<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i7e18868</article-id>
      <article-id pub-id-type="pmid">32459640</article-id>
      <article-id pub-id-type="doi">10.2196/18868</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Privacy Assessment in Mobile Health Apps: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Szinay</surname>
            <given-names>Dorothy</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Suleder</surname>
            <given-names>Julian</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Benjumea</surname>
            <given-names>Jaime</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Electronic Technology</institution>
            <institution>Universidad de Sevilla</institution>
            <addr-line>ETS Ing Informática</addr-line>
            <addr-line>Avda Reina Mercedes s/n</addr-line>
            <addr-line>Seville, 41012</addr-line>
            <country>Spain</country>
            <phone>34 954559960</phone>
            <email>jaimebm@us.es</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8608-0544</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Ropero</surname>
            <given-names>Jorge</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5445-0646</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Rivera-Romero</surname>
            <given-names>Octavio</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7212-9805</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Dorronzoro-Zubiete</surname>
            <given-names>Enrique</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8478-9851</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Carrasco</surname>
            <given-names>Alejandro</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9474-3929</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Electronic Technology</institution>
        <institution>Universidad de Sevilla</institution>
        <addr-line>Seville</addr-line>
        <country>Spain</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Jaime Benjumea <email>jaimebm@us.es</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>7</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>2</day>
        <month>7</month>
        <year>2020</year>
      </pub-date>
      <volume>8</volume>
      <issue>7</issue>
      <elocation-id>e18868</elocation-id>
      <history>
        <date date-type="received">
          <day>24</day>
          <month>3</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>6</day>
          <month>4</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>22</day>
          <month>4</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>13</day>
          <month>5</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Jaime Benjumea, Jorge Ropero, Octavio Rivera-Romero, Enrique Dorronzoro-Zubiete, Alejandro Carrasco. Originally published in JMIR mHealth and uHealth (http://mhealth.jmir.org), 02.07.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://mhealth.jmir.org/2020/7/e18868" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Privacy has always been a concern, especially in the health domain. The proliferation of mobile health (mHealth) apps has led to a large amount of sensitive data being generated. Some authors have performed privacy assessments of mHealth apps. They have evaluated diverse privacy components; however, different authors have used different criteria for their assessments.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This scoping review aims to understand how privacy is assessed for mHealth apps, focusing on the components, scales, criteria, and scoring methods used. A simple taxonomy to categorize the privacy assessments of mHealth apps based on component evaluation is also proposed.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We followed the methodology defined by Arksey and O’Malley to conduct a scoping review. Included studies were categorized based on the privacy component, which was assessed using the proposed taxonomy.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The database searches retrieved a total of 710 citations—24 of them met the defined selection criteria, and data were extracted from them. Even though the inclusion criteria considered articles published since 2009, all the studies that were ultimately included were published from 2014 onward. Although 12 papers out of 24 (50%) analyzed only privacy, 8 (33%) analyzed both privacy and security. Moreover, 4 papers (17%) analyzed full apps, with privacy being just part of the assessment. The evaluation criteria used by authors were heterogeneous and were based on their experience, the literature, and/or existing legal frameworks.  Regarding the set of items used for the assessments, each article defined a different one. Items included app permissions, analysis of the destination, analysis of the content of communications, study of the privacy policy, use of remote storage, and existence of a password to access the app, among many others. Most of the included studies provided a scoring method that enables the comparison of privacy among apps.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The privacy assessment of mHealth apps is a complex task, as the criteria used by different authors for their evaluations are very heterogeneous. Although some studies about privacy assessment have been conducted, a very large set of items to evaluate privacy has been used up until now. In-app information and privacy policies are primarily utilized by the scientific community to extract privacy information from mHealth apps. The creation of a scale based on more objective criteria is a desirable step forward for privacy assessment in the future.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy</kwd>
        <kwd>mHealth</kwd>
        <kwd>apps</kwd>
        <kwd>privacy assessment</kwd>
        <kwd>data privacy</kwd>
        <kwd>review</kwd>
