<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i7e16844</article-id>
      <article-id pub-id-type="pmid">32706733</article-id>
      <article-id pub-id-type="doi">10.2196/16844</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>The Mobile Health App Trustworthiness Checklist: Usability Assessment</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>LeFevre</surname>
            <given-names>Amnesty</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Plante</surname>
            <given-names>Timothy</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yin</surname>
            <given-names>Rong</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>van Haasteren</surname>
            <given-names>Afua</given-names>
          </name>
          <degrees>MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5258-6547</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Vayena</surname>
            <given-names>Effy</given-names>
          </name>
          <degrees>MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1303-5467</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Powell</surname>
            <given-names>John</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <address>
            <institution>Nuffield Department of Primary Care Health Sciences</institution>
            <institution>University of Oxford</institution>
            <addr-line>Radcliffe Primary Care Building, Radcliffe Observatory Quarter</addr-line>
            <addr-line>Woodstock Rd</addr-line>
            <addr-line>Oxford, OX2 6GG</addr-line>
            <country>United Kingdom</country>
            <phone>44 (0)1865 617768</phone>
            <email>john.powell@phc.ox.ac.uk</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1456-4857</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Health Ethics and Policy Lab - Department of Health Sciences and Technology</institution>
        <institution>Swiss Federal Institute of Technology</institution>
        <addr-line>Zurich</addr-line>
        <country>Switzerland</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Nuffield Department of Primary Care Health Sciences</institution>
        <institution>University of Oxford</institution>
        <addr-line>Oxford</addr-line>
        <country>United Kingdom</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: John Powell <email>john.powell@phc.ox.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>7</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>21</day>
        <month>7</month>
        <year>2020</year>
      </pub-date>
      <volume>8</volume>
      <issue>7</issue>
      <elocation-id>e16844</elocation-id>
      <history>
        <date date-type="received">
          <day>30</day>
          <month>10</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>12</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>30</day>
          <month>4</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>3</day>
          <month>6</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Afua van Haasteren, Effy Vayena, John Powell. Originally published in JMIR mHealth and uHealth (http://mhealth.jmir.org), 21.07.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://mhealth.jmir.org/2020/7/e16844/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The mobile health (mHealth) app trustworthiness (mHAT) checklist was created to identify end users’ opinions on the characteristics of trustworthy mHealth apps and to communicate this information to app developers. To ensure that the checklist is suited for all relevant stakeholders, it is necessary to validate its contents.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The purpose of this study was to assess the feasibility of the mHAT checklist by modifying its contents according to ratings and suggestions from stakeholders familiar with the process of developing, managing, or curating mHealth apps.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A 44-item online survey was administered to relevant stakeholders. The survey was largely comprised of the mHAT checklist items, which respondents rated on a 5-point Likert scale, ranging from <italic>completely disagree</italic> (1) to <italic>completely agree</italic> (5).</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In total, seven professional backgrounds were represented in the survey: administrators (n=6), health professionals (n=7), information technology personnel (n=6), managers (n=2), marketing personnel (n=3), researchers (n=5), and user experience researchers (n=8). Aside from one checklist item—“the app can inform end users about errors in measurements”—the combined positive ratings (ie, <italic>completely agree</italic> and <italic>agree</italic>) of the checklist items overwhelmingly exceeded the combined negative ratings (ie, <italic>completely disagree</italic> and <italic>disagree</italic>). Meanwhile, two additional items were included in the checklist: (1) business or funding model of the app and (2) details on app uninstallation statistics.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our results indicate that the mHAT checklist is a valuable resource for a broad range of stakeholders to develop trustworthy mHealth apps. Future studies should examine if the checklist works best for certain mHealth apps or in specific settings.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>checklist</kwd>
        <kwd>trustworthiness</kwd>
        <kwd>trust</kwd>
        <kwd>mobile health apps</kwd>
        <kwd>validation</kwd>
        <kwd>survey</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>From self-diagnosis to wellness, mobile health (mHealth) apps have evolved as a conduit for individuals to play more pronounced roles in their own health care [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Sustaining the uptake of mHealth apps is particularly necessary to realize their potential in health systems. Among others, mHealth apps are perceived as a vehicle to enhance patient-provider communication, boost patient attempts to self-monitor health conditions, as well as to advance patient empowerment [<xref ref-type="bibr" rid="ref3">3</xref>]. Despite these positive outcomes, several studies have found significant flaws in the privacy, security, and safety claims of several mHealth apps on the market [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>].</p>
