    <source>android-market-api</source>
                    <year>2014</year>
                    <access-date>2014-02-14</access-date>
                    <comment>An open-source API for the Android market<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://code.google.com/p/android-market-api/">http://code.google.com/p/android-market-api/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6NNh225JS</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref57">
                <label>57</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Viennot</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Garcia</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nieh</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>A measurement study of Google Play</article-title>
                    <year>2014</year>
                    <conf-name>ACM Int Conf Meas Model Comput Syst</conf-name>
                    <conf-date>June 16–20, 2014</conf-date>
                    <conf-loc>Austin, TX, USA</conf-loc>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>221</fpage>
                    <lpage>233</lpage>
                    <pub-id pub-id-type="doi">10.1145/2591971.2592003</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref58">
                <label>58</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>SIL International Linguistics Department</collab>
                    </person-group>
                    <source>English wordlists</source>
                    <year>2014</year>
                    <access-date>2014-02-17</access-date>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www-01.sil.org/linguistics/wordlists/english/">http://www-01.sil.org/linguistics/wordlists/english/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6NS0EItXU</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref59">
                <label>59</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Faro</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lecroq</surname>
                            <given-names>T</given-names>
                        </name>
                    </person-group>
                    <source>Festschr Bořivoj Melichar Prague, Czech Republic</source>
                    <year>2012</year>
                    <access-date>2015-01-07</access-date>
                    <publisher-loc>Prague, Czech Republic</publisher-loc>
                    <publisher-name>Prague Stringology Club</publisher-name>
                    <comment>Twenty years of bit-parallelism in string matching<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.stringology.org/papers/Festschrift_BM70.pdf">http://www.stringology.org/papers/Festschrift_BM70.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6VPW34gIe</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref60">
                <label>60</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Jain</surname>
                            <given-names>AK</given-names>
                        </name>
                    </person-group>
                    <article-title>Data clustering: 50 years beyond K-means</article-title>
                    <source>Pattern Recognition Letters</source>
                    <year>2010</year>
                    <month>6</month>
                    <volume>31</volume>
                    <issue>8</issue>
                    <fpage>651</fpage>
                    <lpage>666</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.patrec.2009.09.011</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref61">
                <label>61</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Newman</surname>
                            <given-names>MEJ</given-names>
                        </name>
                    </person-group>
                    <article-title>The structure and function of complex networks</article-title>
                    <source>SIAM Rev</source>
                    <year>2003</year>
                    <month>01</month>
                    <volume>45</volume>
                    <issue>2</issue>
                    <fpage>167</fpage>
                    <lpage>256</lpage>
                    <pub-id pub-id-type="doi">10.1137/S003614450342480</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref62">
                <label>62</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Blondel</surname>
                            <given-names>VD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Guillaume</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lambiotte</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lefebvre</surname>
                            <given-names>E</given-names>
                        </name>
                    </person-group>
                    <article-title>Fast unfolding of communities in large networks</article-title>
                    <source>J. Stat. Mech</source>
                    <year>2008</year>
                    <month>10</month>
                    <day>09</day>
                    <volume>2008</volume>
                    <issue>10</issue>
                    <fpage>P10008</fpage>
                    <pub-id pub-id-type="doi">10.1088/1742-5468/2008/10/P10008</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref63">
                <label>63</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Newman</surname>
                            <given-names>ME</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Girvan</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Finding and evaluating community structure in networks</article-title>
                    <source>Phys Rev E Stat Nonlin Soft Matter Phys</source>
                    <year>2004</year>
                    <month>02</month>
                    <volume>69</volume>
                    <issue>2 Pt 2</issue>
                    <fpage>026113</fpage>
                    <pub-id pub-id-type="medline">14995526</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref64">
                <label>64</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lancichinetti</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fortunato</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Community detection algorithms: A comparative analysis</article-title>
                    <source>Phys Rev E Stat Nonlin Soft Matter Phys</source>
                    <year>2009</year>
                    <month>11</month>
                    <volume>80</volume>
                    <issue>5 Pt 2</issue>
