<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMU</journal-id>
            <journal-id journal-id-type="nlm-ta">JMIR mHealth uHealth</journal-id>
            <journal-title>JMIR mHealth and uHealth</journal-title>
            <issn pub-type="epub">2291-5222</issn>
            <publisher>
                <publisher-name>JMIR Publications Inc.</publisher-name>
                <publisher-loc>Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v3i4e95</article-id>
            <article-id pub-id-type="pmid">26474545</article-id>
            <article-id pub-id-type="doi">10.2196/mhealth.4538</article-id>
            <article-categories>
                <subj-group subj-group-type="heading">
                    <subject>Viewpoint</subject>
                </subj-group>
                <subj-group subj-group-type="article-type">
                    <subject>Viewpoint</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Mobile Phones in Research and Treatment: Ethical Guidelines and Future Directions</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Eysenbach</surname>
                        <given-names>Gunther</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Bamidis</surname>
                        <given-names>Panagiotis</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Su</surname>
                        <given-names>Wu-Chen</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1" corresp="yes" equal-contrib="yes">
                    <name name-style="western">
                        <surname>Carter</surname>
                        <given-names>Adrian</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <address>
                        <institution>School of Psychological Sciences</institution>
                        <institution>Monash University</institution>
                        <addr-line>Monash Biomedical Imaging</addr-line>
                        <addr-line>770 Blackburn Road</addr-line>
                        <addr-line>Melbourne, 3800</addr-line>
                        <country>Australia</country>
                        <phone>61 (0)3 9902 9431</phone>
                        <fax>61 N/A</fax>
                        <email>adrian.carter@monash.edu</email>
                    </address>
                    <xref rid="aff2" ref-type="aff">2</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-3593-0772</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib2">
                    <name name-style="western">
                        <surname>Liddle</surname>
                        <given-names>Jacki</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff2" ref-type="aff">2</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-6336-9898</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Hall</surname>
                        <given-names>Wayne</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff3" ref-type="aff">3</xref>
                    <xref rid="aff4" ref-type="aff">4</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-1984-0096</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib4">
                    <name name-style="western">
                        <surname>Chenery</surname>
                        <given-names>Helen</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff5" ref-type="aff">5</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5219-7229</ext-link>
                </contrib>
            </contrib-group>
            <aff id="aff1">
                <sup>1</sup>
                <institution>School of Psychological Sciences</institution>
                <institution>Monash University</institution>
                <addr-line>Melbourne</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff2">
                <sup>2</sup>
                <institution>UQ Centre for Clinical Research</institution>
                <institution>The University of Queensland</institution>
                <addr-line>Brisbane</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff3">
                <sup>3</sup>
                <institution>Centre for Youth Substance Abuse Research</institution>
                <institution>The University of Queensland</institution>
                <addr-line>Brisbane</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff4">
                <sup>4</sup>
                <institution>National Addiction Centre</institution>
                <institution>University of London</institution>
                <addr-line>London</addr-line>
                <country>United Kingdom</country>
            </aff>
            <aff id="aff5">
                <sup>5</sup>
                <institution>Faculty of Health Sciences and Medicine</institution>
                <institution>Bond University</institution>
                <addr-line>Robina</addr-line>
                <country>Australia</country>
            </aff>
            <author-notes>
                <corresp>Corresponding Author: Adrian Carter <email>adrian.carter@monash.edu</email>
                </corresp>
            </author-notes>
            <pub-date pub-type="collection">
                <season>Oct-Dec</season>
                <year>2015</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>16</day>
                <month>10</month>
                <year>2015</year>
            </pub-date>
            <volume>3</volume>
            <issue>4</issue>
            <elocation-id>e95</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>15</day>
                    <month>4</month>
                    <year>2015</year>
                </date>
                <date date-type="rev-request">
                    <day>25</day>
                    <month>6</month>
                    <year>2015</year>
                </date>
                <date date-type="rev-recd">
                    <day>20</day>
                    <month>7</month>
                    <year>2015</year>
                </date>
                <date date-type="accepted">
                    <day>5</day>
                    <month>8</month>
                    <year>2015</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Adrian Carter, Jacki Liddle, Wayne Hall, Helen Chenery. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 16.10.2015. </copyright-statement>
            <copyright-year>2015</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://mhealth.jmir.org/2015/4/e95/" xlink:type="simple" />
            <abstract>
                <p>Mobile phones and other remote monitoring devices, collectively referred to as &#34;mHealth,&#34; promise to transform the treatment of a range of conditions, including movement disorders, such as Parkinson&#8217;s disease. In this viewpoint paper, we use Parkinson&#8217;s disease as an example, although most considerations discussed below are valid for a wide variety of conditions. The ability to easily collect vast arrays of personal data over long periods will give clinicians and researchers unique insights into disease treatment and progression. These capabilities also pose new ethical challenges that  health care professionals will need to manage if this promise is to be realized with minimal risk of harm. These challenges include privacy protection when anonymity is not always possible, minimization of third-party uses of mHealth data, informing patients of complex risks when obtaining consent, managing data in ways that maximize benefit while minimizing the potential for disclosure to third parties, careful communication of clinically relevant information gleaned via mHealth technologies, and rigorous evaluation and regulation of mHealth products before widespread use. Given the complex array of symptoms and differences in comfort and literacy with technology, it is likely that these solutions will need to be individualized. It is therefore critical that developers of mHealth apps engage with patients throughout the development process to ensure that the technology meets their needs. These challenges will be best met through early and ongoing engagement with patients and other relevant stakeholders.</p>
            </abstract>
            <kwd-group>
                <kwd>ethics</kwd>
                <kwd>informed consent</kwd>
                <kwd>mHealth</kwd>
                <kwd>mobile phones</kwd>
                <kwd>Parkinson’s disease</kwd>
                <kwd>privacy</kwd>
                <kwd>regulation</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>Mobile phones are an increasingly common form of information and communication technology that combine mobile computing capabilities with telecommunications [<xref ref-type="bibr" rid="ref1">1</xref>]. In 2011, there were over 6 billion cell and mobile phone subscriptions reaching 87% of the world&#8217;s population [<xref ref-type="bibr" rid="ref2">2</xref>]; 1 in 3 subscriptions were for a mobile phone [<xref ref-type="bibr" rid="ref3">3</xref>]. The ability to run third-party software apps on mobile phones has prompted their use in health settings to improve diagnosis and personalize health care [<xref ref-type="bibr" rid="ref1">1</xref>]. This use of mobile phone technologies for this purpose has been termed &#8220;mHealth.&#8221;</p>