      <p>There is evidence to suggest that end users abandon or reject mHealth apps that they perceive as untrustworthy [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. So far, regulatory bodies such as the US Food and Drug Administration have been more concerned about the safety of mHealth apps that purport to be medical devices or their accompanying add-ons [<xref ref-type="bibr" rid="ref9">9</xref>]. The wellness app space lacks quality assurance frameworks and clear guidance from respective authorities [<xref ref-type="bibr" rid="ref10">10</xref>]. In light of the relaxed regulatory approach to mHealth apps, evaluation tools have been proposed to assist end users in determining which apps are safe or secure and, thus, which can be trusted [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. Very few of these tools target app developers, although they are vital stakeholders in ensuring that mHealth apps are trustworthy from the outset [<xref ref-type="bibr" rid="ref13">13</xref>]. To fill this gap, we created the mHealth app trustworthiness (mHAT) checklist via a focus group study with end users of health apps. The mHAT checklist is displayed in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> and details of the study can be found elsewhere [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
      <p>The purpose of this study was to validate the mHAT checklist by modifying its contents according to ratings and suggestions from stakeholders familiar with the process of developing, managing, or curating mHealth apps to ensure that its contents are applicable. Since the checklist goes beyond the technical aspects of app development, procuring the suggestions of different stakeholders will ensure that it is suited for anyone likely to be involved in app development. The value of validating the checklist was reinforced by a preliminary feedback exercise during the development of the mHAT checklist. Among the six experts with information technology (IT) backgrounds that provided feedback, there was a consensus that the checklist must be validated among a wider range of stakeholders.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Design</title>
        <p>We designed a cross-sectional online survey to validate the mHAT checklist. Ethical approval for this study was granted by the ETH Zurich (Swiss Federal Institute of Technology) Ethics Commission (EK 2019-N-20). To ensure that this study poses little to no risks to the respondents, we did not require any personal details [<xref ref-type="bibr" rid="ref15">15</xref>]. Taking part in the survey implied consent. The survey was administered through the SurveyMonkey online survey tool (SurveyMonkey Inc) between March 14 and July 10, 2019.</p>
      </sec>
      <sec>
        <title>Survey Development</title>
        <p>The first question in the 44-item open survey screened for eligible respondents to ensure that only individuals with experience in developing apps advanced on to the next page. Another question requested participants’ areas of expertise and was accompanied by four professions—administrators; marketing personnel; software designers, programmers, or developers; and user experience (UX) researchers—as well as a field for free-text answers. To provide an overview of the types of apps created by participants, the next question asked for the function of an app respondents have created within the last 5 years. The remaining 41 survey items consisted of the mHAT checklist items and required answers on a 5-point Likert scale, ranging from <italic>completely disagree</italic> (1) to <italic>completely agree</italic> (5) [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        <p>Aside from the screening question, which blocked noneligible participants from proceeding further, no other special functions, such as skip logic, were applied to the survey. The number of questions on each page of the survey differed according to the items in each segment of the checklist. Consequently, page 1 contained the 11 questions from the informational content section, whereas page 2 was comprised of the seven questions under <italic>organizational attributes</italic>. SurveyMonkey estimated 10 minutes as the average completion time.</p>
      </sec>
      <sec>
        <title>Participant Recruitment</title>
        <p>Our target population was a convenience sample of adults over the age of 18 years who are knowledgeable about the processes involved in developing mobile apps. Among others, administrators (ie, business and systems); marketing personnel; software designers, programmers, and developers; and UX researchers from all geographical locations were eligible for this study. In line with the principles for calculating sample sizes for surveys, the minimum desired sample size was 30 [<xref ref-type="bibr" rid="ref17">17</xref>]. Participants were recruited by propagating a link of the survey hosted on the SurveyMonkey platform (1) to relevant individuals via email and (2) on social media (ie, Twitter). In line with minimizing access to participants’ personal information, participants’ Internet Protocol (IP) addresses were not tracked, and their computers were also not assigned unique identification numbers.</p>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>In accordance with recommended practice, the data from the Likert scales were analyzed with descriptive statistics, such as ranks, modes, frequencies, and ranges [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. The frequencies and percentages of the survey items were presented as <italic>positive</italic>, <italic>neutral</italic>, and <italic>negative</italic> using Microsoft Excel. Positive ratings refer to the sum of <italic>completely agree</italic> and <italic>agree</italic>, whereas negative ratings are the sum of <italic>completely disagree</italic> and <italic>disagree</italic>. Meanwhile, the neutral values present the raw ratings of each item on the Likert scale. Only the checklist items with positive ratings (ie, <italic>completely agree</italic> and <italic>agree</italic>) exceeding negative ratings (ie, <italic>completely disagree</italic> and <italic>disagree</italic>) were retained. The data derived from the open-ended questions were analyzed by content analysis in NVivo 12 (QSR International) [<xref ref-type="bibr" rid="ref19">19</xref>]. Novel suggestions of items to include in the checklist were catalogued accordingly.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Participant Characteristics</title>