                    <fpage>056117</fpage>
                    <pub-id pub-id-type="medline">20365053</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref65">
                <label>65</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Tib&#233;ly</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kovanen</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Karsai</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kaski</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kert&#233;sz</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Saram&#228;ki</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Communities and beyond: Mesoscopic analysis of a large social network with complementary methods</article-title>
                    <source>Phys Rev E Stat Nonlin Soft Matter Phys</source>
                    <year>2011</year>
                    <month>05</month>
                    <volume>83</volume>
                    <issue>5 Pt 2</issue>
                    <fpage>056125</fpage>
                    <pub-id pub-id-type="medline">21728623</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref66">
                <label>66</label>
                <nlm-citation citation-type="web">
                    <source>Naveh B</source>
                    <year>2003</year>
                    <access-date>2014-02-21</access-date>
                    <comment>JGraphT<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jgrapht.org/">http://jgrapht.org/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6NYMn4Z4V</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref67">
                <label>67</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bakhtiyari Shahri</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>A tree model for identification of threats as the first stage of risk assessment in HIS</article-title>
                    <source>JIS</source>
                    <year>2012</year>
                    <volume>03</volume>
                    <issue>02</issue>
                    <fpage>169</fpage>
                    <lpage>176</lpage>
                    <pub-id pub-id-type="doi">10.4236/jis.2012.32020</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref68">
                <label>68</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kotz</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>A threat taxonomy for mHealth privacy</article-title>
                    <year>2011</year>
                    <conf-name>Int Conf Commun Syst Netw</conf-name>
                    <conf-date>Jan 4-8, 2011</conf-date>
                    <conf-loc>Bangalore, India</conf-loc>
                    <publisher-loc>Bangalore, India</publisher-loc>
                    <publisher-name>IEEE</publisher-name>
                    <pub-id pub-id-type="doi">10.1109/COMSNETS.2011.5716518</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref69">
                <label>69</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Goth</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Mobile security issues come to the forefront</article-title>
                    <source>IEEE Internet Comput</source>
                    <year>2012</year>
                    <month>5</month>
                    <volume>16</volume>
                    <issue>3</issue>
                    <fpage>7</fpage>
                    <lpage>9</lpage>
                    <pub-id pub-id-type="doi">10.1109/MIC.2012.54</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref70">
                <label>70</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dehling</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sunyaev</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Secure provision of patient-centered health information technology services in public networks&#8212;leveraging security and privacy features provided by the German nationwide health information technology infrastructure</article-title>
                    <source>Electron Markets</source>
                    <year>2014</year>
                    <month>2</month>
                    <day>8</day>
                    <volume>24</volume>
                    <issue>2</issue>
                    <fpage>89</fpage>
                    <lpage>99</lpage>
                    <pub-id pub-id-type="doi">10.1007/s12525-013-0150-6</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref71">
                <label>71</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rindfleisch</surname>
                            <given-names>TC</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy, information technology, and health care</article-title>
                    <source>Commun. ACM</source>
                    <year>1997</year>
                    <volume>40</volume>
                    <issue>8</issue>
                    <fpage>92</fpage>
                    <lpage>100</lpage>
                    <pub-id pub-id-type="doi">10.1145/257874.257896</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref72">
                <label>72</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rohm</surname>
                            <given-names>AJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Milne</surname>
                            <given-names>GR</given-names>
                        </name>
                    </person-group>
                    <article-title>Just what the doctor ordered</article-title>
                    <source>Journal of Business Research</source>
                    <year>2004</year>
                    <month>9</month>
                    <volume>57</volume>
                    <issue>9</issue>
                    <fpage>1000</fpage>
                    <lpage>1011</lpage>
                    <pub-id pub-id-type="doi">10.1016/S0148-2963(02)00345-4</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref73">
                <label>73</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Johnson</surname>
                            <given-names>ME</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name name-style="western">
                            <surname>Dingledine</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Golle</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <article-title>Data hemorrhages in the health-care sector</article-title>
                    <source>Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)</source>
                    <year>2009</year>
                    <publisher-loc>USA</publisher-loc>
