<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMU</journal-id>
            <journal-id journal-id-type="nlm-ta">JMIR mHealth uHealth</journal-id>
            <journal-title>JMIR mHealth and uHealth</journal-title>
            <issn pub-type="epub">2291-5222</issn>
            <publisher>
                <publisher-name>JMIR Publications Inc.</publisher-name>
                <publisher-loc>Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v4i1e14</article-id>
            <article-id pub-id-type="pmid">26860623</article-id>
            <article-id pub-id-type="doi">10.2196/mhealth.4423</article-id>
            <article-categories>
                <subj-group subj-group-type="heading">
                    <subject>Original Paper</subject>
                </subj-group>
                <subj-group subj-group-type="article-type">
                    <subject>Original Paper</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Guidelines and Recommendations for Developing Interactive eHealth Apps for Complex Messaging in Health Promotion</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Kitsiou</surname>
                        <given-names>Spyros</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Johnston</surname>
                        <given-names>Maximilian</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Vollmer dahlke</surname>
                        <given-names>Deborah</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>B</surname>
                        <given-names>Ram Krishnan</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1">
                    <name name-style="western">
                        <surname>Heffernan</surname>
                        <given-names>Kayla Joanne</given-names>
                    </name>
                    <degrees>MIS</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-0816-8986</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib2" corresp="yes">
                    <name name-style="western">
                        <surname>Chang</surname>
                        <given-names>Shanton</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff1" ref-type="aff">1</xref>
                    <address>
                        <institution>Department of Computing and Information Systems</institution>
                        <institution>Melbourne School of Engineering</institution>
                        <institution>The University of Melbourne</institution>
                        <addr-line>Doug McDonell Building</addr-line>
                        <addr-line>The University of Melbourne</addr-line>
                        <addr-line>Parkville, 3010</addr-line>
                        <country>Australia</country>
                        <phone>61 383441500</phone>
                        <fax>61 393494596</fax>
                        <email>shanton.chang@unimelb.edu.au</email>
                    </address>
                    <xref rid="aff2" ref-type="aff">2</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-2163-3910</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Maclean</surname>
                        <given-names>Skye Tamara</given-names>
                    </name>
                    <degrees>MN(Prac)</degrees>
                    <xref rid="aff3" ref-type="aff">3</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1716-9043</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib4">
                    <name name-style="western">
                        <surname>Callegari</surname>
                        <given-names>Emma Teresa</given-names>
                    </name>
                    <degrees>BH-BMED (Hons)</degrees>
                    <xref rid="aff3" ref-type="aff">3</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-3046-7694</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib5">
                    <name name-style="western">
                        <surname>Garland</surname>
                        <given-names>Suzanne Marie</given-names>
                    </name>
                    <degrees>FRANZCOG, MBBS, MD, FRCPA, FAChSHM</degrees>
                    <xref rid="aff4" ref-type="aff">4</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-6869-311X</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib6">
                    <name name-style="western">
                        <surname>Reavley</surname>
                        <given-names>Nicola Jane</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref rid="aff5" ref-type="aff">5</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5513-8291</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib7">
                    <name name-style="western">
                        <surname>Varigos</surname>
                        <given-names>George Andrew</given-names>
                    </name>
                    <degrees>MBBS, FACD, PhD</degrees>
                    <xref rid="aff6" ref-type="aff">6</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9059-9966</ext-link>
                </contrib>
                <contrib contrib-type="author" id="contrib8">
                    <name name-style="western">
                        <surname>Wark</surname>
                        <given-names>John Dennis</given-names>
                    </name>
                    <degrees>BS, MB, FRACP, PhD</degrees>
                    <xref rid="aff3" ref-type="aff">3</xref>
                    <xref rid="aff7" ref-type="aff">7</xref>
                    <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-2431-7902</ext-link>
                </contrib>
            </contrib-group>
            <aff id="aff1">
                <sup>1</sup>
                <institution>Department of Computing and Information Systems</institution>
                <institution>Melbourne School of Engineering</institution>
                <institution>The University of Melbourne</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff2">
                <sup>2</sup>
                <institution>Health and Biomedical Informatics Centre</institution>
                <institution>Melbourne Medical School</institution>
                <institution>The University of Melbourne</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff3">
                <sup>3</sup>
                <institution>University of Melbourne Department of Medicine</institution>
                <institution>Royal Melbourne Hospital</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff4">
                <sup>4</sup>
                <institution>Royal Women's Hospital</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff5">
                <sup>5</sup>
                <institution>Centre for Mental Health</institution>
                <institution>Melbourne School of Population and Global Health</institution>
                <institution>The University of Melbourne</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff6">
                <sup>6</sup>
                <institution>Department of Dermatology</institution>
                <institution>Royal Melbourne Hospital</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <aff id="aff7">
                <sup>7</sup>
                <institution>Royal Melbourne Hospital</institution>
                <institution>Bone and Mineral Medicine</institution>
                <addr-line>Parkville</addr-line>
                <country>Australia</country>
            </aff>
            <author-notes>
                <corresp>Corresponding Author: Shanton Chang <email>shanton.chang@unimelb.edu.au</email>
                </corresp>
            </author-notes>
            <pub-date pub-type="collection">
                <season>Jan-Mar</season>
                <year>2016</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>09</day>
                <month>02</month>
                <year>2016</year>
            </pub-date>
            <volume>4</volume>
            <issue>1</issue>
            <elocation-id>e14</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>6</day>
                    <month>4</month>
                    <year>2015</year>
                </date>
                <date date-type="rev-request">
                    <day>28</day>
                    <month>4</month>
                    <year>2015</year>
                </date>
                <date date-type="rev-recd">
                    <day>30</day>
                    <month>9</month>
                    <year>2015</year>
                </date>
                <date date-type="accepted">
                    <day>18</day>
                    <month>10</month>
                    <year>2015</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Kayla Joanne Heffernan, Shanton Chang, Skye Tamara Maclean, Emma Teresa Callegari, Suzanne Marie Garland, Nicola Jane Reavley, George Andrew Varigos, John Dennis Wark. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 09.02.2016. </copyright-statement>
            <copyright-year>2016</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://mhealth.jmir.org/2016/1/e14/" xlink:type="simple" />
            <abstract>
                <sec sec-type="background">
                    <title>Background</title>
                    <p>The now ubiquitous catchphrase, &#8220;There&#8217;s an app for that,&#8221; rings true owing to the growing number of mobile phone apps. In excess of 97,000 eHealth apps are available in major app stores. Yet the effectiveness of these apps varies greatly. While a minority of apps are developed grounded in theory and in conjunction with health care experts, the vast majority are not. This is concerning given the Hippocratic notion of &#8220;do no harm.&#8221; There is currently no unified formal theory for developing interactive eHealth apps, and development is especially difficult when complex messaging is required, such as in health promotion and prevention.</p>
                </sec>
                <sec sec-type="objective">
                    <title>Objective</title>
                    <p>This paper aims to provide insight into the creation of interactive eHealth apps for complex messaging, by leveraging the Safe-D case study, which involved complex messaging required to guide safe but sufficient UV exposure for vitamin D synthesis in users. We aim to create recommendations for developing interactive eHealth apps for complex messages based on the lessons learned during Safe-D app development.</p>
                </sec>
                <sec sec-type="methods">
                    <title>Methods</title>
                    <p>For this case study we developed an Apple and Android app, both named Safe-D, to safely improve vitamin D status in young women through encouraging safe ultraviolet radiation exposure. The app was developed through participatory action research involving medical and human computer interaction researchers, subject matter expert clinicians, external developers, and target users. The recommendations for development were created from analysis of the development process.</p>
                </sec>
                <sec sec-type="results">
                    <title>Results</title>
                    <p>By working with clinicians and implementing disparate design examples from the literature, we developed the Safe-D app. From this development process, recommendations for developing interactive eHealth apps for complex messaging were created: (1) involve a multidisciplinary team in the development process, (2) manage complex messages to engage users, and (3) design for interactivity (tailor recommendations, remove barriers to use, design for simplicity).</p>
                </sec>
                <sec sec-type="conclusions">
                    <title>Conclusions</title>
                    <p>This research has provided principles for developing interactive eHealth apps for complex messaging as guidelines by aggregating existing design concepts and expanding these concepts and new learnings from our development process. A set of guidelines to develop interactive eHealth apps generally, and specifically those for complex messaging, was previously missing from the literature; this research has contributed these principles. Safe-D delivers complex messaging simply, to aid education, and explicitly, considering user safety.</p>
                </sec>
            </abstract>
            <kwd-group>
                <kwd>mhealth</kwd>
                <kwd>complex messaging</kwd>
                <kwd>vitamin D</kwd>
                <kwd>eHealth smartphone apps</kwd>