        <p>Of the 144 individuals that responded to calls to participate in this survey, 49 (34.0%) with some professional experience in developing mobile apps were eligible to participate. Out of these 49 participants, 23 (47%) completed the survey in its entirety, while 26 (53%) others completed it partially.</p>
        <p>Overall, 22 respondents indicated their professional expertise among the four fixed-choice professions provided in the survey: 6 (27%) administrators; 3 (14%) marketing personnel; 5 (23%) software designers, programmers, or developers; and 8 (36%) UX researchers. Another 15 free-text responses showed additional professional backgrounds: 7 (47%) health professionals, 5 (33%) researchers, 2 (13%) managers, and 1 (7%) IT professional. <xref rid="figure1" ref-type="fig">Figure 1</xref> presents the frequencies of the professions represented in this survey.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Professional expertise of respondents (n=37). IT: information technology; UX: user experience.</p>
          </caption>
          <graphic xlink:href="mhealth_v8i7e16844_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>The respondents had collectively created apps with 33 functions within the last 5 years. By aggregating similar apps, 20 out of 33 (61%) sought to assist end users to self-manage or monitor chronic diseases, such as diabetes and mental health, while 8 (24%) apps intended to promote healthy lifestyles through diet and or exercise. The complete list of app functions can be found in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
      </sec>
      <sec>
        <title>Survey Responses According to mHAT Categories</title>
        <p>In <xref ref-type="table" rid="table1">Table 1</xref>, we rank the <italic>positive</italic> (ie, sum of <italic>completely agree</italic> and <italic>agree</italic>), <italic>neutral</italic>, and <italic>negative</italic> (ie, sum of <italic>completely disagree</italic> and <italic>disagree</italic>) ratings according to categories of the checklist. Aside from one checklist item—“the app can inform end users about errors in measurements”—the combined positive ratings (ie, <italic>completely agree</italic> and <italic>agree</italic>) of the checklist items overwhelmingly exceeded the combined negative ratings (ie, <italic>completely disagree</italic> and <italic>disagree</italic>). The individual ratings for <italic>completely disagree</italic>, <italic>disagree</italic>, <italic>neutral</italic>, <italic>agree</italic>, and <italic>completely agree</italic> can be retrieved from <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Rankings of respondent ratings of checklist items.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="30"/>
            <col width="590"/>
            <col width="120"/>
            <col width="110"/>
            <col width="120"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Item</td>
                <td>Negative, n (%)</td>
                <td>Neutral, n (%)</td>
                <td>Positive, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Informational content (n=29)</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The privacy policies accompanying the app can be concise, clear, and easy to understand</td>
                <td>1 (3)</td>
                <td>6 (21)</td>
                <td>22 (76)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The terms of service accompanying the app can be concise and easy to read</td>
                <td>1 (3)</td>
                <td>7 (24)</td>
                <td>21 (72)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be programmed such that it does not require too many end-user personal data</td>
                <td>2 (7)</td>
                <td>6 (21)</td>
                <td>21 (72)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can provide accurate measurements</td>
                <td>3 (10)</td>
                <td>5 (17)</td>
                <td>21 (72)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be accompanied by clear end-user safety guidelines</td>
                <td>3 (10)</td>
                <td>6 (21)</td>
                <td>20 (69)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be created with evidence from robust research</td>
                <td>4 (14)</td>
                <td>5 (17)</td>
                <td>20 (69)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can inform end users about errors in measurements</td>
                <td>11 (38)</td>
                <td>8 (28)</td>
                <td>10 (34)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">
                  <bold>The app can recommend regular updates to:</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Fix bugs inherent within the app</td>
                <td>5 (17)</td>
                <td>4 (14)</td>
                <td>20 (69)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Amend app contents based on improved research</td>
                <td>4 (14)</td>
                <td>7 (24)</td>
                <td>18 (62)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">
                  <bold>The information on the app can be certified by an:</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>In-house team</td>
                <td>4 (14)</td>
                <td>6 (21)</td>
                <td>19 (66)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>External third-party team</td>
                <td>5 (17)</td>
                <td>6 (21)</td>
                <td>18 (62)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can ensure that personalized data for end users is precise</td>
                <td>1 (3)</td>
                <td>12 (41)</td>
                <td>16 (55)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The research-backed evidence used to create the app can be easy to locate and understand</td>
                <td>6 (21)</td>
                <td>8 (28)</td>
                <td>15 (52)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can highlight potential risks or side effects resulting from its use</td>