                    <publisher-name>Springer</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref74">
                <label>74</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Appari</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Johnson</surname>
                            <given-names>ME</given-names>
                        </name>
                    </person-group>
                    <article-title>Information security and privacy in healthcare: Current state of research</article-title>
                    <source>IJIEM</source>
                    <year>2010</year>
                    <volume>6</volume>
                    <issue>4</issue>
                    <fpage>279</fpage>
                    <lpage>314</lpage>
                    <pub-id pub-id-type="doi">10.1504/IJIEM.2010.035624</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref75">
                <label>75</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Appelbaum</surname>
                            <given-names>PS</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy in psychiatric treatment: Threats and responses</article-title>
                    <source>Am J Psychiatry</source>
                    <year>2002</year>
                    <month>11</month>
                    <volume>159</volume>
                    <issue>11</issue>
                    <fpage>1809</fpage>
                    <lpage>1818</lpage>
                    <pub-id pub-id-type="medline">12411211</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref76">
                <label>76</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gritzalis</surname>
                            <given-names>DA</given-names>
                        </name>
                    </person-group>
                    <article-title>Enhancing security and improving interoperability in healthcare information systems</article-title>
                    <source>Med Inform (Lond)</source>
                    <year>1998</year>
                    <volume>23</volume>
                    <issue>4</issue>
                    <fpage>309</fpage>
                    <lpage>323</lpage>
                    <pub-id pub-id-type="medline">9922951</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref77">
                <label>77</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Shea</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Security versus access: Trade-offs are only part of the story</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>1994</year>
                    <volume>1</volume>
                    <issue>4</issue>
                    <fpage>314</fpage>
                    <lpage>315</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.oxfordjournals.org/cgi/pmidlookup?view=long&#38;pmid=7719814" />
                    </comment>
                    <pub-id pub-id-type="medline">7719814</pub-id>
                    <pub-id pub-id-type="pmcid">PMC116210</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref78">
                <label>78</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Barrows</surname>
                            <given-names>RC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Clayton</surname>
                            <given-names>PD</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy, confidentiality, and electronic medical records</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>1996</year>
                    <volume>3</volume>
                    <issue>2</issue>
                    <fpage>139</fpage>
                    <lpage>148</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.oxfordjournals.org/cgi/pmidlookup?view=long&#38;pmid=8653450" />
                    </comment>
                    <pub-id pub-id-type="medline">8653450</pub-id>
                    <pub-id pub-id-type="pmcid">PMC116296</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref79">
                <label>79</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rothstein</surname>
                            <given-names>MA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Talbott</surname>
                            <given-names>MK</given-names>
                        </name>
                    </person-group>
                    <article-title>Compelled authorizations for disclosure of health records: Magnitude and implications</article-title>
                    <source>Am J Bioeth</source>
                    <year>2007</year>
                    <month>03</month>
                    <volume>7</volume>
                    <issue>3</issue>
                    <fpage>38</fpage>
                    <lpage>45</lpage>
                    <pub-id pub-id-type="doi">10.1080/15265160601171887</pub-id>
                    <pub-id pub-id-type="medline">17366232</pub-id>
                    <pub-id pub-id-type="pii">772710532</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref80">
                <label>80</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Janson</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Olsson</surname>
                            <given-names>U</given-names>
                        </name>
                    </person-group>
                    <article-title>A measure of agreement for interval or nominal multivariate observations</article-title>
                    <source>Educational and Psychological Measurement</source>
                    <year>2001</year>
                    <month>04</month>
                    <day>01</day>
                    <volume>61</volume>
                    <issue>2</issue>
                    <fpage>277</fpage>
                    <lpage>289</lpage>
                    <pub-id pub-id-type="doi">10.1177/00131640121971239</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref81">
                <label>81</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Landis</surname>
                            <given-names>JR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Koch</surname>
                            <given-names>GG</given-names>
                        </name>
                    </person-group>
                    <article-title>The measurement of observer agreement for categorical data</article-title>
                    <source>Biometrics</source>
                    <year>1977</year>
                    <month>03</month>
                    <volume>33</volume>
                    <issue>1</issue>
                    <fpage>159</fpage>