                <kwd>interactive</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>In 2013, there were 97,000 eHealth apps in major app stores [<xref ref-type="bibr" rid="ref1">1</xref>]. Comments in the literature support the notion that these kinds of apps may be beneficial to health [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref4">4</xref>]. Some eHealth experts and technology advocates have predicted that one day they will prescribe an app as they would a medication [<xref ref-type="bibr" rid="ref5">5</xref>]. Despite the potential benefits of eHealth apps [<xref ref-type="bibr" rid="ref6">6</xref>], especially in the case of complex messaging, most eHealth interventions are developed commercially, while health organizations have lagged behind in this field [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
            <p>The effectiveness of these apps can vary if development does not draw on change theories [<xref ref-type="bibr" rid="ref2">2</xref>], employ scientific foundations, or involve health care professionals [<xref ref-type="bibr" rid="ref3">3</xref>]. To date, much has been done broadly on designing for behavioral change [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>] and on app development [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. However, the domain of eHealth app development is still broadly under-researched. From a health perspective, involvement from health care professionals is crucial for efficacy and rigor [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref11">11</xref>], and patient safety must be considered as these apps have the potential to cause harm [<xref ref-type="bibr" rid="ref11">11</xref>]. The reality that health information needs are somewhat different from general interests [<xref ref-type="bibr" rid="ref12">12</xref>] means that health-specific considerations are important for app development in this domain.</p>
            <p>More recently, clinician involvement has occurred [<xref ref-type="bibr" rid="ref13">13</xref>], but there is still limited research in this area to guide development of eHealth apps. The lack of published examples describing eHealth app development makes it difficult to determine an eHealth app development process that is rigorous, research-based, and involves health care professionals. This paper aims to formulate recommendations to guide development of interactive eHealth apps by drawing on the principles from the broad app development literature and the Safe-D case study. The development of the D-Safe app to prevent vitamin D deficiency was used as case study. The app is currently being evaluated in a randomized controlled trial (RCT), which is underway (ACTRN 12613000972729). While the app developed is input into a current RCT, this paper focuses on how the app was developed and recommendations learned from the development. The RCT protocol and results will be the subject of later publications. Similarly, our work on personalizing messages for young women is published elsewhere [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
            <p>High-level exposure to ultraviolet (UV) radiation from the sun is a major risk factor for skin cancer, yet UV exposure is needed for vitamin D synthesis in the skin. In Australia, skin cancer awareness has risen considerably in recent years. At the same time, research has demonstrated low vitamin D levels in various population samples despite abundant natural UV radiation. On the whole, Australians have adopted the Cancer Council&#8217;s &#8220;slip-slop-slap&#8221; campaign message [<xref ref-type="bibr" rid="ref15">15</xref>], thereby reducing sun exposure and potentially inhibiting vitamin D synthesis. In one study, 31% of 18-24 year-olds residing in Australia were vitamin D deficient [<xref ref-type="bibr" rid="ref16">16</xref>]. Currently, the message to the public is complex and potentially confusing: sunlight is needed for vitamin D, yet agencies, including the Cancer Council, urge individuals to limit &#8220;exposure to reduce the risk of melanoma&#8221; [<xref ref-type="bibr" rid="ref17">17</xref>]. Difficulty stems from the need to balance adequate and safe UV exposure to stimulate sufficient vitamin D synthesis, against the harmful levels that increase risk of melanoma and other skin cancers. There are many variables to consider and conflicting recommendations. This is what we refer to as complex messaging, as the recommendations for safe sun exposure depend on an individual&#8217;s personal attributes and changing environment conditions. Vitamin D deficiency is diagnosed and managed primarily through general medical practitioners (GPs). However, a recent survey [<xref ref-type="bibr" rid="ref18">18</xref>] found that the advice patients received differed from expert recommendations.</p>
            <p>In addition, only a few foods such as oily fish, sun-exposed mushrooms, and eggs contain appreciable amounts of vitamin D [<xref ref-type="bibr" rid="ref19">19</xref>]. Even with margarine and some other foods in Australia being fortified with vitamin D [<xref ref-type="bibr" rid="ref17">17</xref>], the average Australian diet alone is not enough to achieve sufficient vitamin D. Moreover, barriers exist to widespread supplementation [<xref ref-type="bibr" rid="ref17">17</xref>], such as cost and non-compliance issues. Therefore, safe sun exposure remains a high priority, as UV radiation is the major source of vitamin D [<xref ref-type="bibr" rid="ref19">19</xref>]. However, UV varies based on location, season and time of the day, cloud cover, and pollution. In addition to these environmental factors, vitamin D synthesis is affected by skin pigmentation. For example, darker skin requires longer exposure than fairer skin to synthesize the same amount of vitamin D [<xref ref-type="bibr" rid="ref20">20</xref>]. Vitamin D from sunlight is dependent on exposed skin as the greater the area covered, the less there is available for synthesis. Use of sunscreen has similar impact, diminishing UV absorption, thus reducing vitamin D synthesis [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
            <p>To address these diverse variables, we selected an app as the best medium to provide the complex messaging required to guide safe but sufficient UV exposure, as it affords the two-way information exchange required for interactive, tailored recommendations. Utilizing an interactive eHealth app enables portability to record sun exposure duration and frequency as it occurs. Hence, more reliable exposure measurements [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] can be captured than is possible from traditional diary-based interventions, potentially improving safety and accuracy. Interaction is especially important because static one-way interventions would not be able to provide recommendations based on individual and external factors at the time of exposure, as is required for user safety. Moreover, we found that many young women aged 16-25 years, the target audience for the study and Safe-D app, wanted information regarding required sun exposure (36/47, 77%) while over half (32/47, 68%) believed an app could help improve vitamin D levels and also identified a need for better information than their GP currently provided.</p>
            <p>The Safe-D study is limited to English-reading females aged 16-25 years residing in the State of Victoria, Australia. Therefore, the Safe-D app is in English only and designed for this target audience. Safe-D, and thus this research, does not include social media integration during its evaluation. There is a need for this limitation to restrict the opportunity for participants to share information with non-app intervention participants during its evaluation, insuring RCT integrity. Further to these limitations, the app is available only on Apple and Android devices, using existing technologies of Global Positioning System&#160;(GPS) and readily available UV data from the Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) and Bureau of Meteorology (BOM). The limitation to Apple and Android devices only was based on Australian Interactive Media Industry Association (AIMIA) results that 49% of Australians own a smartphone, predominantly Apple and Android devices [<xref ref-type="bibr" rid="ref23">23</xref>]. As AIMIA results are disaggregated from gender and age, a Web survey was conducted to understand the young female smartphone landscape. Of the respondents, 98% (56/57) owned a smartphone, 95% of those comprising Apple and Android devices, reinforcing the decision to develop for these platforms only.</p>
            <sec>
                <title>Theoretical Background</title>
                <p>Safe-D development conformed to eHealth, persuasion, and interactivity best practices. A literature review was conducted to align development with current literature, presented thematically in this section. The aim of Safe-D was to persuasively encourage UV exposure. Persuasive technologies are those to prompt behavior change and reinforce learning [<xref ref-type="bibr" rid="ref9">9</xref>]. A variety of concepts in the literature [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref28">28</xref>] were considered in the development of the app, including persuasion through monitoring and tracking, simplicity, rewarding behaviors, gamification, tailored messages, and improving user experience (UX).</p>
            </sec>
            <sec>
                <title> Monitoring and Tracking</title>
                <p>Eysenbach [<xref ref-type="bibr" rid="ref2">2</xref>] found that participants liked to monitor, track, and review records, and he established that &#8220;simply viewing records&#8230;could prompt healthier behavior.&#8221; Along similar lines, it has been found that the interactivity of tracking physical activity led to an increase in steps through incremental changes [<xref ref-type="bibr" rid="ref27">27</xref>]. Therefore, young women tracking other quantifiable events may do the same. Interactive eHealth apps for complex messaging should enable exposure tracking and performance indicators.</p>
            </sec>
            <sec>
                <title> Simplicity</title>
                <p>Dennison et al [<xref ref-type="bibr" rid="ref2">2</xref>] also uncovered competing participant desires for accurate records without frequent data entry. Where entry is complicated and time-consuming, users discontinued tracking [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. The premise behind these findings is expressed by Fogg [<xref ref-type="bibr" rid="ref3">3</xref>] who argued that barriers that could prevent desired behavior must be removed for the behavior to occur. Therefore, as much as interaction is important, it seems that data entry by the users also has to be quick, easy, and convenient, while accurate.</p>
            </sec>
            <sec>
                <title> Rewarding Behavior</title>
                <p>Rewarding positive behaviors, rather than punishing non-compliance, leads to continued engagement [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Consolvo and Landay [<xref ref-type="bibr" rid="ref8">8</xref>] found negative reinforcement does not encourage behaviors, nor does lack of credit for compliance. Therefore, it was important to consider how to reward behaviors while not punishing non-compliance.</p>
            </sec>
            <sec>
                <title> Gamification</title>
                <p>Gamification is the use of game elements in non-game contexts to provoke competition [<xref ref-type="bibr" rid="ref30">30</xref>]. Calvo and Peters [<xref ref-type="bibr" rid="ref31">31</xref>] found that provision of information alone only motivates change in 10% of individuals and suggested that interactive gamification may increase motivation and intervention compliance, a strategy also suggested by Segerstahl et al [<xref ref-type="bibr" rid="ref10">10</xref>]. Given convergent recommendations, interactive eHealth apps for complex messaging should consider gamification to encourage use and improve compliance.</p>
            </sec>
            <sec>
                <title> Tailored Messages</title>
                <p>It is well published that tailored messages are most effective at motivation [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. While messages are vital for an eHealth intervention to aid learning, doing so excessively dissuades users [<xref ref-type="bibr" rid="ref2">2</xref>]. The contexts of target users must be considered to deliver relevant messages at opportune times for desired behavioral change to occur [<xref ref-type="bibr" rid="ref3">3</xref>]. Clinicians also should be involved in complex message construction and messages tested for suitability and relevance with target users.</p>
            </sec>
            <sec>
                <title> User Experience</title>