                <td>9 (31)</td>
                <td>8 (28)</td>
                <td>12 (41)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Organizational attributes (n=28)</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">My company can be transparent about our data-handling history and data breaches</td>
                <td>2 (7)<break/>  <break/>  </td>
                <td>4 (14)</td>
                <td>22 (79)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">My company can demonstrate that it values data-protection regulations</td>
                <td>2 (7)</td>
                <td>4 (14)</td>
                <td>22 (78)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">My company can employ skilled personnel within the app development domain to perform all tasks relating to the app</td>
                <td>4 (14)</td>
                <td>4 (14)</td>
                <td>20 (71)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">My company can adopt clear policies on how to handle end-user data</td>
                <td>3 (11)</td>
                <td>6 (21)</td>
                <td>19 (68)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Our app can be affiliated with a nongovernmental organization or a reputable government agency</td>
                <td>5 (18)</td>
                <td>8 (29)</td>
                <td>15 (54)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">My company has developed similar apps in the past</td>
                <td>8 (29)</td>
                <td>5 (18)</td>
                <td>15 (54)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">My company has other reputable products or services to associate the app with</td>
                <td>7 (25)</td>
                <td>7 (25)</td>
                <td>14 (50)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Societal influences (n=25)</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">End users can readily suggest the app to others</td>
                <td>2 (8)</td>
                <td>4 (16)</td>
                <td>19 (76)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app store can display how often the app has been downloaded</td>
                <td>3 (12)</td>
                <td>5 (20)</td>
                <td>17 (68)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can display the positive reviews that it receives</td>
                <td>5 (20)</td>
                <td>6 (24)</td>
                <td>14 (56)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">
                  <bold>To ensure that end users locate the app, it can be made to appear:</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>In the top results of search engines</td>
                <td>6 (24)</td>
                <td>10 (40)</td>
                <td>9 (36)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>As a featured app in the app store</td>
                <td>4 (16)</td>
                <td>10 (40)</td>
                <td>11 (44)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can accompany a wearable device</td>
                <td>5 (20)</td>
                <td>10 (40)</td>
                <td>10 (40)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Technology-related features (n=24)</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be easy to use and have a friendly end-user interface</td>
                <td>1 (4)</td>
                <td>4 (17)</td>
                <td>19 (79)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be made aesthetically appealing</td>
                <td>1 (4)</td>
                <td>5 (21)</td>
                <td>18 (75)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be programmed to send out a reasonable number of notifications</td>
                <td>1 (4)</td>
                <td>5 (21)</td>
                <td>18 (75)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The data generated from the app can be anonymized to make individuals unidentifiable</td>
                <td>3 (13)</td>
                <td>3 (13)</td>
                <td>18 (75)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can be easily accessed by the end users it aims to target</td>
                <td>1 (4)</td>
                <td>5 (21)</td>
                <td>18 (75)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The data generated from the app can be secured by end-to-end encryption</td>
                <td>0 (0)</td>
                <td>7 (29)</td>
                <td>17 (71)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">
                  <bold>The data generated from the app can be:</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Stored locally on the device</td>
                <td>3 (13)</td>
                <td>5 (21)</td>
                <td>16 (67)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Encrypted</td>
                <td>1 (4)</td>
                <td>7 (29)</td>
                <td>16 (67)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app features can be customized by end users</td>
                <td>4 (16)</td>
                <td>5 (20)</td>
                <td>15 (62)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Privacy can be a core consideration throughout the life cycle of the app</td>
                <td>4 (17)</td>
                <td>7 (29)</td>
                <td>13 (54)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">End users can easily access all of their data (eg, address and billing information)</td>
                <td>4 (17)</td>
                <td>7 (29)</td>
                <td>13 (54)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>User control (n=23)</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can allow end users to easily delete their data</td>
                <td>1 (4)</td>
                <td>6 (26)</td>
                <td>16 (70)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can seek explicit end-user permission before sharing data with third parties</td>
                <td>3 (13)</td>
                <td>6 (26)</td>
                <td>14 (61)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can allow end users to opt in or decide which data can be stored or processed</td>
                <td>2 (9)</td>
                <td>7 (30)</td>