        <kwd>security</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Although data privacy has always been a concern of the utmost interest, there has been some neglect for years, as changes have taken shape faster than regulations. Only recently have developers and customers really begun to worry about data privacy. The enormous amount of data handled by companies and the exposure of users’ sensitive information have led governments to design frameworks to care for the privacy of citizens [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Likewise, the large amount of data handled by the Internet of Things through big data techniques has raised concerns about privacy [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>].</p>
      <p>The health domain, however, was probably the first to have privacy regulation. In 1996, the Health Insurance Portability and Accountability Act (HIPAA) required the United States Department of Health and Human Services to safeguard protected health information according to national standards. Some of the requirements deal with data privacy [<xref ref-type="bibr" rid="ref5">5</xref>].</p>
      <p>In Europe, concerns have not been limited to the health domain, and regulations are strict. In 2018, the General Data Protection Regulation (GDPR) replaced the existing 1995 Data Protection Directive, and it became directly applicable to all European Union member states [<xref ref-type="bibr" rid="ref6">6</xref>]. The GDPR introduced an important and modern change of approach toward a reinforced principle of accountability [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <p>These concerns also apply to mobile health (mHealth) apps. mHealth technology has been widely adopted in many countries worldwide, as the number of smartphones and mHealth apps has increased dramatically. In 2018 in the United States, 77% of the population owned a smartphone [<xref ref-type="bibr" rid="ref8">8</xref>], and in 2017, there were more than 300,000 mHealth apps [<xref ref-type="bibr" rid="ref9">9</xref>]. The proliferation of this kind of app has allowed individuals to generate significant quantities of data about their lifestyles [<xref ref-type="bibr" rid="ref10">10</xref>]. This situation has not escaped the attention of scientific researchers, and data privacy is a recurrent topic reported on in qualitative studies focused the needs and preferences of people with chronic conditions regarding mHealth solutions [<xref ref-type="bibr" rid="ref11">11</xref>].</p>
      <p>Although mHealth apps hold promise as self-management, monitoring, and behavior-change tools, among others, many smartphone users do not download mHealth apps because of lack of interest, cost, and concern about apps collecting their data [<xref ref-type="bibr" rid="ref12">12</xref>]. Some studies have proven that there is cause for users’ concerns about both the privacy and security of these apps [<xref ref-type="bibr" rid="ref13">13</xref>] and some assess only the lack of privacy of several of these apps [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. It is, therefore, important to have the right tools to evaluate privacy and security levels by identifying different methods of assessing mHealth apps.</p>
      <p>Despite privacy assessment currently being a relevant topic, there is a lack of objective protocols, methods, and procedures in place to define the necessary metrics and steps for a privacy assessment of an mHealth app. Different methods may be used to analyze privacy, such as assessment of privacy policies, evaluation of app communications, and studying app behavior. Extracting the information used to evaluate the privacy of mHealth apps, and even creating a taxonomy of the privacy components used for the assessment, should be important goals for researchers.</p>
      <p>Further, different metrics and items have also been proposed to assess privacy. The types of measurements and items used should be based on laws, recommendations, and best practices. Discovering the different criteria that can be used for privacy assessment and the methods of defining them is imperative. Therefore, our literature review fills this research gap, focusing on describing and comparing how privacy is assessed by researchers in the mHealth domain.</p>
      <p>Finally, we consider whether there is any measure of how good the privacy is in an mHealth app and how it would be possible to develop a scale for a privacy score. As such, we must search for any available way of assessing privacy in mHealth apps as well as the information that could potentially be used, and how it has been used, in these evaluations. To the best of our knowledge, no other review regarding the privacy of mHealth apps has been published.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>This review aims to summarize how privacy is assessed in the literature including any type of study design. For this purpose, we conducted a scoping review using Arksey and O’Malley’s proposed framework [<xref ref-type="bibr" rid="ref16">16</xref>]. We used Tricco et al’s PRISMA ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews) checklist [<xref ref-type="bibr" rid="ref17">17</xref>] as a guide for reporting the procedure (see <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). The authors of the framework include “summarize and disseminate research findings” and “identify research gaps in the existing literature” in the rationale for conducting a scoping review. Also, Arksey and O’Malley list “addressing a broad topic where many different study designs might be applicable” as a characteristic of scoping studies.</p>
      </sec>
      <sec>
        <title>Search Strategy</title>