            <p>Mobile phone apps may support an individual&#8217;s self-report of symptoms or passively record time, location, and other information using a large array of on-board instruments, such as a global positioning system (GPS), wireless local area network (WLAN; or Wi-Fi), cellular network antennae, Bluetooth, accelerometers, gyroscopes, pressure sensors, proximity-sensing magnetometers, barometers, humidity sensors, temperature sensors, and ambient light sensors [<xref ref-type="bibr" rid="ref4">4</xref>]. Microphones and cameras may also record images and sounds in the vicinity of the phone, including personal conversations [<xref ref-type="bibr" rid="ref5">5</xref>]. Additional external sensors may allow recording of physiological information, such as heart rate, blood pressure, glucose levels, and even brain activity using a portable brain scanner (eg, electroencephalogram) [<xref ref-type="bibr" rid="ref6">6</xref>]. This information can be linked to other commercially available electronic databases, including Web-based platforms (eg, Facebook, Google) or government-controlled personal medical records. Algorithms may be used to organize and decode the recorded information to provide data on disease state, response to treatment, physical activity levels, falls, and tremor. Mobile phones can then send this information to research or clinical teams, which enables timely responses that were not possible using older technologies [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
            <p>mHealth technologies are being increasingly used to help patients manage chronic, degenerative neurological diseases, such as Parkinson&#8217;s disease (PD), that produce changes in mobility, communication, mood, and independence. In the following, we use PD as an example, although most considerations discussed below are valid for a wide variety of conditions. Mobile phones and other remote sensing devices have been used with people with PD to monitor their movement at home [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>], hand tremor [<xref ref-type="bibr" rid="ref10">10</xref>], timing of medication and meals [<xref ref-type="bibr" rid="ref7">7</xref>], community mobility [<xref ref-type="bibr" rid="ref11">11</xref>], and voice patterns [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
            <p>The ability to remotely monitor a wide range of markers of social well-being in PD is increasingly important. Medications and other treatments, such as deep brain stimulation, can improve the motor symptoms of people with PD, but these medications and treatments may not be accompanied by similar improvements in the nonmotor symptoms and quality of life outcomes [<xref ref-type="bibr" rid="ref11">11</xref>]. Mobile phones have the potential to measure both motor and nonmotor symptoms in PD, and they can analyze large amounts of data before providing summary reports to the patient and his or her physician to guide treatment decisions [<xref ref-type="bibr" rid="ref13">13</xref>]. The capacity of mobile phones to collect a wide range and quantity of personal information from patients raises novel and complex ethical and practical challenges that research teams and clinicians need to understand if we are to maximize the promise of the technology while minimizing any unintended harms. Analogous concerns have been examined in the context of Internet research and eHealth [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref17">17</xref>]. Given the additional capacity of mobile phones to collect personal information and the explosion in mHealth apps, an examination of the ethical challenges raised by the use of mobile phones in the research and treatment of persons with major neurodegenerative disorders, such as PD, is urgently needed. </p>
        </sec>
        <sec>
            <title>Ethical Issues Raised by the Use of Mobile Phones for Research and in the Clinic</title>
            <sec>
                <title>Privacy, Security, and Data Ownership</title>
                <p>Privacy is the ability to control the recording and sharing of personal information with others. This requires knowledge of what will be recorded, how it will be used and for how long, who will have access to this information, and what the risks are of discovery and misuse by third parties.</p>
                <sec>
                    <title>What Can Mobile Phones Reveal About a Person?</title>
                    <p>Geolocation technologies on a mobile phone (eg, GPS, WLAN) can reveal a range of personal information. This might include where you live, where your children go to school, whether you visit a therapist and if so how often, how often you visit drinking or gambling establishments, whether you arrive early or late to work, whether you have participated in a protest or are associated with outlawed or terrorist organizations, and other habits or routines [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>]. It is possible to identify a specific individual with reasonable certainty from this information. Consequently, it may be impossible to deidentify an individual&#8217;s mobile phone data, the standard way of protecting personal privacy in research. This may be of particular relevance in PD where up to 1 in 6 patients will develop severe compulsive disorders (eg, pathological gambling, hypersexuality, compulsive shopping) as a result of their dopamine replacement therapy [<xref ref-type="bibr" rid="ref21">21</xref>]. These behaviors can cause substantial harm to others and may come to the attention of relevant government authorities, which could then lead to criminal or civil suits [<xref ref-type="bibr" rid="ref22">22</xref>]. The difficulty in anonymizing mobile phone data is particularly salient in a global research environment that increasingly requires the sharing of data in publicly available repositories.</p>
                    <p>The greatest threat to privacy is third-party use of data recorded, collected, and transmitted by a mobile phone. Data may come into the hands of a third party via hacking of information sent over the Internet or via Bluetooth (commonly referred to as &#8220;sniffing&#8221;); legal interception by government agencies (eg, subpoena); incidental discovery by someone accessing the phone; or by telecommunication companies and cloud storage providers, for example, Internet service provider (ISP), Google, Amazon, who may claim ownership of the data recorded by or transmitted through their networks [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
                    <sec>
                        <title>Subpoena and Government Interception</title>
                        <p>Researchers and clinicians can only provide limited guarantees on privacy protection. For instance, data collected on mobile phones may be subpoenaed as part of legal proceedings in civil (eg, divorce, litigation) or criminal cases. This includes both the data collected on the phone itself or data and their analysis held by researchers or clinicians. Researchers and clinicians are obliged to hand over such private information when subpoenaed.</p>
                        <p>Mobile phones are more prominent in the public domain than in traditional office-based pen-and-paper or desktop computer research kept within the offices of researchers or clinicians. The information collected via mobile phones is more liable to be encountered by third parties who are not involved in the research or clinical care. The legal subpoena of clinical data is possible within any research setting. However, a person&#8217;s participation in a research study is more likely to become known to authorities through the presence of an app on their mobile phone [<xref ref-type="bibr" rid="ref20">20</xref>]. The simple discovery of an mHealth app on a phone may be enough to disclose personal information that users may wish to keep private, such as their having a neurodegenerative disorder or medication-induced addiction.</p>
                    </sec>
                    <sec>
                        <title>Hacking and Third-Party Data Ownership</title>
                        <p>The security of data collected via mobile phones cannot be guaranteed. Hacking of personal data from mHealth apps has resulted in medical identity theft and significant financial losses [<xref ref-type="bibr" rid="ref23">23</xref>], and such data have been used in the courts [<xref ref-type="bibr" rid="ref24">24</xref>]. mHealth apps are not required to adhere to strict privacy regulations, such as the US Health Insurance Portability and Accountability Act Privacy Rule, and therefore may be stored and transferred using methods that are less secure than those normally required of electronic medical data [<xref ref-type="bibr" rid="ref23">23</xref>]. The data transmitted may include usernames, passwords, and other personal information that may enable forms of identity theft.</p>
                        <p>Encryption is essential for the storage and transmission of data using mobile phones; however, a recent study found that many mHealth apps do not use encryption when transferring data [<xref ref-type="bibr" rid="ref23">23</xref>]. Even with modern encryption methods, data may be accessible to hackers and/or government authorities. The recent incidences of high-profile mobile phone hacking in the United States and United Kingdom illustrate the vulnerability of mobile phone users to privacy violations [<xref ref-type="bibr" rid="ref25">25</xref>]. There are also potential privacy violations from computer malware and virus programs that exploit vulnerabilities in how data are stored on the device or from malevolent app developers who steal data for commercial or criminal interests [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Developers can take steps to ensure that data collected by an mHealth app are not available (eg, via data logs, SD card storage, exported, and side channels) to other apps or programs contained on the phone [<xref ref-type="bibr" rid="ref23">23</xref>]. As He et al [<xref ref-type="bibr" rid="ref23">23</xref>] demonstrate, most mHealth apps currently available do not take the necessary security measures to protect an individual&#8217;s privacy.</p>