                <p>UX encompasses &#8220;reactions and feelings, which arise from interactions with a system&#8221; [<xref ref-type="bibr" rid="ref10">10</xref>]. UX elicitation can be accomplished by applying visually appealing designs [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]; a competent look and feel [<xref ref-type="bibr" rid="ref28">28</xref>]; creative, fun, and humorous elements [<xref ref-type="bibr" rid="ref26">26</xref>]; ease of use; error tolerance; and system responsiveness [<xref ref-type="bibr" rid="ref9">9</xref>]. The literature indicates that for successful persuasion, UX must be considered [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. Therefore, interactive eHealth app development should focus on user-centered design by involving users and leveraging researcher expertise in UX and human computer interaction.</p>
            </sec>
        </sec>
        <sec sec-type="methods">
            <title>Methods</title>
            <p>This research had dual goals of developing Safe-D while utilizing the process to understand development principles for interactive eHealth apps for complex messaging. These dual goals contribute to the development of a tangible solution in the form of the Safe-D app, while corresponding with intended outcomes of participatory action research [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. Participatory action research was employed as it enabled a team of subject matter experts to work collaboratively with target users to develop the app, while researchers in the team reflected on the experience to garner recommendations. The experts involved included subject matter expert clinicians, a biostatistician, information systems researchers, external developers, public health practitioners, and target users.</p>
            <sec>
                <title>App Development</title>
                <p>As is commonplace in qualitative research, development began relatively theory-free [<xref ref-type="bibr" rid="ref34">34</xref>] in &#8220;round-table&#8221;-style discussions and ideation meetings with the team. Initial meetings were then used to fully appreciate and articulate the complex and confounding factors of achieving adequate vitamin D synthesis, which the app would have to cater for. These discussions were important to establish the range of variables to be considered, the diverse contexts of the target users, and, just as importantly, common understanding between the different groups of experts at the table. This was not only an important part of the app development process but was also the beginning of the participatory action research process.</p>
                <p>A preliminary survey was conducted to further understand what young women wanted in an app, to inform design decisions. The survey was conducted online and advertised via a Melbourne Health media release, the &#8220;Netball Scoop&#8221; forum, VGen Core group, the Youth Affairs Council of Victoria monthly e-newsletter, and an email to past participants in the Young Female Health Initiative (a collaborative comprehensive health study of 16-25 year-old women in Victoria, Australia). A total of 71 respondents commenced the survey. Of these, 57 passed all eligibility criteria to participate, that is, being English-speaking females aged 18-25.</p>
                <p>Developers were hired, and development followed stages from the software development lifecycle, selected due to its applicability to both business and health care scenarios [<xref ref-type="bibr" rid="ref35">35</xref>]. The stages of our software development lifecycle were iterative and tailored to incorporate agile development ideologies [<xref ref-type="bibr" rid="ref36">36</xref>]. These are described in <xref ref-type="table" rid="table1">Table 1</xref>. An existing algorithm [<xref ref-type="bibr" rid="ref37">37</xref>] was selected to calculate recommendations for UV exposure due to applicability in New Zealand, similar in latitude to Australia.</p>
                <table-wrap position="float" id="table1">
                    <label>Table 1</label>
                    <caption>
                        <p>Development phases.</p>
                    </caption>
                    <table width="664" border="0" cellpadding="7" cellspacing="0" rules="groups" frame="hsides">
                        <col width="111" />
                        <col width="524" />
                        <thead>
                            <tr valign="top">
                                <td>Development phase</td>
                                <td>Process and data generated to help develop the Safe-D App</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Requirements analysis</td>
                                <td>Requirements were written and a literature review and focus groups were conducted.</td>
                            </tr>
                            <tr valign="top">
                                <td>Design</td>
                                <td>Wireframes were created to elicit non-functional and evolving requirements.</td>
                            </tr>
                            <tr valign="top">
                                <td>Design validation</td>
                                <td>Designs were validated in informal focus groups, an advisory private Facebook group, and informal &#8220;guerilla testing,&#8221; asking young women approached in public places for opinions regarding designs. Outcomes were used to (1) determine preferences, (2) validate designs as flexible, non-offensive, and culturally sensitive, (3) validate messages conveyed the intended message, and (4) test the app concept.</td>
                            </tr>
                            <tr valign="top">
                                <td>Development</td>
                                <td>The contracted developers created Safe-D for Apple and Android platforms iteratively and collaboratively with the other researchers.</td>
                            </tr>
                            <tr valign="top">
                                <td>Beta testing</td>
                                <td>Core team members who used with Apple and Android devices were given access to Safe-D. Additional beta testers were seconded from the larger team to ensure a range of platform and operating system configurations, making a total of 24 beta testers, consisting of 6 from the target demographic while others acted as expert reviewers.</td>
                            </tr>
                            <tr valign="top">
                                <td>Retrospective</td>
                                <td>This is the final phase, adopted from agile methodologies. Retrospectives are specific meetings reflecting on the development and identifying improvements. Retrospective data enabled triangulation so findings did not rely solely on observations of the authors.</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>Throughout each stage, available recommendations from the literature (as previously outlined) were used to help create the best experience in the app.</p>
            </sec>
            <sec>
                <title>Developing Recommendations</title>
                <p>Researcher reflections and observational notes were used to highlight recommendations for future developments. This analysis was triangulated through data collected during retrospectives. Each member (ie, information systems and medical researchers, medical professionals, beta testers and app developers) shared what they thought went well, what did not, and what they would do differently next time based on this experience. Post-development, retrospective data were organized thematically through affinity mapping to check against initial researcher observations. This process condensed the data in a manageable format to identify any themes and relationships between themes, using an inductive approach, as per Neuman [<xref ref-type="bibr" rid="ref33">33</xref>]. The data analysis enabled theoretical abstractions and pattern detection for identification of overarching principles for development of interactive eHealth apps for complex messaging.</p>
            </sec>
        </sec>
        <sec sec-type="results">
            <title>Results</title>
            <p>As this research had the dual goals of first developing the Safe-D app and then using this process to develop recommendations for future app development, the results will be presented separately: the Safe-D app and development recommendations.</p>
            <sec>
                <title>Safe-D App</title>
                <p>Safe-D aims to safely improve vitamin D status, through individualized UV exposure recommendations, messages, and learning. Safe-D will be presented by the major actions that users take within the app, which are initial setup, tracking UV exposure, monitoring progress, recording missed exposure, and viewing messages.</p>
            </sec>
            <sec>
                <title>Initial Setup</title>
                <p>Initial app setup is required when the user accesses the app for the first time. Safe-D prompts for (1) push notification and GPS permissions needed to provide interactive personalized recommendations based on real-time locational UV, (2) answers to the Fitzpatrick skin-type questionnaire [<xref ref-type="bibr" rid="ref38">38</xref>] to determine skin type (avoiding self-selection error), which is input once, stored, and used in calculations, and (3) avatar skin, hair, and eye color and hairstyle configuration. These selections are used to present an avatar that will remind the user of themselves, without tying skin tone to skin type, thus increasing attention and persuasion [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. The avatar configurations enable users to comfortably represent themselves for greater persuasion through imitation. There were extensive UX considerations regarding avatar and clothing options. The avatar does not propagate unrealistic body image, and cultural awareness was considered through inclusion of the hijab and niqab options.</p>
                <p>Tunneling, the practice of guiding users through 1 question per screen, was implemented to reduce cognitive load. All data entry is simple to encourage usage, and logon details can be remembered for automatic sign-in to remove barriers to future use. As Safe-D is intended for initial evaluation in an RCT, access must be restricted to only participants through password protection.</p>
            </sec>
            <sec>
                <title>Tracking UV Exposure</title>
                <p>To record UV exposure, the avatar must first be dressed. This is a seamless and fun interaction used to record exposed skin and sunscreen protection. Sunscreen and clothing are required for exposure calculations. Therefore, they are explicitly prompted. Exposed skin entry is simple: the avatar enables easy, visual, touch entry of clothing to calculate exposed skin. For usability, the avatar defaults to clothing from the last exposure, removing a step if exposed skin remains stable exposure-to-exposure.</p>
                <p>These inputs, with locational UV levels and skin type, are used to calculate and display safe exposure recommendations. As exposure has a safe limit, the timer cannot simply count down. Exposure counts down to zero, then up in red to indicate, alert to, and dissuade overexposure. Gamification promotes usage, inspired by Fish n&#8217; Steps metaphor [<xref ref-type="bibr" rid="ref30">30</xref>]: a fish whose health improved or deteriorated with exercise. In the study, steps did not increase in the prestudy pedometer-only phase, yet when using Fish n&#8217; Steps there was a positive impact on 74% (14/19) of participants [<xref ref-type="bibr" rid="ref30">30</xref>]. In Safe-D, a sunflower was selected to reiterate connotations of sun exposure. As exposure reaches target, the sunflower health display grows healthier and happier. If healthy exposure is exceeded, health declines. When the user stops timing, they are provided with interactive feedback regarding whether more exposure is required or exposure has been met, or exceeded.</p>
            </sec>
            <sec>
                <title>Monitoring Progress</title>
                <p>There are two ways to monitor progress on the app: viewing today&#8217;s exposure or overall exposure. Today&#8217;s exposure is visible on the homepage by assessing the sunflower&#8217;s health state. The sunflower health state can also be assessed while the timer is running. Overall progress is monitored via statistics, displaying the current consecutive days-of-use in the form of a streak, and longest consecutive use. Streak here is used in the sporting sense to refer to a running total of consecutive days when the app was accessed. To encourage reaching exposure, without exceeding the defined safe limit, Safe-D enables easy entry and viewing of exposure, making it apparent when the safe limit is exceeded. The progress display of how much exposure the user has had each day allows them to adjust behavior accordingly. This visual display takes into account that exposure can be too high, too low, or just right for the most number of users. Inspiration was garnered from discussions with other app designers [<xref ref-type="bibr" rid="ref40">40</xref>] at the Melbourne Quantified Self group meetup, which also points to the concept of a &#8220;goldilocks&#8221; zone (the zone for just the right level of access to information for users, or an ideal level of desired behavior). In this case, the goldilocks zone refers to just the right level of exposure to sunlight for each user, which is integrated with a traffic light display system. Therefore, the &#8220;just right&#8221; level of sunlight exposure is denoted as green, &#8220;too high&#8221; is red to signal danger, and &#8220;too low&#8221; is yellow to indicate it is suboptimal without reprimanding the user. This &#8220;just right&#8221; goldilocks zone is dependent on the acceptable statistics based on the algorithm behind the app.</p>