                <td>14 (61)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can give end users the freedom to control how their data are used</td>
                <td>2 (9)</td>
                <td>8 (35)</td>
                <td>13 (57)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can allow end users to restrict data sharing to third parties such as social networking sites</td>
                <td>1 (4)</td>
                <td>9 (39)</td>
                <td>13 (57)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">The app can designate end users as proprietors (ie, owners) of their data</td>
                <td>7 (30)</td>
                <td>7 (30)</td>
                <td>9 (39)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Suggestions for Additional Survey Items</title>
        <p>There were two new suggestions of items to include in the checklist: (1) transparency about business models and funding streams as well as (2) statistics on app uninstallations. These items were catalogued under the <italic>organizational attributes (reputation)</italic> and <italic>informational content (transparency)</italic> categories of the checklist, respectively. In the final version of the mHAT checklist found in <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>, the new items are indicated with an asterisk.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>We have conducted a stakeholder survey to validate the mHAT checklist, a practical tool for app developers to create trustworthy mHealth apps. The checklist items can be considered feasible in many different settings, since the majority of the items were rated positively by the disparate stakeholders—UX researchers, administrators, IT personnel, health care professionals, researchers, managers, and marketing personnel—who reviewed its contents.</p>
        <p>Throughout the survey, it appeared that those items that could apply to disparate mHealth apps were rated higher than those items that may be relevant to certain apps but not others. For example, “the app can inform end users about errors in measurements” was the most negatively rated item, whereas “the app can be easy to use and have a friendly end-user interface” was the most positively rated. One plausible explanation for this difference in ratings may be due to the aspiration to design any app, regardless of function, to be user friendly for its end users. The extent to which an app can have no measurement errors, however, will differ from the function of the app (eg, diabetes versus mental health).</p>
        <p>The most negatively rated items in the survey—“the app can inform end users about error in measurements” and “the app can highlight potential risks or side effects resulting from its use”—demonstrated that app developers place marginal value in informing end users about the errors, risks, or side effects that may arise from their apps. Regardless of the reasons that contributed to these ratings, such information is vital to upholding end users’ trust in mHealth apps. Since plenty of evidence suggests that some apps on the market perpetuate inaccurate advice that may threaten patient safety, it is imperative that app developers are transparent about these issues [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. Without a clear list of app risks or errors, end-user concerns about the trustworthiness of mHealth apps are bound to continue.</p>
        <p>Since the checklist item “the app can inform end users about error in measurements” received more negative than positive ratings, it was excluded from the checklist. Meanwhile, respondents suggested including two new items: (1) a disclosure of the business model and (2) uninstallation statistics. Indeed, when app developers obscure their business models, they are perceived negatively by end users [<xref ref-type="bibr" rid="ref6">6</xref>]. Including the uninstallation statistics of an app, however, is interesting for two reasons. On the one hand, it could signal transparency on the part of app developers and thus boost end users’ trust. On the other hand, it may deter end users from downloading the app altogether, since unpopular apps are unlikely to be downloaded in the first place [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
      </sec>
      <sec>
        <title>Strengths and Limitations</title>
        <p>To the best of our knowledge, the mHAT checklist is the only empirically validated checklist that presents the attributes of trustworthy mHealth apps. This validated checklist is a robust tool for assisting app developers to create trustworthy apps. Our study has limitations. Despite multiple attempts to obtain a minimum sample size of 30 participants, challenges in recruiting participants meant that fewer participants could take part in the survey. Nonetheless, 23 participants answered all the survey items affording informative statistical analysis. The convenience sample recruited for this study is another limitation. Since these samples are usually unrepresentative of an entire population, our study may have missed out on capturing the opinions of some relevant stakeholders [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Further, ineligible individuals may have participated in the survey for two reasons: (1) it was an open survey and (2) to minimize access to respondents’ personal information, their computers were not assigned unique identification numbers. Nonetheless, there was no incentive to participate, since no compensation was awarded.</p>
      </sec>
      <sec>
        <title>Implications for Future Research</title>
        <p>The mHAT checklist informs the conversation on the expectations of trustworthy mHealth apps. Future studies should assess whether the checklist is suitable for all mHealth apps or whether it is better suited for certain apps than others. Through additional studies, the contents of the checklist can be improved to retain useful items and exclude redundant ones. More enquiries about the underlying reasons why app developers see little value in informing end users about the risks, side effects, or errors of their apps is also warranted.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This study presents a validated mHAT checklist: a useful guide for app developers to create trustworthy health apps. The 41-item checklist is comprised of five main categories—informational content, organizational attributes, societal influences, technology-related factors, and user control—and 11 subcategories—information accuracy, understandability, transparency, brand familiarity, reputation, recommendations, external factor, usability, privacy, autonomy, and empowerment (see <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>).</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>The unvalidated mobile health app trustworthiness (mHAT) checklist.</p>