        <p>A systematic search strategy was used to identify relevant papers about the assessment of mHealth app privacy. The search was conducted in July 2019 in English, using terms regarding privacy, mHealth, and assessment; the following electronic databases were used: Scopus, PubMed, IEEE (Institute of Electrical and Electronics Engineers) Xplore, and ACM (Association for Computing Machinery) Digital Library. The search string used was as follows: privacy AND (“health app” OR “health apps” OR “mobile health” OR mhealth) AND (test OR testing OR tested OR framework OR review OR reviewing OR reviewed OR evaluate OR evaluation OR evaluating OR evaluated OR assess OR assessing OR assessment OR assessed OR “comparative analysis” OR “regulation compliance” OR taxonomy). The search terms and strategies for each database are detailed in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
        <p>The database results were imported into the Mendeley application to further scrutinize the papers.</p>
      </sec>
      <sec>
        <title>Selection Criteria</title>
        <p>The inclusion criteria for studies were as follows:</p>
        <list list-type="order">
          <list-item>
            <p>Papers that assessed the privacy of mHealth apps, regardless of the subject of the assessment, as well as papers that assessed several aspects of mHealth apps, including privacy.</p>
          </list-item>
          <list-item>
            <p>Papers published with a title and abstract in English from 2009 onward in research journals, conference proceedings, or book chapters.</p>
          </list-item>
        </list>
        <p>Papers that did not propose a method to evaluate privacy were excluded—even if they analyzed privacy—if they focused only on general aspects, such as users’ concerns, threat analysis, or challenges identified. Papers that did not evaluate any app were also excluded.</p>
      </sec>
      <sec>
        <title>Study Selection</title>
        <p>After completing the search process and removing duplicates, the remaining 480 papers were screened. Initially, two authors (JB and JR) independently reviewed 10.0% (48/480) of the titles and abstracts to assess the level of agreement; the Cohen κ statistic, a measure of interrater reliability, was 0.73, which denotes an acceptable level of agreement [<xref ref-type="bibr" rid="ref18">18</xref>]. Then, each author analyzed half of the remaining titles and abstracts to determine if they were potentially suitable for our objective. As a result, 77 articles were selected. Each author subsequently conducted a full-text review of those papers and 24 articles were ultimately included for data extraction. During this process, any doubt or discrepancy was resolved by consensus.</p>
      </sec>
      <sec>
        <title>Charting</title>
        <p>The authors followed a collaborative and iterative process to define a charting table for collecting the data from the included studies. Information was gathered into four main groups: general information, evaluation procedure, evaluation criteria, and scoring method. <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref> shows the charting table that was used.</p>
        <p>The <italic>general information</italic> group includes the year of publication, source title and type, app area, as well as the number of analyzed mHealth apps.</p>
        <p>The <italic>evaluation procedure</italic> group comprises all the information related to the way the apps were assessed, according to the assessment design and the object of assessment. The assessment design deals with the type of evaluation that was done. Some papers analyze only privacy, while others assess security and privacy, and some even evaluate privacy as part of the whole functioning of the app. Information regarding whether the study assessed only app privacy, or whether app privacy was a component of a multidimensional evaluation, is included in this category. Additionally, information regarding what privacy components were assessed is also part of this group. After reviewing the full text of the included studies, a taxonomy of privacy components was defined by consensus. The categories, based on our review, that were used for the assessment of privacy were as follows:</p>
        <list list-type="order">
          <list-item>
            <p>App properties and behavior: this category refers to the app functionality. An article falls into this category if the app was actively used and some user information was provided to the app. Examples of this category are the type of log in used by the app, such as email or connecting via an external provider like Facebook, or if user registration and/or a password are needed to use the app.</p>
          </list-item>
          <list-item>
            <p>In-app information: as with the previous category, the app was analyzed from within to look for information related to privacy, such as security measures or data sharing. Privacy policies were assessed in a separate item because some articles assess this in that fashion.</p>
          </list-item>
          <list-item>
            <p>Personal information types: to fall into this category, the article must explicitly analyze the type of personal data collected by the app.</p>
          </list-item>
          <list-item>
            <p>App communications: some articles analyze whether the app communications are private by intercepting traffic. Therefore, it is possible not only to know if traffic is encrypted but also, in some cases, to check the content of the traffic. Some authors were also able to find out the traffic destination of app communications, such as third parties and ad sites.</p>
          </list-item>
          <list-item>
            <p>Static and dynamic analyses: the use of static and/or dynamic analysis is very common when evaluating the security of an app; however, these analyses can also be used to analyze certain aspects of privacy, such as whether privacy measures are properly implemented in app communications and the types of permissions used by an app.</p>