                    <lpage>174</lpage>
                    <pub-id pub-id-type="medline">843571</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref82">
                <label>82</label>
                <nlm-citation citation-type="web">
                    <source>Merriam-Webster</source>
                    <year>2014</year>
                    <access-date>2014-06-26</access-date>
                    <comment>Archetype - definition<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.merriam-webster.com/dictionary/archetype">http://www.merriam-webster.com/dictionary/archetype</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6QdwYwRgI</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref83">
                <label>83</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Newman</surname>
                            <given-names>ME</given-names>
                        </name>
                    </person-group>
                    <article-title>Analysis of weighted networks</article-title>
                    <source>Phys Rev E Stat Nonlin Soft Matter Phys</source>
                    <year>2004</year>
                    <month>11</month>
                    <volume>70</volume>
                    <issue>5 Pt 2</issue>
                    <fpage>056131</fpage>
                    <pub-id pub-id-type="medline">15600716</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref84">
                <label>84</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Girardello</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Michahelles</surname>
                            <given-names>F</given-names>
                        </name>
                    </person-group>
                    <article-title>Explicit and implicit ratings for mobile applications</article-title>
                    <year>2010</year>
                    <conf-name>Informatik 2010</conf-name>
                    <conf-date>September 29 - October 1, 2010</conf-date>
                    <conf-loc>Leipzig, Germany</conf-loc>
                    <publisher-loc>Germany</publisher-loc>
                    <publisher-name>GI</publisher-name>
                    <fpage>606</fpage>
                    <lpage>612</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://subs.emis.de/LNI/Proceedings/Proceedings175/606.pdf" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref85">
                <label>85</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Pagano</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Maalej</surname>
                            <given-names>W</given-names>
                        </name>
                    </person-group>
                    <article-title>User feedback in the AppStore: An empirical study</article-title>
                    <year>2013</year>
                    <conf-name>IEEE International Conference on Requirements Engineering</conf-name>
                    <conf-date>July 15-19, 2013</conf-date>
                    <conf-loc>Rio De Janeiro, Brasil</conf-loc>
                    <publisher-name>IEEE</publisher-name>
                    <fpage>125</fpage>
                    <lpage>134</lpage>
                    <pub-id pub-id-type="doi">10.1109/RE.2013.6636712</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref86">
                <label>86</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Caligtan</surname>
                            <given-names>CA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dykes</surname>
                            <given-names>PC</given-names>
                        </name>
                    </person-group>
                    <article-title>Electronic health records and personal health records</article-title>
                    <source>Semin Oncol Nurs</source>
                    <year>2011</year>
                    <month>08</month>
                    <volume>27</volume>
                    <issue>3</issue>
                    <fpage>218</fpage>
                    <lpage>228</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.soncn.2011.04.007</pub-id>
                    <pub-id pub-id-type="medline">21783013</pub-id>
                    <pub-id pub-id-type="pii">S0749-2081(11)00035-0</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref87">
                <label>87</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dorr</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bonner</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cohen</surname>
                            <given-names>AN</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Shoai</surname>
                            <given-names>RS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Perrin</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chaney</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Young</surname>
                            <given-names>AS</given-names>
                        </name>
                    </person-group>
                    <article-title>Informatics systems to promote improved care for chronic illness: A literature review</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2007</year>
                    <volume>14</volume>
                    <issue>2</issue>
                    <fpage>156</fpage>
                    <lpage>163</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.oxfordjournals.org/cgi/pmidlookup?view=long&#38;pmid=17213491" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2255</pub-id>
                    <pub-id pub-id-type="medline">17213491</pub-id>
                    <pub-id pub-id-type="pii">M2255</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2213468</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref88">
                <label>88</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sunyaev</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Evaluation of Microsoft HealthVault and Google Health personal health records</article-title>
                    <source>Health Technol</source>
                    <year>2013</year>
                    <month>2</month>
                    <day>24</day>
                    <volume>3</volume>
                    <issue>1</issue>
                    <fpage>3</fpage>
                    <lpage>10</lpage>
                    <pub-id pub-id-type="doi">10.1007/s12553-013-0049-4</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref89">