                        <p>It is also not clear who owns the data in research and clinical settings. Mobile phone data may be transmitted to the research team or clinician via ISP or telecommunication companies. These companies often record metadata as well as the data transferred over their networks, and may sell them to other third parties. Government agencies may also obtain access to this information, as revealed by Edward Snowden in the recent National Security Agency affair [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
                    </sec>
                </sec>
            </sec>
            <sec>
                <title>Obtaining Informed Consent</title>
                <p>Before using mHealth technologies, clinicians and researchers need to seek and obtain the informed consent from participants. Participants need to be informed of the risks and benefits of using mHealth technologies and must have the capacity to understand these risks and make a free and uncoerced decision about whether to participate [<xref ref-type="bibr" rid="ref28">28</xref>]. A challenge in mHealth is communicating the complex nature of the risks raised by this technology and negotiating the risks that individuals are willing to face. How much input should people have over what they wish to have recorded and shared? How will the data be used, where will it be stored and in what form, how will it be shared, and for how long? Participants must also be made aware of what will happen to their data once their study participation is complete.</p>
                <p>Researchers and clinicians using mobile phone technologies need to develop consent processes that actively engage individuals in their own privacy decision making as much as possible. Understanding the risks posed by third-party access to their personal health data can be difficult to communicate given the complexity of mHealth technologies. Meeting these ethical challenges will require technology developers to create apps that assist participants in understanding their participation and give them as much say as possible in what is shared and with whom. This may involve trade-offs between, on the one hand, maximizing the data obtained and what may be done with it, and, on the other hand, enabling participants to control what they consent to and how their data may be used and stored.</p>
                <p>As part of the consent process, researchers and clinicians need to inform participants about the circumstances in which they are obliged to disclose the participants&#8217; personal information. This potentially includes information that can pose an immediate and likely threat to themselves or to others (eg, suicide, homicide). Patients must also be informed of the potential for identification of &#8220;incidental findings,&#8221; specifically clinically significant information related to their health, such as cognitive impairment and dementia, depression and other psychiatric disorders, or medication abuse or other compulsive behaviors that may benefit from additional treatment. Patients should be informed about the processes in place to deal with potential incidental findings and provide them with further information and access to clinical treatment should any emerge. Participants should also be given the opportunity to indicate whether they would like to be told about the presence or absence of incidental findings.</p>
                <p>The potential for mobile phones to record conversations about third parties or bystanders raises additional ethical and legal concerns. For example, mobile phones may record conversations to examine the impact of PD on patients&#8217; speech and socialization [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. Researchers may obtain consent from the research participant to have their conversations recorded but they cannot easily obtain consent from bystanders (eg, friends and family) who may also be recorded via the mobile phone. The recording and/or communicating of third-party conversations (even to a secure portal) is illegal in some jurisdictions. Researchers may therefore need to develop methods for ensuring that bystanders are able to consent to having their conversations recorded. One option would be to provide an alert on the mobile phone indicating to the participant that a recent conversation has been audio recorded so that they can ask third parties to consent to the recording. An opt-in approach could be applied where the conversation is only sent to researchers or clinicians if the third-party individuals agree. This would further burden the participant who would have to disclose their mHealth participation and, therefore, possibly their clinical condition to obtain the third party&#8217;s consent. The opt-in approach also obtains consent after the fact, and therefore, may be inadequate in some jurisdictions.</p>
            </sec>
            <sec>
                <title>Storing and Sharing Mobile Phone Data</title>
                <p>How mobile phone data are stored and shared can have important implications for privacy risk. Developers may choose to create a secure &#8220;vault&#8221; on the device that is physically transferred to researchers or clinicians at predetermined intervals. This allows greater control of data and protection for participants, but at the cost of reduced flexibility and timeliness. It could limit the benefits that a patient or participant may derive from the ability to self-manage their condition.</p>
                <p>The most clinically and scientifically useful approach is to periodically upload the data electronically (eg, via 3G or wireless networks) to researchers or clinicians. This allows for instantaneous transfer of data, but provides less privacy protections as it involves transmitting data over third-party networks. Developers will need to decide where and when data are uploaded (eg, only at certain locations or times, such as from a home Wi-Fi network) as opposed to routinely uploading via public Wi-Fi or mobile networks. Developers will need to reach a balance between maximizing clinical or scientific utility while minimizing the risk to privacy. Solutions will vary depending on how the technology is being employed.</p>
                <p>Developers will also need to consider what data to collect and transmit from the mobile phone. The ability to collect as much raw data as possible maximizes the information that a research and clinical team can extract. It also increases the potential risk to the participant. A balance needs to be struck between maximizing scientific and clinical utility and protecting privacy. It is preferable to only collect data sufficient for the purpose of the study or clinical intervention (eg, postcode or distance from home), rather than collecting all data routinely. By collecting only the minimum amount of information, app developers can help participants maintain control over their raw data [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
                <p>Developers also need to make data comprehensible to the participant before they are sent or before consent is given to share the data. Developers should provide easily understandable visual information to participants about where their information will go, who will have access to it, and for how long. This will greatly increase participants&#8217; understanding of the risks involved with this technology and enable them to make more informed decisions. Such processes will help participants to see what their sharing policies are and what the results of these policies will be [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
            </sec>
            <sec>
                <title>Communication of Clinical or Research Results</title>
                <p>A critical decision in the clinical or research use of mobile phones is when and what to tell research participants or patients about their data. The communication of clinically meaningful feedback to participants about their data maximizes the benefits for participants and mitigates the harm from potential privacy violations. To be clinically meaningful, the findings must be scientifically robust. The ethical obligation to share an individual&#8217;s data with them is more acute in the clinical setting where the explicit aim is to facilitate better clinical management of the disease, and there is strong evidence to support the clinical claims being made. Feedback is also provided by a qualified individual responsible for the patient&#8217;s clinical management. In research, the clinical relevance of data is, by definition, less certain because the research aim is to establish an evidence base for clinical intervention. In research, providing individualized clinical feedback from the data is inappropriate, and may lead to additional harm if the clinical advice is misleading or provided by nonprofessionals.</p>
                <p>The provision of immediate and useful information by appropriately qualified clinicians can potentially better enable individuals to manage their health and improve the clinician/patient relationship by empowering patients to take more control over their health and well-being [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. However, to serve this purpose the information collected by the mobile phone needs to be presented in ways that are meaningful, accurate, and easily understood. Well-designed platforms that provide such feedback to patients will maximize the potential for individuals to self-manage their health and well-being. Participants may also be assisted to access effective clinical services for the treatment of any symptoms identified in the data collected via their mobile phone. Developers and researchers may also wish to identify opportunities in the app in which participants can receive information that will enable them to make healthier choices. Research is needed to establish what impact the provision of clinical information recorded on mobile phones may have on a person&#8217;s behavior. Communication of deteriorating motor symptoms, for example, could adversely impact on well-being and health-related behaviors. See Eonta et al [<xref ref-type="bibr" rid="ref31">31</xref>] for practical guidance on the ethical communication of clinical information to patients using mobile phones and other mHealth technologies.</p>