          </list-item>
          <list-item>
            <p>Existence of a privacy policy: articles that check for the existence of a privacy policy are included in this category.</p>
          </list-item>
          <list-item>
            <p>Analysis of the content of the privacy policy and/or the</p>
            <p>Type of Service: the authors of the article have read the privacy policy and searched for the presence or absence of certain information, such as how the data are stored, the use of encryption, and whether the data are shared with third parties, among others. Legibility (see the next category) is excluded from this category because the metrics used to evaluate legibility do not depend on the type of document being assessed.</p>
          </list-item>
          <list-item>
            <p>Privacy policy legibility: transparency is one of the pillars of GDPR, and some articles analyze certain metrics regarding the readability of an app’s privacy policy, including the length of the document, number of phrases, and use of readability algorithms available in the literature.</p>
          </list-item>
        </list>
        <p>The <italic>evaluation criteria</italic> group includes the items used for the assessment and what the assessment criteria are based on. Very heterogeneous information was extracted from each article, and the assessment criteria were decided on in varied ways. Evaluators chose a set of criteria based on the literature, the authors’ experience, an existing legal framework, and/or certain privacy recommendations and principles. It is difficult to categorize the criteria that were used to assess privacy, as they were not selected in a purely objective way. Different privacy items are defined according to the categories previously described. After extracting all the data regarding privacy assessment criteria from the studies that met the inclusion criteria, we defined, by consensus, a classification system consisting of 21 elements, listed hereafter.</p>
        <p>A privacy policy is important when assessing privacy. The following items can be defined according to the content of a privacy policy: the existence of a data controller, details about the provision of a data protection officer, stating the purpose of data processing, establishing the legal basis, identifying the recipients of personal data, disclosing the occurrence of international data transfers, establishing the subject’s data rights (including the right to withdraw consent), whether it is an obligation to provide data, disclosing the occurrence of data profiling, detailing the nature of the collected information, stating the risks of data collection, disclosing the location of the collected information, and using anonymization.</p>
        <p>Some of these items may also be defined by in-app information. Details regarding the purpose of data processing, the legal basis, the recipients of personal data, the existence of the subject’s data rights, the risks of data collection, and the protection of minors were extracted from the in-app information for this review.</p>
        <p>Personal information types were used to define the nature and location of the collected information. App properties and behavior define whether user registration is necessary and the minimum amount of data collection that must be collected for an app to function correctly. App communications as well as static and dynamic analyses were used to check traffic and whether security measures were implemented; for these last cases, the distinction between security and privacy was not obvious.</p>
        <p>Last, the <italic>scoring method</italic> group deals with the existence or nonexistence of a final score in each article. If there was a score, the weighting of assessed items was also considered.</p>
        <p>The charting table containing all the data to be extracted was implemented using Microsoft Excel. Two authors (JB and JR) independently extracted data from the 24 selected articles. Discrepancies were resolved by consensus.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Search Results</title>
        <p>The database search retrieved a total of 710 citations; 230 duplicates were removed. After an initial screening of the abstracts and titles, 403 articles that did not meet the eligibility criteria were excluded and 77 were selected for full-text screening. After the full-text review, 24 studies [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref39">39</xref>] remained that fulfilled the inclusion criteria for this scoping review (see <xref rid="figure1" ref-type="fig">Figure 1</xref>). A full list of the included studies can be found in <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Flow diagram of the search strategy.</p>
          </caption>
          <graphic xlink:href="mhealth_v8i7e18868_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>General Information</title>
        <p>The general information contained in each study is summarized in <xref ref-type="table" rid="table1">Table 1</xref>. The year of publication, source title and type, app areas, and number of analyzed apps comprise the general information from each article. The source type is categorized as either a journal article, conference paper, or book chapter. The app areas were determined according to what the original article stated about the subject matter.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>General information from each article.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="270"/>
            <col width="340"/>
            <col width="280"/>
            <col width="110"/>
            <thead>
              <tr valign="top">
                <td>Reference</td>
                <td>Source<sup>a</sup></td>
                <td>App areas</td>