        <media xlink:href="mhealth_v8i7e16844_app1.pdf" xlink:title="PDF File  (Adobe PDF File), 74 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Functions of apps developed by respondents.</p>
        <media xlink:href="mhealth_v8i7e16844_app2.docx" xlink:title="DOCX File , 19 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Frequencies and percent ratings of survey items.</p>
        <media xlink:href="mhealth_v8i7e16844_app3.docx" xlink:title="DOCX File , 30 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>The updated mobile health app trustworthiness (mHAT) checklist. New items to the checklist are indicated with an asterisk.</p>
        <media xlink:href="mhealth_v8i7e16844_app4.docx" xlink:title="DOCX File , 151 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ETH Zurich</term>
          <def>
            <p>Swiss Federal Institute of Technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">IP</term>
          <def>
            <p>Internet Protocol</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IT</term>
          <def>
            <p>information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">mHAT</term>
          <def>
            <p>mobile health app trustworthiness</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">UX</term>
          <def>
            <p>user experience</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This project was funded by a Swiss National Science Foundation grant awarded to EV (PP000P3-157556; 4075210-167223). The authors would like to acknowledge Dr Constantinos Koshiaris, Chelu Mfalila, and Dr Chrysanthi Papoutsi of the Nuffield Department of Primary Care Health Sciences, University of Oxford, for their assistance with the survey.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>AvH designed and carried out the survey under the supervision of EV and JP.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lupton</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Jutel</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>'It's like having a physician in your pocket!' A critical analysis of self-diagnosis smartphone apps</article-title>
          <source>Soc Sci Med</source>
          <year>2015</year>
          <month>05</month>
          <volume>133</volume>
          <fpage>128</fpage>
          <lpage>135</lpage>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2015.04.004</pub-id>
          <pub-id pub-id-type="medline">25864149</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(15)00224-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baldwin</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sittig</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Giardina</surname>
              <given-names>TD</given-names>
            </name>
          </person-group>
          <article-title>Patient portals and health apps: Pitfalls, promises, and what one might learn from the other</article-title>
          <source>Healthc (Amst)</source>
          <year>2017</year>
          <month>09</month>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>81</fpage>
          <lpage>85</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2213-0764(16)30012-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.hjdsi.2016.08.004</pub-id>
          <pub-id pub-id-type="medline">27720139</pub-id>
          <pub-id pub-id-type="pii">S2213-0764(16)30012-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>East</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Havard</surname>
              <given-names>BC</given-names>
            </name>
          </person-group>
          <article-title>Mental health mobile apps: From infusion to diffusion in the mental health social system</article-title>
          <source>JMIR Ment Health</source>
          <year>2015</year>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>e10</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mental.jmir.org/2015/1/e10/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mental.3954</pub-id>
          <pub-id pub-id-type="medline">26543907</pub-id>
          <pub-id pub-id-type="pii">v2i1e10</pub-id>
          <pub-id pub-id-type="pmcid">PMC4607391</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wicks</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Chiauzzi</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>'Trust but verify': Five approaches to ensure safe medical apps</article-title>
          <source>BMC Med</source>
          <year>2015</year>
          <month>09</month>
          <day>25</day>
          <volume>13</volume>
          <fpage>205</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-015-0451-z"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-015-0451-z</pub-id>
          <pub-id pub-id-type="medline">26404791</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-015-0451-z</pub-id>
          <pub-id pub-id-type="pmcid">PMC4583172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Plante</surname>
              <given-names>TB</given-names>
            </name>
            <name name-style="western">
              <surname>O'Kelly</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Urrea</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>MacFarlane</surname>
              <given-names>ZT</given-names>
            </name>
            <name name-style="western">
              <surname>Blumenthal</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Charleston</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Appel</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>User experience of instant blood pressure: Exploring reasons for the popularity of an inaccurate mobile health app</article-title>
          <source>NPJ Digit Med</source>
          <year>2018</year>
          <volume>1</volume>