            </sec>
            <sec>
                <title>Access to mHealth Technology</title>
                <p>While there has been a rapid growth in mobile phone coverage in recent years, some segments of the population lack access. People from lower socioeconomic groups may not be able to afford a phone capable of supporting the app or connecting with mobile or Internet networks required to transmit potentially large volumes of data. There is an ethical imperative not to exclude these patients from benefiting from mHealth monitoring.</p>
                <p>Disease-related impairments may also interfere with the effective use of these technologies. PD may impair both fine motor and speech skills, therefore creating difficulty in accessing touch screens or voice-based interaction with mobile phones. Designers of mHealth apps must consider ways of reducing the effects of these cognitive, motor, or other impairments. Having a choice on how to interact with an app is one approach (eg, voice-activated, image- or text-based interface). People with PD who experience fine motor difficulties may be assisted by reducing the sensitivity of the screen to repeated touch, appropriate spacing and sizing of buttons, use of swipe on-screen keyboard, and external devices such as a stylus. People with voice-related difficulties may be assisted by a plug-in microphone and software that can be trained to an individual&#8217;s voice (eg, Dragon Dictate).</p>
                <p>Given the complex array of symptoms and differences in comfort and literacy with technology, it is likely that these solutions will need to be individualized. It is therefore critical that developers of mHealth apps engage with patients throughout the development process to ensure that the technology meets their needs. This will assist developers, clinicians, and research teams to target the symptoms that are of greatest concern to patients. Developers should use reference groups (eg, consumer, family, industry, health care professional) to anticipate challenges in developing technology that meets these challenges [<xref ref-type="bibr" rid="ref11">11</xref>]. As one patient reported in regard to the use of mobile phones for diabetes, &#8220;It&#8217;s not just about blood glucose results and HbA1c results, it&#8217;s about how people feel and, perhaps, how their mood may affect their glucose levels&#8221; [<xref ref-type="bibr" rid="ref29">29</xref>]. A summary of the recommendations for managing these ethical challenges is presented in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
                <table-wrap position="float" id="table1">
                    <label>Table 1</label>
                    <caption>
                        <p>Ethical recommendations for the use of mobile phones in the clinic and laboratory.</p>
                    </caption>
                    <table width="579" border="0" cellpadding="7" cellspacing="0" rules="groups" frame="hsides">
                        <col width="135" />
                        <col width="416" />
                        <thead>
                            <tr valign="top">
                                <td>Ethical issue</td>
                                <td>Recommendation</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Anonymity and de-identification</td>
                                <td>In many cases, deidentification is not possible. Developers must communicate this to users when obtaining consent.</td>
                            </tr>
                            <tr valign="top">
                                <td>Third-party use of data</td>
                                <td>Individuals should be informed about the risk of third parties accessing data collected on mobile phones, either via hacking, legal interception (eg, subpoena), incidental discovery by someone accessing the phone, or by telecommunication companies (eg, ISP provider, Google) that may claim ownership of the data recorded by or transmitted through their networks.</td>
                            </tr>
                            <tr valign="top">
                                <td>Storage and transmission of data</td>
                                <td>The risk of privacy violations can be minimized by thoughtful consideration of how the data are stored locally on the phone or transmitted to the research or clinical team. Apps can be placed in secure vaults on mobile phones to minimize incidental discovery. Developers should also record and transmit the minimal amount of data necessary for the purpose of the app.</td>
                            </tr>
                            <tr valign="top">
                                <td>Obtaining informed consent</td>
                                <td>Participants need to be informed about the risks and benefits of using mHealth technologies and must have the capacity to understand these risks and make a free and uncoerced decision about whether to participate. Researchers and clinicians should employ visual aids that communicate the complex nature of the risks posed by mHealth. Developers should maximize opportunities for users to control what data are shared with the clinical/research team, such as through the use of pop-up messages asking whether they consent to specific information being shared.</td>
                            </tr>
                            <tr valign="top">
                                <td>Communication of clinically relevant results</td>
                                <td>Feedback of clinically relevant information should be provided by a qualified health care professional and when there is strong empirical evidence to support the findings. Users should be informed at the point of consent what information may be uncovered by mobile phones and whether they will be informed about these findings. Patients should also be assisted with accessing necessary clinical services as a result of the findings.</td>
                            </tr>
                            <tr valign="top">
                                <td>Access to mHealth technologies</td>
                                <td>Efforts should be undertaken to prevent individuals benefiting from advances in mHealth as a result of their socioeconomic status or physical or mental impairments.</td>
                            </tr>
                            <tr valign="top">
                                <td>Active engagement with patients</td>
                                <td>Developers should use reference groups (eg, consumer, family, industry, health care professional) throughout the development process to ensure that the technology meets participants&#8217; needs.</td>
                            </tr>
                            <tr valign="top">
                                <td>Regulation of mHealth products</td>
                                <td>mHealth technologies should be rigorously evaluated to demonstrate their safety and effectiveness before the widespread rolling out of mHealth apps and associated products.</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
            </sec>
            <sec>
                <title>Regulating and Evaluating mHealth Apps and Products</title>
                <p>An explosion in mHealth research [<xref ref-type="bibr" rid="ref32">32</xref>] has led to a rapid proliferation of small pilot or seed programs, many of which lack scientific evidence of efficacy on which to base clinical use. There is limited evidence on the effectiveness, or safety, of mHealth apps as a self-management tool for improving health [<xref ref-type="bibr" rid="ref29">29</xref>]. Hence, there is an urgent need to evaluate their effectiveness via randomized controlled trials before the widespread rollout of mHealth apps and associated products (eg, brain or heart monitors) [<xref ref-type="bibr" rid="ref33">33</xref>]. This need was recognized by the World Health Organization and other leading agencies responsible for implementing medical products in the Bellagio call to action on global eHealth evaluation that called for rigorous evaluation &#8220;to generate evidence and promote the appropriate integration and use of technologies...to improve health and reduce health inequalities&#8221; [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
                <p>It is imperative that the use of mHealth apps by researchers, clinicians, universities, and hospitals is based on rigorous evaluations of their effectiveness and safety [<xref ref-type="bibr" rid="ref29">29</xref>], using the CONSORT-EHEALTH checklist [<xref ref-type="bibr" rid="ref35">35</xref>] and GRADE framework [<xref ref-type="bibr" rid="ref32">32</xref>]. Policy makers should not be seduced by the hype and promise of mHealth technology. The prima facie simplicity and cost effectiveness of mHealth solutions may blind decision makers to the lack of robust empirical evidence that is needed to justify their routine use [<xref ref-type="bibr" rid="ref29">29</xref>]. Premature implementation of untested mHealth interventions may result in failed projects, wasted resources, and poorer health outcomes for patients.</p>