            </sec>
            <sec>
                <title>Recording Missed Exposure</title>
                <p>Missed exposure can occur for two reasons: a user may be unable to get sun or may forget to record it. When unable to get sun, the &#8220;I Can&#8217;t Get Sun Today&#8221; feature records the reason. If users forget to start or stop the timer, they can retrospectively enter or delete using &#8220;My Sun Exposure.&#8221; Users may be unable to get sun for a number of reasons, and this function handles this sensitively without punishing a user by forcing them to lose their in-app streak.</p>
            </sec>
            <sec>
                <title>Exposure Recommendations</title>
                <p>Safe-D aims to safely improve long-term vitamin D status through UV exposure. Thus, to prevent indefinite app reliance, information is required for learning. The complex messaging occurs on a per scenario basis (see <xref ref-type="table" rid="table2">Table 2</xref>), and different messages are delivered in different ways. These messages are complex because, while the same scenarios trigger messages for all users, the content of these messages varies based on the user&#8217;s skin type, how much skin they have exposed and whether they are using sunscreen or not, the current UV based on their current location, and the exposure they have already had for the day. Messages can be delivered in one or multiple modalities: in-app messages to deliver point-of-interaction information, push notifications requiring action and garnering attention to trigger this action as per the Fogg Behavioral Model [<xref ref-type="bibr" rid="ref3">3</xref>], and mail messages available for later retrieval. <xref ref-type="table" rid="table2">Table 2</xref> shows the scenarios that trigger messages to send and how these messages are delivered.</p>
                <table-wrap position="float" id="table2">
                    <label>Table 2</label>
                    <caption>
                        <p>Safe-D messages and medium per scenario.</p>
                    </caption>
                    <table width="664" border="1" cellpadding="7" cellspacing="0" frame="below" rules="groups">
                        <col width="295" />
                        <col width="100" />
                        <col width="101" />
                        <col width="112" />
                        <thead>
                            <tr valign="top">
                                <td>Scenario</td>
                                <td>In app</td>
                                <td>Push</td>
                                <td>Mail</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Timer stopped without reaching exposure</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Exposure reached</td>
                                <td>Yes</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Exposure exceeded</td>
                                <td>Yes</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Exposure exceeded and timer not stopped</td>
                                <td>Yes</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Exposure exceeded and &#8220;Get Vitamin D&#8221; accessed when UV is still above low</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Exposure exceeded and &#8220;Get Vitamin D&#8221; accessed when UV is now low</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Too much sun without reaching exposure, via the &#8220;Too Much Sun&#8221; function</td>
                                <td>Yes</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Safe-D not used</td>
                                <td>
                                    <break />
                                </td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>UV in current location changes during exposure</td>
                                <td>Yes</td>
                                <td>Yes</td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>Forecast UV is extreme or very low</td>
                                <td>
                                    <break />
                                </td>
                                <td>Yes</td>
                                <td>Yes</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>From our preliminary survey, 64% (7/11) of respondents provided an answer for the acceptable number of notifications per day, reporting 1-2 notifications per day as acceptable. However, beta testing revealed that 1 per day when the user was not actively using Safe-D was annoying and could potentially inhibit use. Push notifications send to a user&#8217;s phone only under the following circumstances: the timer is running and/or behavior needs to occur, Safe-D was not used the previous day, the user recorded &#8220;Too Much Sun&#8221; yesterday, and an educational message sent once a week.</p>
            </sec>
            <sec>
                <title>Viewing Messages</title>
                <p>Messages can be viewed either as push notifications or through in-app mail. Messages can be sent to groups to improve effectiveness rather than generic messages sent to all. Other messages are interactive, based on user inputs. Mail was designed in a way that enables tailored messages to be sent to defined groups. Hardcoded events are recorded in the Safe-D dashboard that researchers can access and identify individuals who may need special messages. An example of how this could be implemented is to look at users who continually flag that they cannot get sun today because they are &#8220;too busy.&#8221; A sensitively tailored message could then be sent to such a participant to encourage them to make time. In more extreme cases if a participant continuously exceeds app-defined safe exposure limits, it would be possible for the non-blinded researcher to identify and contact them directly for their safety.</p>
                <p>Educational notifications are delivered weekly. These are designed to be fun, non-clinical, and short. Messages cannot build on previously received messages as participants can start Safe-D at different times. Clinical experts in bone health and dermatology first reviewed all written copy, and expert bodies, such as the Cancer Council, are referenced where appropriate. Messages are framed positively to avoid reprimanding users [<xref ref-type="bibr" rid="ref8">8</xref>], and they correlate to the state of the sunflower to reinforce the metaphor and learning. Messages were created to be interesting and non-repetitive, cycling through different wording to avoid monotony due to repetition.</p>
            </sec>
        </sec>
        <sec sec-type="discussion">
            <title>Discussion</title>
            <sec>
                <title>Key Development Recommendations from the Safe-D Study</title>
                <p>As previously indicated, the literature [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>] suggested the following design concepts: persuasion through simple tracking, rewarding positive behaviors, not punishing non-compliance, considering message timing, including gamification, and designing UX. We extended these design concepts in the form of the following recommendations based on key learnings from the Safe-D project.</p>
                <sec>
                    <title>Recommendation 1: Involve a Multidisciplinary Team in the Development Process</title>
                    <p>As recommended in the literature [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>], multidisciplinary teams are important in similar contexts. One of the key challenges for such a team is to ensure understanding of the complexities of the problem and the cultures within the different disciplines involved. It was important to ensure that team members were able to meet face to face as much as possible for discussions, clarifications, safety advice, and approvals. It is also crucial to get all the information systems researchers and clinicians in agreement on the scope and requirements of the app before involving the app developers.</p>
                    <p>It is important to note that despite all the preparation in our study, it was not always possible to ensure that all roles and messages were fully understood. For example, developers may want a decision quickly, not appreciating that clinician review and approval was required. Similarly, clinicians may have unrealistic technical expectations. It is important to work through these issues and also ensure that there is adequate time set aside for the complexities of working in the multidisciplinary team. This recommendation reflects Gold et al&#8217;s findings [<xref ref-type="bibr" rid="ref41">41</xref>] regarding multidisciplinary teams in their development of eHealth intervention on social networking sites.</p>
                </sec>
                <sec>
                    <title>Recommendation 2: Managing Complex Messaging is Crucial to Engage Users</title>
                    <p>Conveying the complex and potentially confounding sun exposure factors to users was challenging. The recommendations from the study for managing the complex messaging were three-fold: (1) minimize user input requirements into the app to keep it relatively simple, (2) deliver safe personalized key messages to users when appropriate, and (3) manage the push messages from a central server.</p>
                    <p>First, the principle of minimizing input while making the complexity as invisible to the user was important. Safe-D achieved this by managing external factors in the background and only asking users for information that the app could not detect. The external UV level data sources (ARPANSA and BOM) were input into an algorithm, which was essential to calculate safe, personalized recommendations. Use of an algorithm enabled clear output based on individualized inputs, as is required for complex messaging. The mechanics of this algorithm, however, should not be apparent to users. The algorithm helped to determine which messages are most relevant and appropriate to individuals. If no algorithm exists, it is recommended that teams take the time to create one that provides the required output by taking into consideration all inputs and develop automated test coverage to run algorithms for complex messaging through all possible input combinations, especially when there is no existing algorithm available.</p>
                    <p>Second, it is the messages themselves that convey the complex information simply, with the use of gamification to further simplify understanding. These messages can be delivered in one or multiple modalities: in-app messages to deliver point-of-interaction information, push notifications when action is required, garnering attention to trigger the desired behavior as per Fogg [<xref ref-type="bibr" rid="ref3">3</xref>], and mail messages with content available for later retrieval. When employing gamification, the metaphor used should tie back to the health problem to reinforce learning by leveraging a heuristic to prompt for behavior when not using the app.</p>
                    <p>This research has built on work by Fogg [<xref ref-type="bibr" rid="ref3">3</xref>] and Oinas-Kukkonen and Harjumaa [<xref ref-type="bibr" rid="ref9">9</xref>]. Push notifications follow Fogg&#8217;s Behavioral Model as &#8220;without an appropriate trigger, behavior will not occur&#8221; [<xref ref-type="bibr" rid="ref3">3</xref>]. The timing of exposure-related notifications should be designed to be during use and to not occur at inopportune times [<xref ref-type="bibr" rid="ref9">9</xref>]. Similarly, push notifications regarding the same event should occur no more than twice, as constant prompts can lead to annoyance [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