          <fpage>31</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31304313"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41746-018-0039-z</pub-id>
          <pub-id pub-id-type="medline">31304313</pub-id>
          <pub-id pub-id-type="pii">39</pub-id>
          <pub-id pub-id-type="pmcid">PMC6550164</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khalid</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Shihab</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Nagappan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hassan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>What do mobile app users complain about?</article-title>
          <source>IEEE Softw</source>
          <year>2015</year>
          <month>5</month>
          <volume>32</volume>
          <issue>3</issue>
          <fpage>70</fpage>
          <lpage>77</lpage>
          <pub-id pub-id-type="doi">10.1109/MS.2014.50</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Murnane</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Huffaker</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kossinets</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Mobile health apps: Adoption, adherence, and abandonment</article-title>
          <source>Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015) colocated with the 19th International Symposium on Wearable Computers (ISWC 2015)</source>
          <year>2015</year>
          <conf-name>2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015) colocated with the 19th International Symposium on Wearable Computers (ISWC 2015)</conf-name>
          <conf-date>September 7-11, 2015</conf-date>
          <conf-loc>Osaka, Japan</conf-loc>
          <fpage>261</fpage>
          <lpage>264</lpage>
          <pub-id pub-id-type="doi">10.1145/2800835.2800943</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dennison</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Morrison</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Conway</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Yardley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Opportunities and challenges for smartphone applications in supporting health behavior change: Qualitative study</article-title>
          <source>J Med Internet Res</source>
          <year>2013</year>
          <month>04</month>
          <day>18</day>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>e86</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2013/4/e86/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2583</pub-id>
          <pub-id pub-id-type="medline">23598614</pub-id>
          <pub-id pub-id-type="pii">v15i4e86</pub-id>
          <pub-id pub-id-type="pmcid">PMC3636318</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>In search of a few good apps</article-title>
          <source>JAMA</source>
          <year>2014</year>
          <month>05</month>
          <day>14</day>
          <volume>311</volume>
          <issue>18</issue>
          <fpage>1851</fpage>
          <lpage>1852</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2014.2564</pub-id>
          <pub-id pub-id-type="medline">24664278</pub-id>
          <pub-id pub-id-type="pii">1852662</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferretti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ronchi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>From principles to practice: Benchmarking government guidance on health apps</article-title>
          <source>Lancet Digit Health</source>
          <year>2019</year>
          <month>06</month>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>e55</fpage>
          <lpage>e57</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.thelancet.com/pdfs/journals/landig/PIIS2589-7500(19)30027-5.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/s2589-7500(19)30027-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>LeFevre</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>L'Engle</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mehl</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sinha</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Labrique</surname>
              <given-names>A</given-names>
            </name>
            <collab>WHO mHealth Technical Evidence Review Group</collab>
          </person-group>
          <article-title>Guidelines for reporting of health interventions using mobile phones: Mobile health (mHealth) evidence reporting and assessment (mERA) checklist</article-title>
          <source>BMJ</source>
          <year>2016</year>
          <month>03</month>
          <day>17</day>
          <volume>352</volume>
          <fpage>i1174</fpage>
          <pub-id pub-id-type="doi">10.1136/bmj.i1174</pub-id>
          <pub-id pub-id-type="medline">26988021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stoyanov</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Hides</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kavanagh</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Zelenko</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Tjondronegoro</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Mobile app rating scale: A new tool for assessing the quality of health mobile apps</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2015</year>
          <month>03</month>
          <day>11</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>e27</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2015/1/e27/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.3422</pub-id>
          <pub-id pub-id-type="medline">25760773</pub-id>
          <pub-id pub-id-type="pii">v3i1e27</pub-id>
          <pub-id pub-id-type="pmcid">PMC4376132</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Albrecht</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Noll</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Von Jan</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>App-synopsis: Self-assessment on trust or distrust of health-apps</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2014</year>
          <volume>202</volume>
          <fpage>233</fpage>
          <lpage>236</lpage>