                <p>There is currently no regulation of mHealth devices or apps and no guarantee that they provide clinically accurate information. The Food and Drug Administration (FDA) recently released guidelines for how they intend to regulate the marketing of mHealth apps that meet the definition of medical devices (ie, those &#8220;whose functionality could pose a risk to a patient&#8217;s safety if the mobile app were to not function as intended&#8221;) [<xref ref-type="bibr" rid="ref36">36</xref>], although these recommendations are currently nonbinding and do not prevent apps from being made available. The FDA has recently approved the marketing of an mHealth app to continuously monitor glucose levels [<xref ref-type="bibr" rid="ref36">36</xref>].</p>
                <p>However, most apps are made available to patients directly via publicly available app stores, without passing through regulatory gatekeepers to ensure their safety and effectiveness. The clinical use of these devices and apps needs to be regulated in the same way as any other medical or psychotherapeutic intervention. This is particularly important given the influence of vested commercial interests that may push for quick rollout and be more concerned with growing markets than improving global health [<xref ref-type="bibr" rid="ref37">37</xref>]. The regulation of mHealth products would also help to minimize privacy violations through malware or other computer-based viruses. The development of a Web-based approval system for verifying the quality of mHealth apps, such as the Health on the Net Foundation Code of Conduct, or National Health Service app stores, such as the United Kingdom Health Apps Library, may be useful for ensuring the quality of mHealth apps.</p>
                <p>Regulators will also need to deal with the increasingly globalized nature of mHealth research. Traditional processes of institutional ethics approval and recruitment provide significant barriers to conducting mHealth research that crosses national borders and involves numerous agencies. Ethical oversight of mobile phone research will need to evolve in order to allow it to happen, and to prevent it from being done with insufficient ethical oversight by commercial entities (eg, Apple, Facebook, Google). Failure to do so may leave these companies with a vastly superior understanding of health and behavior than researchers, governments, and policy makers. Unlike publicly funded research, these findings will be protected by commercial-in-confidence and trade secrets laws.</p>
            </sec>
        </sec>
        <sec>
            <title>Conclusions</title>
            <p>Mobile phones and other remote monitoring devices have the potential to provide researchers with access to unprecedented volumes of clinically relevant data on patients&#8217; quality of life and psychosocial functioning, movement at home, in the community, and social integration. Neurologists and other treating clinicians will get real-time measures of disease progression and the impact of medication over periods not previously possible. The promise of this technology&#8212;the ability to collect, analyze, and communicate vast amounts of personal data almost immediately to research and clinical teams&#8212;also poses new and unique ethical and technical challenges that need to be managed if we are to realize the promise while minimizing potential risks of harm. While the ethical issues of privacy, consent and equity are not unique to mHealth, specific solutions are needed that address the particular ethical challenges raised my mobile phone technologies. The development of mobile phone apps that optimally address these challenges will require early and ongoing engagement with patients and other relevant stakeholders.</p>
        </sec>
    </body>
    <back>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">APCN</term>
                    <def>
                        <p>Asia-Pacific Centre for Neuromodulation</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">FDA</term>
                    <def>
                        <p>Food and Drug Administration</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">GPS</term>
                    <def>
                        <p>global positioning system</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">ISP</term>
                    <def>
                        <p>Internet service provider</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">PD</term>
                    <def>
                        <p>Parkinson&#8217;s disease</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb6">WLAN</term>
                    <def>
                        <p>wireless local area network</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ack>
            <p>This research was funded by fellowships awarded to Dr Carter by the Australian Research Council and National Health and Medical Research Council. These funding agencies had no involvement in any aspect of the manuscript. Dr Carter also received a consultancy fee from an Australian law firm representing the plaintiff in a class action concerning the development of impulse control disorders following dopamine agonist use in Parkinson&#8217;s disease. Dr Liddle is employed by the Asia-Pacific Centre for Neuromodulation (APCN). The APCN is in part funded by unrestricted research and education funding from Medtronic Inc and St Andrews War Memorial Hospital. She has received a competitive travel grant sponsored by Shimadzu. Neither agency had any involvement in the manuscript.</p>
        </ack>
        <fn-group>
            <fn fn-type="conflict">
                <p>None declared.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mosa</surname>
                            <given-names>AS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Yoo</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sheets</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>A systematic review of healthcare applications for smartphones</article-title>
                    <source>BMC Med Inform Decis Mak</source>
                    <year>2012</year>
                    <volume>12</volume>
                    <fpage>67</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1472-6947/12/67" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1186/1472-6947-12-67</pub-id>
                    <pub-id pub-id-type="medline">22781312</pub-id>
                    <pub-id pub-id-type="pii">1472-6947-12-67</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3534499</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>ITU World Telecommunication</collab>
                    </person-group>
                    <source>ICT Facts and Figures</source>
                    <year>2011</year>
                    <access-date>2015-04-15</access-date>
                    <comment>The World in 2011<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf">http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6XnMYpNhx</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gaggioli</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Riva</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>From mobile mental health to mobile wellbeing: opportunities and challenges</article-title>
                    <source>Stud Health Technol Inform</source>
                    <year>2013</year>
                    <volume>184</volume>
                    <fpage>141</fpage>
                    <lpage>147</lpage>
                    <pub-id pub-id-type="medline">23400146</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Luxton</surname>
                            <given-names>DD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McCann</surname>
                            <given-names>RA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bush</surname>
                            <given-names>NE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mishkind</surname>
                            <given-names>MC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Reger</surname>
                            <given-names>GM</given-names>
                        </name>
                    </person-group>
                    <article-title>mHealth for mental health: Integrating smartphone technology in behavioral healthcare</article-title>
                    <source>Prof Psychol Res Pr</source>
                    <year>2011</year>
                    <volume>42</volume>
                    <issue>6</issue>
                    <fpage>505</fpage>
                    <lpage>512</lpage>
                    <pub-id pub-id-type="doi">10.1037/a0024485</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Pei</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Guinness</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Liu</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kuusniemi</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>Y</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kaistinen</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Human behavior cognition using smartphone sensors</article-title>
                    <source>Sensors (Basel)</source>
                    <year>2013</year>
                    <volume>13</volume>
                    <issue>2</issue>
                    <fpage>1402</fpage>
                    <lpage>1424</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mdpi.com/1424-8220/13/2/1402" />
                    </comment>
                    <pub-id pub-id-type="doi">10.3390/s130201402</pub-id>
                    <pub-id pub-id-type="medline">23348030</pub-id>