                    <p>Third, the health messages should be simplified and controlled from a central server. This is so that messages can be updated when needed and pushed to users when relevant, without requiring them to update the app. It is useful to enable the delivery of customized messages to user subsets from the central server. In addition, this allows for later retrieval of education messages to reinforce education. It is then also easier to track which user has received which messages to help avoid repetitiveness.</p>
                </sec>
                <sec>
                    <title>Recommendation 3: Design for Interactivity</title>
                    <p>By designing for interactivity, we applied concepts from the literature [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref28">28</xref>] to provide tailored recommendations [<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>], remove barriers to use [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>], and achieve simplicity [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Through developing Safe-D, we extended these concepts to contribute specific implementations of them for eHealth apps that future developments can utilize.</p>
                    <sec>
                        <title>Tailored Recommendations</title>
                        <p>While the literature posits that tailored messages have greater persuasion [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref28">28</xref>], information on how to tailor these messages in an eHealth context is lacking. Thus, we expanded this principle based on lessons learned in message construction and beta testing. To postulate, recommendations should be based on input from the individual user and relevant external information, and based on each user&#8217;s interactions with the app (accounting for start of use of app, frequency of interaction, and nature of the interaction).</p>
                    </sec>
                    <sec>
                        <title>Removing Barriers to Use</title>
                        <p>Dennison et al [<xref ref-type="bibr" rid="ref2">2</xref>], Fogg [<xref ref-type="bibr" rid="ref3">3</xref>], and Segerstahl et al [<xref ref-type="bibr" rid="ref10">10</xref>] recommended that, for persuasion to occur, barriers to use must be removed. This research provides specific mechanisms to remove barriers, based on those experienced by beta testers. Removal of these barriers was addressed in design improvements through mechanisms to avoid repeat data entry, including facilitating quick entry of login details by enabling &#8220;Next&#8221; and &#8220;Go&#8221; keyboard options to move through fields with ease; remembering login details; storing static information (information that does not change with each interaction), rather than prompting for it; defaulting inputs to last used, rather than requiring re-entry; and touch-only input.</p>
                    </sec>
                    <sec>
                        <title>Simplicity</title>
                        <p>While the literature states that data entry must be simple to encourage use [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref10">10</xref>], strategies for simplicity are lacking. This research provides specific recommendations to achieve simplicity in an eHealth intervention. Simplicity can be achieved by working with target users to determine input options; providing touch-only entry of these closed-input options/choices, rather than free-text input; providing key information on the homepage for at-a-glance assessment; and push notifications to prompt for action, reducing cognitive burden.</p>
                        <p>These strategies simplified the interface to a few simple clicks, rather than extensive data entry. The push notifications reduced the need for users to remember recommendations and exposure time. As a result, the Safe-D app is easy to use, requiring minimal time to learn, and adopts an intuitive interface.</p>
                        <p>In summary, development followed the concepts from the literature of iterative and flexible development, continuous evaluation and refinement, participatory development, a multidisciplinary team and involvement of end-users, and active participation to fully appreciate and understand the issue up front [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>]. Despite this adherence, challenges were still faced owing to complex messaging and differences in focus between clinicians and developers. The recommended development principles are designed to reduce challenges faced in the development of future interactive eHealth apps for complex messaging.</p>
                    </sec>
                </sec>
            </sec>
            <sec>
                <title>Generalizability</title>
                <p>The principles we have presented in this paper were created through drawing inferences from Safe-D development. Safe-D takes multiple inputs and provides individualized and varying messaging to aid learning for users to optimize ongoing cutaneous vitamin D synthesis; continued exposure is required indefinitely to maintain vitamin D status. These principles can be leveraged for development of eHealth apps with similar individualized and complex messaging requirements where a one-size-fits-all message would be harmful. Examples of some potential eHealth apps that would require complex messages are described in <xref ref-type="table" rid="table3">Table 3</xref>.</p>
                <table-wrap position="float" id="table3">
                    <label>Table 3</label>
                    <caption>
                        <p>Potential future eHealth apps with complex messaging needs.</p>
                    </caption>
                    <table width="664" border="0" cellpadding="7" cellspacing="0" rules="groups" frame="hsides">
                        <col width="169" />
                        <col width="467" />
                        <thead>
                            <tr valign="top">
                                <td>eHealth app topic</td>
                                <td>Complex messaging</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Allergy</td>
                                <td>Allergy management requires ongoing monitoring and actions. An app would require personalized messages to each individual as their allergies and combination of allergies would vary.</td>
                            </tr>
                            <tr valign="top">
                                <td>Diabetes, hyperglycemia, hypoglycemia, and insulin resistance</td>
                                <td>Disordered blood glucose requires complex messaging based on real-time individual readings to provide correct advice for the individual&#8217;s requirement at the time, be it to take insulin, glucose, or maintain current levels.</td>
                            </tr>
                            <tr valign="top">
                                <td>Management of chronic illness</td>
                                <td>Many chronic conditions require individualized care plans based on the severity of the condition and any comorbidities. Care plan apps need to be able to accept multiple metrics that the user needs to track and deliver the right messages based on how they are tracking against each metric.</td>
                            </tr>
                            <tr valign="top">
                                <td>Musculoskeletal disorders</td>
                                <td>The recommendations such an app would need to provide on the amount and type of physical activity would need to take in to account confounding factors of disorder (eg, osteoporosis), age, flexibility, and any temporary injuries.</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>Potentially most of these conditions will require individualized and complex messaging with the move towards personalized medicine [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. While these principles will aid in development of other eHealth and interactive apps, they will not all be directly transferable to certain situations. For example, some condition characteristics or demographics may make it impractical to have patients as part of the study team. It is suggested here that these principles do not represent a set procedure, but rather recommended guidelines.</p>
            </sec>
            <sec>
                <title>Limitations</title>
                <p>This paper has not presented a detailed description of the Safe-D app to maintain the integrity of the RCT. This information will be included in future reports after the RCT is completed. While Safe-D has been extensively beta tested, resulting in improvements, formal evaluation was not performed as part of this research. The RCT will evaluate whether Safe-D succeeds in its purpose to safely improve vitamin D status in young women and, therefore, the applicability of these principles to complex messaging. The proposed principles may not be applicable to all complex messaging and are not currently ranked in priority. Further, as the findings are based on a reflective analysis from participatory action research, it is possible that the guidelines may have inherent bias. This was mitigated somewhat through the triangulation of data, including using beta testers who were not involved directly in the app development. These limitations can be addressed through future research directions.</p>
            </sec>
            <sec>
                <title>Future Directions</title>
                <p>Future research, as part of the Safe-D study, should include an evaluation of the usability and utility of the app. The greater study will confirm whether or not the app is effective in safely improving vitamin D status. For example, it is possible to reach exposure limits for the day, to stop sun damage, without synthesizing enough vitamin D when limited skin is exposed. The algorithm may be updated during the study, as well as other changes based on participant interviews during site-visits regarding experiences, to improve effectiveness. A future improvement to Safe-D may include indicating to the user whether they will likely get adequate vitamin D based on what they are wearing, enabling them to change clothing or alter sunscreen use to improve synthesis.</p>
                <p>As this research provides recommended principles for developing interactive eHealth apps for complex messaging, the results are largely theoretical at this stage and require validation before their suitability can be entirely understood. The lack of evaluation is a limitation to these principles. While behavior change was experienced anecdotally among the core researchers and beta testers, the Safe-D study will validate the app and therefore the principles applied in its development. Furthermore, future work in the eHealth app area should leverage these principles to validate them.</p>
            </sec>
            <sec>
                <title>Conclusion</title>
                <p>This research has provided insights into how to develop interactive eHealth apps for complex messaging. This outcome was achieved by drawing on examples from the literature. A set of guidelines to develop interactive eHealth apps generally, and specifically those for complex messaging, was previously missing from the literature. This research has contributed these principles. Safe-D delivers complex messaging to simplify education, explicitly considering user safety. Therefore, it showed a set of recommendations that might help develop a complex eHealth app that is simple for target users to engage with.</p>
            </sec>
        </sec>
    </body>
    <back>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">AIMIA</term>
                    <def>
                        <p>Australian Interactive Media Industry Association</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">ARPANSA</term>
                    <def>
                        <p>Australian Radiation Protection and Nuclear Safety Agency</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">BOM</term>
                    <def>
                        <p>Bureau of Meteorology</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">GP</term>
                    <def>
                        <p>general practitioner</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">GPS</term>
                    <def>
                        <p>Global Positioning System</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb6">RCT</term>
                    <def>
                        <p>randomized controlled trial</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb7">UV</term>
                    <def>
                        <p>ultraviolet radiation</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb8">UX</term>
                    <def>
                        <p>user experience</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ack>