                <label>89</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sunyaev</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chornyi</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Supporting chronic disease care quality</article-title>
                    <source>J. Data and Information Quality</source>
                    <year>2012</year>
                    <month>05</month>
                    <day>01</day>
                    <volume>3</volume>
                    <issue>2</issue>
                    <fpage>1</fpage>
                    <lpage>21</lpage>
                    <pub-id pub-id-type="doi">10.1145/2184442.2184443</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref90">
                <label>90</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hufnagel</surname>
                            <given-names>SP</given-names>
                        </name>
                    </person-group>
                    <article-title>Interoperability</article-title>
                    <source>Mil Med</source>
                    <year>2009</year>
                    <month>05</month>
                    <volume>174</volume>
                    <issue>5 Suppl</issue>
                    <fpage>43</fpage>
                    <lpage>50</lpage>
                    <pub-id pub-id-type="medline">19562961</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref91">
                <label>91</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Spiekermann</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>The challenges of privacy by design</article-title>
                    <source>Commun. ACM</source>
                    <year>2012</year>
                    <month>07</month>
                    <day>01</day>
                    <volume>55</volume>
                    <issue>7</issue>
                    <fpage>38</fpage>
                    <lpage>40</lpage>
                    <pub-id pub-id-type="doi">10.1145/2209249.2209263</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref92">
                <label>92</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Klasnja</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Consolvo</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Choudhury</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Beckwith</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hightower</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Exploring privacy concerns about personal sensing</article-title>
                    <year>2009</year>
                    <conf-name>Int Conf Pervasive Comput</conf-name>
                    <conf-date>May 11-14, 2009</conf-date>
                    <conf-loc>Nara, Japan</conf-loc>
                    <publisher-loc>Berlin, Germany</publisher-loc>
                    <publisher-name>Springer</publisher-name>
                    <fpage>176</fpage>
                    <lpage>183</lpage>
                    <pub-id pub-id-type="doi">10.1007/978-3-642-01516-8_13</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref93">
                <label>93</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Seneviratne</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Seneviratne</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mohapatra</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mahanti</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Predicting user traits from a snapshot of apps installed on a smartphone</article-title>
                    <source>SIGMOBILE Mob. Comput. Commun. Rev</source>
                    <year>2014</year>
                    <month>06</month>
                    <day>03</day>
                    <volume>18</volume>
                    <issue>2</issue>
                    <fpage>1</fpage>
                    <lpage>8</lpage>
                    <pub-id pub-id-type="doi">10.1145/2636242.2636244</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref94">
                <label>94</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wilson</surname>
                            <given-names>DW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Valacich</surname>
                            <given-names>JS</given-names>
                        </name>
                    </person-group>
                    <article-title>Unpacking the privacy paradox: Irrational decision-making within the privacy calculus</article-title>
                    <year>2012</year>
                    <conf-name>Int Conf Inf Sys</conf-name>
                    <conf-date>December 16-19, 2012</conf-date>
                    <conf-loc>Orlando, FL, USA</conf-loc>
                    <publisher-name>Irrational Decision-Making within the Privacy Calculus. Proc Thirty Third Int Conf Inf Syst ICIS 2012 Orlando, FL, U. S</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1286&#38;context=icis2012" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref95">
                <label>95</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sunyaev</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dehling</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Taylor</surname>
                            <given-names>PL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mandl</surname>
                            <given-names>KD</given-names>
                        </name>
                    </person-group>
                    <article-title>Availability and quality of mobile health app privacy policies</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2014</year>
                    <month>08</month>
                    <day>21</day>
                    <pub-id pub-id-type="doi">10.1136/amiajnl-2013-002605</pub-id>
                    <pub-id pub-id-type="medline">25147247</pub-id>
                    <pub-id pub-id-type="pii">amiajnl-2013-002605</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref96">
                <label>96</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sunyaev</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Schneider</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Cloud services certification</article-title>
                    <source>Commun. ACM</source>
                    <year>2013</year>
                    <month>02</month>
                    <day>01</day>
                    <volume>56</volume>
                    <issue>2</issue>
                    <fpage>33</fpage>
                    <lpage>36</lpage>
                    <pub-id pub-id-type="doi">10.1145/2408776.2408789</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>