                    <pub-id pub-id-type="pii">s130201402</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3649388</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Stopczynski</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Larsen</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Stahlhut</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Petersen</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hansen</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>A mobile phone interface for a wireless EEG headset with real-time 3D reconstruction</article-title>
                    <source>ACII&#039;11 Proceedings of the 4th International Conference on Affective Computing and Intelligent Interaction</source>
                    <year>2011</year>
                    <publisher-loc>Berlin, Germany</publisher-loc>
                    <publisher-name>Springer</publisher-name>
                    <fpage>317</fpage>
                    <lpage>318</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cancela</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pastorino</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tzallas</surname>
                            <given-names>AT</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tsipouras</surname>
                            <given-names>MG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rigas</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arredondo</surname>
                            <given-names>MT</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fotiadis</surname>
                            <given-names>DI</given-names>
                        </name>
                    </person-group>
                    <article-title>Wearability assessment of a wearable system for Parkinson's disease remote monitoring based on a body area network of sensors</article-title>
                    <source>Sensors (Basel)</source>
                    <year>2014</year>
                    <volume>14</volume>
                    <issue>9</issue>
                    <fpage>17235</fpage>
                    <lpage>17255</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mdpi.com/1424-8220/14/9/17235" />
                    </comment>
                    <pub-id pub-id-type="doi">10.3390/s140917235</pub-id>
                    <pub-id pub-id-type="medline">25230307</pub-id>
                    <pub-id pub-id-type="pii">s140917235</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4208222</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Memedi</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Khan</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Grenholm</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nyholm</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Westin</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Automatic and objective assessment of alternating tapping performance in Parkinson's disease</article-title>
                    <source>Sensors (Basel)</source>
                    <year>2013</year>
                    <volume>13</volume>
                    <issue>12</issue>
                    <fpage>16965</fpage>
                    <lpage>16984</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mdpi.com/1424-8220/13/12/16965" />
                    </comment>
                    <pub-id pub-id-type="doi">10.3390/s131216965</pub-id>
                    <pub-id pub-id-type="medline">24351667</pub-id>
                    <pub-id pub-id-type="pii">s131216965</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3892880</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Patel</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Buckley</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rednic</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McClure</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tarsy</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Shih</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dy</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Welsh</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bonato</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <article-title>Home monitoring of patients with Parkinson's disease via wearable technology and a web-based application</article-title>
                    <source>Conf Proc IEEE Eng Med Biol Soc</source>
                    <year>2010</year>
                    <volume>2010</volume>
                    <fpage>4411</fpage>
                    <lpage>4414</lpage>
                    <pub-id pub-id-type="doi">10.1109/IEMBS.2010.5627124</pub-id>
                    <pub-id pub-id-type="medline">21096462</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kostikis</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hristu-Varsakelis</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arnaoutoglou</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kotsavasiloglou</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Baloyiannis</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Towards remote evaluation of movement disorders via smartphones</article-title>
                    <source>Conf Proc IEEE Eng Med Biol Soc</source>
                    <year>2011</year>
                    <volume>2011</volume>
                    <fpage>5240</fpage>
                    <lpage>5243</lpage>
                    <pub-id pub-id-type="doi">10.1109/IEMBS.2011.6091296</pub-id>
                    <pub-id pub-id-type="medline">22255519</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Liddle</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ireland</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McBride</surname>
                            <given-names>SJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Brauer</surname>
                            <given-names>SG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hall</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ding</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Karunanithi</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hodges</surname>
                            <given-names>PW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Theodoros</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Silburn</surname>
                            <given-names>PA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chenery</surname>
                            <given-names>HJ</given-names>
                        </name>
                    </person-group>
                    <article-title>Measuring the lifespace of people with Parkinson's disease using smartphones: Proof of principle</article-title>
                    <source>JMIR Mhealth Uhealth</source>
                    <year>2014</year>
                    <volume>2</volume>
                    <issue>1</issue>
                    <fpage>e13</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2014/1/e13/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/mhealth.2799</pub-id>
                    <pub-id pub-id-type="medline">25100206</pub-id>
                    <pub-id pub-id-type="pii">v2i1e13</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4114414</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Tsanas</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Little</surname>
                            <given-names>MA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McSharry</surname>
                            <given-names>PE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Spielman</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ramig</surname>
                            <given-names>LO</given-names>
                        </name>
                    </person-group>
                    <article-title>Novel speech signal processing algorithms for high-accuracy classification of Parkinson's disease</article-title>
                    <source>IEEE Trans Biomed Eng</source>
                    <year>2012</year>
                    <month>05</month>
                    <volume>59</volume>
                    <issue>5</issue>
                    <fpage>1264</fpage>
                    <lpage>1271</lpage>
                    <pub-id pub-id-type="doi">10.1109/TBME.2012.2183367</pub-id>
                    <pub-id pub-id-type="medline">22249592</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Achey</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Aldred</surname>
                            <given-names>JL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Aljehani</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bloem</surname>
                            <given-names>BR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Biglan</surname>
                            <given-names>KM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chan</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cubo</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dorsey</surname>
                            <given-names>ER</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Goetz</surname>
                            <given-names>CG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Guttman</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hassan</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Khandhar</surname>
                            <given-names>SM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mari</surname>
                            <given-names>Z</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Spindler</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tanner</surname>