            <p>This paper is on behalf of the Safe-D Study group: Professor John Wark, Associate Professor Shanton Chang, Dr Nicola Reavley, Associate Professor Marie Pirotta, Professor George Varigos, Professor Kim Bennell, Professor Suzanne Garland, Ms Alexandra Gorelik, Professor Anthony Jorm,&#160;Dr Tharshan Vaithianathan, Ms Emma Callegari, Ms Skye Maclean, Ms Kayla Heffernan, Ms. Audrey Grech, Ms. Anna Scobie, Ms Adele Rivers, Ms Marjan Tabesh, Ms Stefanie Hartley, Ms Karen Gillett and Ms Ashleigh Buckland.</p>
            <p>Safe-D was developed by Boosted Human: Mr Ashemah Harrison and Mr Thomas Ruffie.</p>
            <p>Safe-D was funded by a National Health and Medical Research Council (NHMRC) grant APP1049065.</p>
        </ack>
        <fn-group>
            <fn fn-type="conflict">
                <p>Swisse Wellness provided in-kind support for the Safe-D RCT.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Research2guidance</collab>
                    </person-group>
                    <source>Mobile Health Market Report 2013-2017</source>
                    <year>2013</year>
                    <month>03</month>
                    <day>04</day>
                    <access-date>2016-01-19</access-date>
                    <comment>The commercialization of m-health applications (vol. 3)<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.research2guidance.com/shop/index.php/downloadable/download/sample/sample_id/262/">http://www.research2guidance.com/shop/index.php/downloadable/download/sample/sample_id/262/</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6efL033CB" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dennison</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Morrison</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Conway</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Yardley</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>Opportunities and challenges for smartphone applications in supporting health behavior change: qualitative study</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>4</issue>
                    <fpage>e86</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/4/e86/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2583</pub-id>
                    <pub-id pub-id-type="medline">23598614</pub-id>
                    <pub-id pub-id-type="pii">v15i4e86</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3636318</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fogg</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <source>A behavior model for persuasive design</source>
                    <year>2009</year>
                    <access-date>2016-01-26</access-date>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bjfogg.com/fbm_files/page4_1.pdf">http://bjfogg.com/fbm_files/page4_1.pdf</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6epQyYxG1" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Free</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Phillips</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Felix</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Galli</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Patel</surname>
                            <given-names>V</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Edwards</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <article-title>The effectiveness of M-health technologies for improving health and health services: a systematic review protocol</article-title>
                    <source>BMC Res Notes</source>
                    <year>2010</year>
                    <volume>3</volume>
                    <fpage>250</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1756-0500/3/250" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1186/1756-0500-3-250</pub-id>
                    <pub-id pub-id-type="medline">20925916</pub-id>
                    <pub-id pub-id-type="pii">1756-0500-3-250</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2976743</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>  Levine</surname>
                            <given-names>BA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Goldschlag</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <source>Contemporary OB/GYN</source>
                    <year>2013</year>
                    <access-date>2014-08-27</access-date>
                    <comment>Apps and monitors for patient health: apps for fitness, diet, and sleep help patients quantify their activity and reach their goals<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://contemporaryobgyn.modernmedicine.com/contemporary-obgyn/news/apps-and-monitors-patient-health?page=0,1">http://contemporaryobgyn.modernmedicine.com/contemporary-obgyn/news/apps-and-monitors-patient-health?page=0,1</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6S8IkawkT" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>McCartney</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>How do we know whether medical apps work?</article-title>
                    <source>BMJ</source>
                    <year>2013</year>
                    <month>03</month>
                    <day>20</day>
                    <volume>346</volume>
                    <issue>1</issue>
                    <fpage>f1811</fpage>
                    <lpage>f1811</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.bmj.com/content/346/bmj.f1811" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1136/bmj.f1811 </pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bennett</surname>
                            <given-names>GG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Glasgow</surname>
                            <given-names>RE</given-names>
                        </name>
                    </person-group>
                    <article-title>The delivery of public health interventions via the Internet: actualizing their potential</article-title>
                    <source>Annu Rev Public Health</source>
                    <year>2009</year>
                    <volume>30</volume>
                    <fpage>273</fpage>
                    <lpage>292</lpage>
                    <pub-id pub-id-type="doi">10.1146/annurev.publhealth.031308.100235</pub-id>
                    <pub-id pub-id-type="medline">19296777</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Consolvo</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Landay</surname>
                            <given-names>JA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McDonald</surname>
                            <given-names>DW</given-names>
                        </name>
                    </person-group>
                    <article-title>Designing for Behavior Change in Everyday Life</article-title>
                    <source>Computer</source>
                    <year>2009</year>
                    <month>06</month>
                    <volume>42</volume>
                    <issue>6</issue>
                    <fpage>86</fpage>
                    <lpage>89</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pensivepuffin.comwww.pensivepuffin.com/dwmcphd/papers/Consolvo.et.al.IEEEComputer.preprint.pdf" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1109/MC.2009.185</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Oinas-Kukkonen</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Harjumaa</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Towards deeper understanding of persuasion in software and information systems</article-title>
                    <year>2008</year>
                    <conf-name>First International Conference on Advances in Computer-Human Interaction</conf-name>
                    <conf-date>Feb. 10-15, 2008</conf-date>
                    <conf-loc>Sainte Luce</conf-loc>
                    <publisher-name>IEEE</publisher-name>
                    <fpage>200</fpage>
                    <lpage>205</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://ieeexplore.ieee.org/xpl/login.jsp?tp=&#38;arnumber=4455982&#38;url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4455982" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1109/ACHI.2008.31</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Segerstahl</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kotro</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Vaananen-Vainio-Mattila</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <article-title>Pitfalls in persuasion: how do users experience persuasive techniques in a web service?</article-title>
                    <source>Proceedings of the 5th International Conference on Persuasive Technology</source>
                    <year>2010</year>
                    <conf-name>5th International Conference on Persuasive Technology</conf-name>
                    <conf-date>June 7-10, 2010</conf-date>
                    <conf-loc>Copenhagen, Denmark</conf-loc>
                    <publisher-name>Springer-Verlag Berlin, Heidelberg</publisher-name>
                    <fpage>211</fpage>
                    <lpage>222</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dl.acm.org/citation.cfm?id=2164039&#38;CFID=576624881&#38;CFTOKEN=92983642" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Barton</surname>
                            <given-names>AJ</given-names>
                        </name>
                    </person-group>
                    <article-title>The regulation of mobile health applications</article-title>
                    <source>BMC Med</source>
                    <year>2012</year>
                    <volume>10</volume>
                    <fpage>46</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmcmedicine.biomedcentral.com/articles/10.1186/1741-7015-10-46" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1186/1741-7015-10-46</pub-id>
                    <pub-id pub-id-type="medline">22569114</pub-id>
                    <pub-id pub-id-type="pii">1741-7015-10-46</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3364852</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Alzougool</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chang</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gray</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <source>Information Research</source>
                    <year>2013</year>
                    <month>03</month>
                    <access-date>2015-03-06</access-date>
                    <comment>The nature and constitution of informal carers&#039; information needs: what you don&#039;t know you need is as important as what you want to know<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.informationr.net/ir/18-1/paper563.html#.Vqek-oUrLnA">http://www.informationr.net/ir/18-1/paper563.html#.Vqek-oUrLnA</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6WoeE6K7I" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hickie</surname>
                            <given-names>IB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Scott</surname>
                            <given-names>EM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hermens</surname>
                            <given-names>DF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Naismith</surname>
                            <given-names>SL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Guastella</surname>
                            <given-names>AJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kaur</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sidis</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Whitwell</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Glozier</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Davenport</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pantelis</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wood</surname>
                            <given-names>SJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McGorry</surname>
                            <given-names>PD</given-names>
                        </name>
                    </person-group>
                    <article-title>Applying clinical staging to young people who present for mental health care</article-title>
                    <source>Early Intervention in Psychiatry</source>
                    <year>2012</year>
                    <month>06</month>
                    <day>05</day>
                    <volume>7</volume>
                    <issue>1</issue>
                    <fpage>31</fpage>
                    <lpage>43</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://onlinelibrary.wiley.com/doi/10.1111/j.1751-7893.2012.00366.x/abstract" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1111/j.1751-7893.2012.00366.x  </pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Heffernan</surname>
                            <given-names>KJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Callegari</surname>
                            <given-names>ET</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Garland</surname>