          <pub-id pub-id-type="medline">25000059</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Haasteren</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gille</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Fadda</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Development of the mHealth App Trustworthiness checklist</article-title>
          <source>Digit Health</source>
          <year>2019</year>
          <volume>5</volume>
          <fpage>2055207619886463</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31803490"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2055207619886463</pub-id>
          <pub-id pub-id-type="medline">31803490</pub-id>
          <pub-id pub-id-type="pii">10.1177_2055207619886463</pub-id>
          <pub-id pub-id-type="pmcid">PMC6876327</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <article-title>What is personal data?</article-title>
          <source>Information Commissioner's Office</source>
          <year>2019</year>
          <access-date>2020-07-10</access-date>
          <publisher-loc>Wilmslow, UK</publisher-loc>
          <publisher-name>Information Commissioner's Office</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/key-definitions/what-is-personal-data/">https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/key-definitions/what-is-personal-data/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boone</surname>
              <given-names>HN</given-names>
            </name>
            <name name-style="western">
              <surname>Boone</surname>
              <given-names>DA</given-names>
            </name>
          </person-group>
          <article-title>Analyzing Likert data</article-title>
          <source>J Ext</source>
          <year>2012</year>
          <month>04</month>
          <volume>50</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://joe.org/joe/2012april/tt2.php"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sue</surname>
              <given-names>VM</given-names>
            </name>
            <name name-style="western">
              <surname>Ritter</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <source>Conducting Online Surveys. 2nd edition</source>
          <year>2012</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>SAGE Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Allen</surname>
              <given-names>IE</given-names>
            </name>
            <name name-style="western">
              <surname>Seaman</surname>
              <given-names>CA</given-names>
            </name>
          </person-group>
          <article-title>Likert scales and data analyses</article-title>
          <source>Quality Progress</source>
          <year>2007</year>
          <month>07</month>
          <access-date>2019-07-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://rube.asq.org/quality-progress/2007/07/statistics/likert-scales-and-data-analyses.html">http://rube.asq.org/quality-progress/2007/07/statistics/likert-scales-and-data-analyses.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taylor-Powell</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Renner</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Analyzing Qualitative Data</source>
          <year>2003</year>
          <access-date>2020-07-01</access-date>
          <publisher-loc>Madison, WI</publisher-loc>
          <publisher-name>University of Wisconsin—Extension, Cooperative Extension</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cdn.shopify.com/s/files/1/0145/8808/4272/files/G3658-12.pdf">https://cdn.shopify.com/s/files/1/0145/8808/4272/files/G3658-12.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Wyatt</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>mHealth and mobile medical apps: A framework to assess risk and promote safer use</article-title>
          <source>J Med Internet Res</source>
          <year>2014</year>
          <month>09</month>
          <day>15</day>
          <volume>16</volume>
          <issue>9</issue>
          <fpage>e210</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2014/9/e210/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.3133</pub-id>
          <pub-id pub-id-type="medline">25223398</pub-id>
          <pub-id pub-id-type="pii">v16i9e210</pub-id>
          <pub-id pub-id-type="pmcid">PMC4180335</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ickin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Petersen</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gonzalez-Huerta</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Why do users install and delete apps? A survey study</article-title>
          <source>Proceedings of the 8th International Conference on Software Business (ICSOB 2017)</source>
          <year>2017</year>
          <conf-name>8th International Conference on Software Business (ICSOB 2017)</conf-name>
          <conf-date>June 12-13, 2017</conf-date>
          <conf-loc>Essen, Germany</conf-loc>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>186</fpage>
          <lpage>191</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.gonzalez-huerta.net/wp-content/uploads/2017/06/ICSOB17.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-319-69191-6_13</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Etikan</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Musa</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Alkassim</surname>
              <given-names>RS</given-names>
            </name>
          </person-group>
          <article-title>Comparison of convenience sampling and purposive sampling</article-title>
          <source>Am J Theor Appl Stat</source>
          <year>2016</year>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://article.sciencepublishinggroup.com/pdf/10.11648.j.ajtas.20160501.11.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.11648/j.ajtas.20160501.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hill</surname>
              <given-names>RK</given-names>
            </name>
          </person-group>
          <article-title>What sample size is "enough" in internet survey research</article-title>
          <source>Interpersonal Comput Technol</source>
          <year>1998</year>
          <month>07</month>
          <volume>6</volume>
          <issue>3-4</issue>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://cadcommunity.pbworks.com/f/what%20sample%20size.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