                            <given-names>CM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>van den Haak</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Walker</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wilkinson</surname>
                            <given-names>JR</given-names>
                        </name>
                        <collab>International Parkinson Movement Disorder Society Telemedicine Task Force</collab>
                    </person-group>
                    <article-title>The past, present, and future of telemedicine for Parkinson's disease</article-title>
                    <source>Mov Disord</source>
                    <year>2014</year>
                    <month>06</month>
                    <volume>29</volume>
                    <issue>7</issue>
                    <fpage>871</fpage>
                    <lpage>883</lpage>
                    <pub-id pub-id-type="doi">10.1002/mds.25903</pub-id>
                    <pub-id pub-id-type="medline">24838316</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Eysenbach</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wyatt</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Using the Internet for surveys and health research</article-title>
                    <source>J Med Internet Res</source>
                    <year>2002</year>
                    <month>11</month>
                    <volume>4</volume>
                    <issue>2</issue>
                    <fpage>E13</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2002/2/e13/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.4.2.e13</pub-id>
                    <pub-id pub-id-type="medline">12554560</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1761932</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Grajales</surname>
                            <given-names>FJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sheps</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ho</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Novak-Lauscher</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Eysenbach</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Social media: A review and tutorial of applications in medicine and health care</article-title>
                    <source>J Med Internet Res</source>
                    <year>2014</year>
                    <volume>16</volume>
                    <issue>2</issue>
                    <fpage>e13</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2014/2/e13/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2912</pub-id>
                    <pub-id pub-id-type="medline">24518354</pub-id>
                    <pub-id pub-id-type="pii">v16i2e13</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3936280</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Conway</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Ethical issues in using Twitter for public health surveillance and research: Developing a taxonomy of ethical concepts from the research literature</article-title>
                    <source>J Med Internet Res</source>
                    <year>2014</year>
                    <volume>16</volume>
                    <issue>12</issue>
                    <fpage>e290</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2014/12/e290/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.3617</pub-id>
                    <pub-id pub-id-type="medline">25533619</pub-id>
                    <pub-id pub-id-type="pii">v16i12e290</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4285736</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bond</surname>
                            <given-names>CS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ahmed</surname>
                            <given-names>OH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hind</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Thomas</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hewitt-Taylor</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>The conceptual and practical ethical dilemmas of using health discussion board posts as research data</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>6</issue>
                    <fpage>e112</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/6/e112/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2435</pub-id>
                    <pub-id pub-id-type="medline">23748147</pub-id>
                    <pub-id pub-id-type="pii">v15i6e112</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3713935</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gasson</surname>
                            <given-names>MN</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kosta</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Royer</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Meints</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Warwick</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <article-title>Normality mining: Privacy implications of behavioral profiles drawn from GPS enabled mobile phones</article-title>
                    <source>IEEE Trans. Syst., Man, Cybern. C</source>
                    <year>2011</year>
                    <month>03</month>
                    <volume>41</volume>
                    <issue>2</issue>
                    <fpage>251</fpage>
                    <lpage>261</lpage>
                    <pub-id pub-id-type="doi">10.1109/TSMCC.2010.2071381</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>King</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Ensuring the data-rich future of the social sciences</article-title>
                    <source>Science</source>
                    <year>2011</year>
                    <month>02</month>
                    <day>11</day>
                    <volume>331</volume>
                    <issue>6018</issue>
                    <fpage>719</fpage>
                    <lpage>21</lpage>
                    <pub-id pub-id-type="doi">10.1126/science.1197872</pub-id>
                    <pub-id pub-id-type="medline">21311013</pub-id>
                    <pub-id pub-id-type="pii">331/6018/719</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Shilton</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <article-title>Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection</article-title>
                    <source>Commun ACM</source>
                    <year>2009</year>
                    <volume>52</volume>
                    <issue>11</issue>
                    <fpage>48</fpage>
                    <lpage>53</lpage>
                    <pub-id pub-id-type="doi">10.1145/1592761.1592778</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ambermoon</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carter</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hall</surname>
                            <given-names>WD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dissanayaka</surname>
                            <given-names>NN</given-names>
                        </name>
                        <name name-style="western">
                            <surname>O'Sullivan</surname>
                            <given-names>JD</given-names>
                        </name>
                    </person-group>
                    <article-title>Impulse control disorders in patients with Parkinson's disease receiving dopamine replacement therapy: Evidence and implications for the addictions field</article-title>
                    <source>Addiction</source>
                    <year>2011</year>
                    <month>02</month>
                    <volume>106</volume>
                    <issue>2</issue>
                    <fpage>283</fpage>
                    <lpage>293</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1360-0443.2010.03218.x</pub-id>
                    <pub-id pub-id-type="medline">21134016</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bartlett</surname>
                            <given-names>F</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hall</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carter</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Voluntariness and causation for criminal offending associated with treatment of Parkinson&#8217;s disease</article-title>
                    <source>Crim Law J</source>
                    <year>2013</year>
                    <volume>37</volume>
                    <issue>5</issue>
                    <fpage>330</fpage>
                    <lpage>341</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>He</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Naveed</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gunter</surname>
                            <given-names>CA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nahrstedt</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <article-title>Security concerns in Android mHealth apps</article-title>
                    <source>AMIA Annu Symp Proc</source>
                    <year>2014</year>
                    <volume>2014</volume>
                    <fpage>645</fpage>
                    <lpage>654</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25954370" />
                    </comment>
                    <pub-id pub-id-type="medline">25954370</pub-id>
                    <pub-id pub-id-type="pmcid">PMC4419898</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gibbs</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <source>Court Sets Legal Precedent with Evidence from Fitbit Health Tracker</source>
                    <year>2014</year>
                    <access-date>2015-07-21</access-date>
                    <publisher-loc>London, UK</publisher-loc>