                            <given-names>SM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chang</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Maclean</surname>
                            <given-names>ST</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Callegari</surname>
                            <given-names>ET</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Garland</surname>
                            <given-names>SM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Reavley</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Varigos</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wark</surname>
                            <given-names>JD</given-names>
                        </name>
                    </person-group>
                    <article-title>The potential of eHealth Apps to Support Targeted Complex Health Messages</article-title>
                    <source>J Gen Pract</source>
                    <year>2014</year>
                    <month>10</month>
                    <day>08</day>
                    <volume>02</volume>
                    <issue>05</issue>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.esciencecentral.org/journals/the-potential-of-ehealth-apps-to-support-targeted-complex-health-messages-2329-9126.1000182.php?aid=31529" />
                    </comment>
                    <pub-id pub-id-type="doi">10.4172/2329-9126.1000182</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Cancer Council Victoria</collab>
                    </person-group>
                    <source>  Cancer Council Australia</source>
                    <year>1981</year>
                    <comment>Slip! Slop! Slap! campaign<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cancer.org.au/preventing-cancer/sun-protection/campaigns-and-events/slip-slop-slap-seek-slide.html">http://www.cancer.org.au/preventing-cancer/sun-protection/campaigns-and-events/slip-slop-slap-seek-slide.html</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6S8J1P0vh" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Australian Bureau of Statistics</collab>
                    </person-group>
                    <source>Australian Health Survey: Biomedical Results for Nutrients, 2011-12</source>
                    <year>2013</year>
                    <comment>Feature Article: Vitamin D<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4364.0.55.006Chapter2002011-12">http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4364.0.55.006Chapter2002011-12</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6S8J4IlyH" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Green</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Li</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Whiting</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Strategies for improving vitamin d status: focus on fortification</article-title>
                    <source>Nutritional Influences on Bone Health</source>
                    <year>2013</year>
                    <month>02</month>
                    <day>17</day>
                    <fpage>247</fpage>
                    <lpage>260</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://link.springer.com/chapter/10.1007/978-1-4471-2769-7_25" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1007/978-1-4471-2769-7_25  </pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bonevski</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Girgis</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Magin</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Horton</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Brozek</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Armstrong</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <article-title>Prescribing sunshine: a cross-sectional survey of 500 Australian general practitioners' practices and attitudes about vitamin D</article-title>
                    <source>Int J Cancer</source>
                    <year>2012</year>
                    <month>05</month>
                    <day>1</day>
                    <volume>130</volume>
                    <issue>9</issue>
                    <fpage>2138</fpage>
                    <lpage>2145</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.doi.org/10.1002/ijc.26225" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1002/ijc.26225</pub-id>
                    <pub-id pub-id-type="medline">21647876</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Holick</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Vitamin D: A D-lightful health perspective</article-title>
                    <source>Nutritional Reviews</source>
                    <year>2008</year>
                    <month>10</month>
                    <day>25</day>
                    <volume>66</volume>
                    <fpage>S182</fpage>
                    <lpage>S194</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://onlinelibrary.wiley.com/doi/10.1111/j.1753-4887.2008.00104.x/abstract" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1111/j.1753-4887.2008.00104.x  &#160;</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mithal</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wahl</surname>
                            <given-names>DA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bonjour</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Burckhardt</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dawson-Hughes</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Eisman</surname>
                            <given-names>JA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>El-Hajj Fuleihan</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Josse</surname>
                            <given-names>RG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lips</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Morales-Torres</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Global vitamin D status and determinants of hypovitaminosis D</article-title>
                    <source>Osteoporos Int</source>
                    <year>2009</year>
                    <month>6</month>
                    <day>19</day>
                    <volume>20</volume>
                    <issue>11</issue>
                    <fpage>1807</fpage>
                    <lpage>1820</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.ncbi.nlm.nih.gov/pubmed/19543765" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1007/s00198-009-0954-6 </pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Breton</surname>
                            <given-names>ER</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fuemmeler</surname>
                            <given-names>BF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Abroms</surname>
                            <given-names>LC</given-names>
                        </name>
                    </person-group>
                    <article-title>Weight loss-there is an app for that! But does it adhere to evidence-informed practices?</article-title>
                    <source>Transl Behav Med</source>
                    <year>2011</year>
                    <month>12</month>
                    <volume>1</volume>
                    <issue>4</issue>
                    <fpage>523</fpage>
                    <lpage>529</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24073074" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1007/s13142-011-0076-5</pub-id>
                    <pub-id pub-id-type="medline">24073074</pub-id>
                    <pub-id pub-id-type="pii">76</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3717669</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rai</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pye</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Baird</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Understanding determinants of consumer mobile health usage intentions, assimilation, and channel preferences</article-title>
                    <source>J Med Internet Res</source>
                    <year>2013</year>
                    <volume>15</volume>
                    <issue>8</issue>
                    <fpage>e149</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/8/e149/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.2635</pub-id>
                    <pub-id pub-id-type="medline">23912839</pub-id>
                    <pub-id pub-id-type="pii">v15i8e149</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3742412</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Australian Interactive Media Industry Association</collab>
                    </person-group>
                    <source>9th Annual Australian Mobile Phone Lifestyle Index (AMPLI)</source>
                    <year>2013</year>
                    <month>10</month>
                    <publisher-name>Mobile Industry Group AIMIA</publisher-name>
                    <comment>Australian Mobile Phone Lifestyle Index<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.sponsor-ed.com.au/app/webroot/uploaded_files/media/Ampli%202013%20Report_Final_October%2024.pdf">http://www.sponsor-ed.com.au/app/webroot/uploaded_files/media/Ampli%202013%20Report_Final_October%2024.pdf</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6S8JFc1gA" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fogg</surname>
                            <given-names>BJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chesanow</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <source>Medscape Business of Medicine</source>
                    <year>2013</year>
                    <month>06</month>
                    <day>27</day>
                    <access-date>2016-01-26</access-date>
                    <comment>Can Health Apps Help Patients Change Their Behavior?<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://login.medscape.com/login/sso/getlogin?urlCache=aHR0cDovL3d3dy5tZWRzY2FwZS5jb20vdmlld2FydGljbGUvODA2NzM0&#38;ac=401">https://login.medscape.com/login/sso/getlogin?urlCache=aHR0cDovL3d3dy5tZWRzY2FwZS5jb20vdmlld2FydGljbGUvODA2NzM0&#38;ac=401</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6epSVd1nN" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ijsselsteijn</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>de Kort</surname>
                            <given-names>Y</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Midden</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Eggen</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>van den Hoven</surname>
                            <given-names>E</given-names>
                        </name>
                    </person-group>
                    <article-title>Persuasive Technology for Human Well-Being: Setting the Scene</article-title>
                    <source>Communications of the Association for Information Systems</source>
                    <year>2006</year>
                    <conf-name>First International Conference on Persuasive Technology for Human Well-Being. Communications of the Association for Information Systems, 24</conf-name>
                    <conf-date>May 18-19, 2006</conf-date>
                    <conf-loc>Eindhoven, The Netherlands</conf-loc>
                    <fpage>1</fpage>
                    <lpage>5</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://link.springer.com/chapter/10.1007%2F11755494_1" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Intille</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>A new research challenge: persuasive technology to motivate healthy aging</article-title>
                    <source>IEEE Trans Inf Technol Biomed</source>
                    <year>2004</year>
                    <month>09</month>
                    <volume>8</volume>
                    <issue>3</issue>
                    <fpage>235</fpage>
                    <lpage>237</lpage>
                    <pub-id pub-id-type="medline">15484427</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lin</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mamykina</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lindtner</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Delajoux</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Strub</surname>
                            <given-names>H</given-names>
                        </name>
                    </person-group>
                    <article-title>Fish'n'Steps: encouraging physical activity with an interactive computer game</article-title>
                    <source>Ubiquitous Computing</source>
                    <year>2006</year>
                    <volume>4206</volume>
                    <fpage>261</fpage>