                    <publisher-name>The Guardian</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.theguardian.com/technology/2014/nov/18/court-accepts-data-fitbit-health-tracker">http://www.theguardian.com/technology/2014/nov/18/court-accepts-data-fitbit-health-tracker</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6aB5ZV0St</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>UK Government</collab>
                    </person-group>
                    <source>Leveson inquiry: Culture, practice And ethics of the press</source>
                    <year>2012</year>
                    <access-date>2015-04-14</access-date>
                    <comment>The Levesen Inquiry<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://webarchive.nationalarchives.gov.uk/20140122145147/http:/www.levesoninquiry.org.uk/">http://webarchive.nationalarchives.gov.uk/20140122145147/http:/www.levesoninquiry.org.uk/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6XnHfXeWe</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Su</surname>
                            <given-names>WC</given-names>
                        </name>
                    </person-group>
                    <article-title>A preliminary survey of knowledge discovery on mobile phone applications (apps): Principles, techniques and research directions for e-health</article-title>
                    <year>2014</year>
                    <conf-name>ICME International Conference on Complex Medical Engineering</conf-name>
                    <conf-date>2014</conf-date>
                    <conf-loc>Taipei, Taiwan</conf-loc>
                    <fpage>26</fpage>
                    <lpage>29</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Greenwald</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <source>Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security</source>
                    <year>2013</year>
                    <month>09</month>
                    <day>06</day>
                    <access-date>2015-07-21</access-date>
                    <publisher-loc>London, UK</publisher-loc>
                    <publisher-name>The Guardian</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6aB5grrli</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Beauchamp</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Childress</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <source>Principles of Biomedical Ethics</source>
                    <year>2009</year>
                    <publisher-loc>Oxford, UK</publisher-loc>
                    <publisher-name>Oxford University Press</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Boyce</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <article-title>The Lancet Technology: June, 2012. Maps, apps&#8212;and evidence?</article-title>
                    <source>Lancet</source>
                    <year>2012</year>
                    <month>06</month>
                    <day>16</day>
                    <volume>379</volume>
                    <issue>9833</issue>
                    <fpage>2231</fpage>
                    <pub-id pub-id-type="medline">22715507</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bloem</surname>
                            <given-names>BR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Munneke</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Revolutionising management of chronic disease: The ParkinsonNet approach</article-title>
                    <source>BMJ</source>
                    <year>2014</year>
                    <volume>348</volume>
                    <fpage>g1838</fpage>
                    <pub-id pub-id-type="medline">24647365</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Eonta</surname>
                            <given-names>AM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Christon</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hourigan</surname>
                            <given-names>SE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ravindran</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Vrana</surname>
                            <given-names>SR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Southam-Gerow</surname>
                            <given-names>MA</given-names>
                        </name>
                    </person-group>
                    <article-title>Using everyday technology to enhance evidence-based treatments</article-title>
                    <source>Prof Psychol Res Pr</source>
                    <year>2011</year>
                    <volume>42</volume>
                    <issue>6</issue>
                    <fpage>513</fpage>
                    <lpage>520</lpage>
                    <pub-id pub-id-type="doi">10.1037/a0025825</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Labrique</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Vasudevan</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chang</surname>
                            <given-names>LW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mehl</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>H_pe for mHealth: more &#34;y&#34; or &#34;o&#34; on the horizon?</article-title>
                    <source>Int J Med Inform</source>
                    <year>2013</year>
                    <month>05</month>
                    <volume>82</volume>
                    <issue>5</issue>
                    <fpage>467</fpage>
                    <lpage>469</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23279850" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2012.11.016</pub-id>
                    <pub-id pub-id-type="medline">23279850</pub-id>
                    <pub-id pub-id-type="pii">S1386-5056(12)00240-7</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3849805</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Tomlinson</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rotheram-Borus</surname>
                            <given-names>MJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Swartz</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tsai</surname>
                            <given-names>AC</given-names>
                        </name>
                    </person-group>
                    <article-title>Scaling up mHealth: Where is the evidence?</article-title>
                    <source>PLoS Med</source>
                    <year>2013</year>
                    <volume>10</volume>
                    <issue>2</issue>
                    <fpage>e1001382</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pmed.1001382" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1371/journal.pmed.1001382</pub-id>
                    <pub-id pub-id-type="medline">23424286</pub-id>
                    <pub-id pub-id-type="pii">PMEDICINE-D-12-02226</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3570540</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <collab>The Bellagio eHealth Evaluation Group</collab>
                    </person-group>
                    <source>Call to Action on Global eHealth Evaluation: Consensus Statement of the WHO Global eHealth Evaluation Meeting, Bellagio, September</source>
                    <year>2011</year>
                    <publisher-loc>Geneva, Switzerland</publisher-loc>
                    <publisher-name>World Health Organization</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Eysenbach</surname>
                            <given-names>G</given-names>
                        </name>
                        <collab>CONSORT-EHEALTH Group</collab>
                    </person-group>
                    <article-title>CONSORT-EHEALTH: Improving and standardizing evaluation reports of Web-based and mobile health interventions</article-title>
                    <source>J Med Internet Res</source>
                    <year>2011</year>
                    <volume>13</volume>
                    <issue>4</issue>
                    <fpage>e126</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/4/e126/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1923</pub-id>
                    <pub-id pub-id-type="medline">22209829</pub-id>
                    <pub-id pub-id-type="pii">v13i4e126</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3278112</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Food and Drug Administration</collab>
                    </person-group>
                    <source>Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff</source>
                    <year>2015</year>
                    <access-date>2015-07-21</access-date>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM263366.pdf">http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM263366.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">6aB5sGZRQ</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Powell</surname>
                            <given-names>AC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Landman</surname>
                            <given-names>AB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                    </person-group>
                    <article-title>In search of a few good apps</article-title>
                    <source>JAMA</source>
                    <year>2014</year>
                    <month>05</month>
                    <day>14</day>
                    <volume>311</volume>
                    <issue>18</issue>
                    <fpage>1851</fpage>
                    <lpage>1852</lpage>
                    <pub-id pub-id-type="doi">10.1001/jama.2014.2564</pub-id>
                    <pub-id pub-id-type="medline">24664278</pub-id>
                    <pub-id pub-id-type="pii">1852662</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>