                    <lpage>278</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://link.springer.com/chapter/10.1007%2F11853565_16" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1007/11853565_16  </pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Oinas-Kukkohen</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Harjumaa</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Persuasive Systems Design: Key Issues, Process Model, and System Features</article-title>
                    <source>Communications of the Association for Information Systems</source>
                    <year>2009</year>
                    <volume>24</volume>
                    <fpage>485</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://aisel.aisnet.org/cais/vol24/iss1/28/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1145/1541948.1541989</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Maheshwari</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chatterjee</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Drew</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Exploring the Persuasiveness of &#8220;Just-in-time&#8221; Motivational Messages for Obesity Management</article-title>
                    <source>Persuasive Technology</source>
                    <year>2008</year>
                    <volume>5033</volume>
                    <fpage>258</fpage>
                    <lpage>261</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://link.springer.com/chapter/10.1007%2F978-3-540-68504-3_26" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1007/978-3-540-68504-3_26</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kapp</surname>
                            <given-names>KM</given-names>
                        </name>
                    </person-group>
                    <source>The Gamification ofLearning and Instruction: Game-based Methods and Strategies for Training and Education</source>
                    <year>2012</year>
                    <month>04</month>
                    <publisher-loc>New Jersey</publisher-loc>
                    <publisher-name>Pfeiffer</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Calvo</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Peters</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>The Irony and Re-interpretation of Our Quantified Self</article-title>
                    <source>OzCHI '13 Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration</source>
                    <year>2013</year>
                    <conf-name>25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration</conf-name>
                    <conf-date>November 25-29, 2013</conf-date>
                    <conf-loc>Adelaide, Australia</conf-loc>
                    <fpage>367</fpage>
                    <lpage>370</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dl.acm.org/citation.cfm?id=2541070&#38;dl=ACM&#38;coll=DL&#38;CFID=576624881&#38;CFTOKEN=92983642" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1145/2541016.2541070</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Iivari</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Venable</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Action research and design science research- seemingly similar but decisively dissimilar</article-title>
                    <source>ECIS Proceedings</source>
                    <year>2009</year>
                    <conf-name>European Conference on Information Systems</conf-name>
                    <conf-date>June 8-10, 2009</conf-date>
                    <conf-loc>Verona, Italy</conf-loc>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://aisel.aisnet.org/ecis2009/73" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Neuman</surname>
                            <given-names>W</given-names>
                        </name>
                    </person-group>
                    <source>Social research methods: qualitative and quantitative approaches</source>
                    <year>2006</year>
                    <publisher-loc>Boston, MA</publisher-loc>
                    <publisher-name>Pearson Education</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Davison</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Martinsons</surname>
                            <given-names>MG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kock</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <article-title>Principles of canonical action research</article-title>
                    <source>Inform Syst J</source>
                    <year>2004</year>
                    <month>01</month>
                    <volume>14</volume>
                    <issue>1</issue>
                    <fpage>65</fpage>
                    <lpage>86</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1365-2575.2004.00162.x</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>McMurtrey</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>A Case Study of the Application of the Systems Development Life Cycle (SDLC) in 21st Century Health Care: Something Old, Something New?</article-title>
                    <source>Journal of the Southern Association for Information Systems</source>
                    <year>2013</year>
                    <volume>1</volume>
                    <issue>1</issue>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://quod.lib.umich.edu/j/jsais/11880084.0001.103/--case-study-of-the-application-of-the-systems-development?rgn=main;view=fulltext" />
                    </comment>
                    <pub-id pub-id-type="doi">10.3998/jsais.11880084.0001.103</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Keith</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <source>An agile retrospective</source>
                    <year>2008</year>
                    <access-date>2014-08-27</access-date>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.clintonkeith.com/resources/GDC2008-AnAgileRetrospective.pdf">http://www.clintonkeith.com/resources/GDC2008-AnAgileRetrospective.pdf</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6S8JZ9xQJ" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>McKenzie</surname>
                            <given-names>RL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Liley</surname>
                            <given-names>JB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bj&#246;rn</surname>
                            <given-names>LO</given-names>
                        </name>
                    </person-group>
                    <article-title>UV radiation: balancing risks and benefits</article-title>
                    <source>Photochem Photobiol</source>
                    <year>2009</year>
                    <volume>85</volume>
                    <issue>1</issue>
                    <fpage>88</fpage>
                    <lpage>98</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1751-1097.2008.00400.x</pub-id>
                    <pub-id pub-id-type="medline">18657052</pub-id>
                    <pub-id pub-id-type="pii">PHP400</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref38">
                <label>38</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fitzpatrick</surname>
                            <given-names>T</given-names>
                        </name>
                    </person-group>
                    <article-title>The Validity and Practicality of Sun-Reactive Skin Types I Through VI</article-title>
                    <source>Arch Dermatol</source>
                    <year>1988</year>
                    <month>06</month>
                    <day>01</day>
                    <volume>124</volume>
                    <issue>6</issue>
                    <fpage>869</fpage>
                    <pub-id pub-id-type="doi">10.1001/archderm.1988.01670060015008</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref39">
                <label>39</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Vasalou</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Joinson</surname>
                            <given-names>AN</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pitt</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Constructing my online self: Avatars that increase self-focused attention</article-title>
                    <source>Proceedings of the 2007 Conference on Human Factors in Computing Systems</source>
                    <year>2007</year>
                    <conf-name>2007 Conference on Human Factors in Computing Systems</conf-name>
                    <conf-date>April 28-May 3, 2007</conf-date>
                    <conf-loc>San Jose, CA</conf-loc>
                    <fpage>445</fpage>
                    <lpage>448</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dl.acm.org/citation.cfm?id=1240696&#38;dl=ACM&#38;coll=DL&#38;CFID=576624881&#38;CFTOKEN=92983642" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1145/1240624.1240696</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref40">
                <label>40</label>
                <nlm-citation citation-type="web">
                    <source>The Melbourne Quantified Self Meetup Group</source>
                    <year>2015</year>
                    <month>03</month>
                    <day>05</day>
                    <access-date>2015-03-05</access-date>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.meetup.com/The-Melbourne-Quantified-Self-Meetup-Group/">http://www.meetup.com/The-Melbourne-Quantified-Self-Meetup-Group/</ext-link>
                        <ext-link ext-link-type="webcite" xlink:href="6WoT3QToq" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref41">
                <label>41</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gold</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pedrana</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Stoove</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chang</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Howard</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Asselin</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ilic</surname>
                            <given-names>O</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Batrouney</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hellard</surname>
                            <given-names>ME</given-names>
                        </name>
                    </person-group>
                    <article-title>Developing health promotion interventions on social networking sites: recommendations from The FaceSpace Project</article-title>
                    <source>J Med Internet Res</source>
                    <year>2012</year>
                    <volume>14</volume>
                    <issue>1</issue>
                    <fpage>e30</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2012/1/e30/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1875</pub-id>
                    <pub-id pub-id-type="medline">22374589</pub-id>
                    <pub-id pub-id-type="pii">v14i1e30</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3374544</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref42">
                <label>42</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Katsios</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Roukos</surname>
                            <given-names>DH</given-names>
                        </name>
                    </person-group>
                    <article-title>Individual genomes and personalized medicine: life diversity and complexity</article-title>
                    <source>Personalized Medicine</source>
                    <year>2010</year>
                    <month>07</month>
                    <volume>7</volume>
                    <issue>4</issue>
                    <fpage>347</fpage>
                    <lpage>350</lpage>
                    <pub-id pub-id-type="doi">10.2217/PME.10.30</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref43">
                <label>43</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Meric-Bernstam</surname>
                            <given-names>F</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Farhangfar</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mendelsohn</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mills</surname>
                            <given-names>GB</given-names>
                        </name>
                    </person-group>
                    <article-title>Building a Personalized Medicine Infrastructure at a Major Cancer Center</article-title>
                    <source>J Clin Oncology</source>
                    <year>2013</year>
                    <month>04</month>
                    <day>15</day>
                    <volume>31</volume>
                    <issue>15</issue>
                    <fpage>1849</fpage>
                    <lpage>1857</lpage>
                    <pub-id pub-id-type="doi">10.1200/JCO.2012.45.3043 </pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>