                <td>Number of analyzed apps</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Papageorgiou et al, 2018 [<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td>IEEE (Institute of Electrical and Electronics Engineers) Access (J)</td>
                <td>Pregnancy and baby growth<break/>Family members and assistants<break/>Blood pressure and diabetes</td>
                <td>20</td>
              </tr>
              <tr valign="top">
                <td>Minen et al, 2018 [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>Headache (J)</td>
                <td>Headache</td>
                <td>14</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2019 [<xref ref-type="bibr" rid="ref15">15</xref>]</td>
                <td>JAMA (Journal of the American Medical Association) Network Open (J)</td>
                <td>Depression<break/>Smoking cessation</td>
                <td>36</td>
              </tr>
              <tr valign="top">
                <td>Scott et al, 2015 [<xref ref-type="bibr" rid="ref19">19</xref>]</td>
                <td>Australasian Journal of Information Systems (J)</td>
                <td>General (top 20 mobile health [mHealth] apps)</td>
                <td>20</td>
              </tr>
              <tr valign="top">
                <td>Brüggemann et al, 2016 [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>Annual Privacy Forum (J)</td>
                <td>Medical<break/>Health and fitness</td>
                <td>298</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>Studies in Health Technology and Informatics (BC)</td>
                <td>Health and fitness</td>
                <td>20</td>
              </tr>
              <tr valign="top">
                <td>Hutton et al, 2018 [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td>JMIR mHealth and uHealth (J)</td>
                <td>Self-tracking</td>
                <td>64</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>Annual International Conference of the IEEE Engineering in Medicine and Biology Society (C)</td>
                <td>Personal health record</td>
                <td>24</td>
              </tr>
              <tr valign="top">
                <td>Sunyaev et al, 2015 [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>Journal of the American Informatics Association (J)</td>
                <td>Medical<break/>Health and fitness</td>
                <td>600</td>
              </tr>
              <tr valign="top">
                <td>Leigh et al, 2017 [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>Evidence-Based Mental Health (J)</td>
                <td>Chronic insomnia</td>
                <td>19</td>
              </tr>
              <tr valign="top">
                <td>Baumel et al, 2017 [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>Journal of Medical Internet Research (J)</td>
                <td>Health-related behaviors<break/>Mental health</td>
                <td>84</td>
              </tr>
              <tr valign="top">
                <td>Bachiri et al, 2018 [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>Journal of Medical Systems (J)</td>
                <td>Pregnancy</td>
                <td>19</td>
              </tr>
              <tr valign="top">
                <td>de las Aguas Robustillo Cortés et al, 2014 [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>Telemedicine and e-Health (J)</td>
                <td>HIV/AIDS</td>
                <td>41</td>
              </tr>
              <tr valign="top">
                <td>Quevedo-Rodríguez and Wagner, 2019 [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>Endocrinología, Diabetes y Nutrición (J)</td>
                <td>Diabetes</td>
                <td>42</td>
              </tr>
              <tr valign="top">
                <td>Knorr et al, 2015 [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>IFIP (International Federation for Information Processing) Advances in Information and Communication Technology (J)</td>
                <td>Diabetes<break/>Blood pressure</td>
                <td>154</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>RISTI (Revista Ibérica de Sistemas e Tecnologias de Informação) (J)</td>
                <td>Personal health record</td>
                <td>24</td>
              </tr>
              <tr valign="top">
                <td>Bondaronek et al, 2018 [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>JMIR mHealth and uHealth (J)</td>
                <td>Physical activity</td>
                <td>65</td>
              </tr>
              <tr valign="top">
                <td>O’Laughlin et al, 2019 [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Internet Interventions (J)</td>
                <td>Depression</td>
                <td>116</td>
              </tr>
              <tr valign="top">
                <td>Adhikari et al, 2014 [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>Australasian Conference on Information Systems (C)</td>
                <td>General (top 20 mHealth apps)</td>
                <td>20</td>
              </tr>
              <tr valign="top">
                <td>Aliasgari et al, 2018 [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>IEEE Conference on Application, Information and Network Security (C)</td>
                <td>General (top 25 mHealth apps)</td>
                <td>25</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>Modeling and Simulation in Medicine Symposium (C)</td>
                <td>Health and fitness</td>
                <td>10</td>
              </tr>
              <tr valign="top">
                <td>Powell el al, 2018 [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>JMIR mHealth and uHealth (J)</td>
                <td>Diabetes<break/>Mental health</td>
                <td>70</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2015 [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>BMC (BioMed Central) Medicine (J)</td>
                <td>General</td>
                <td>79</td>
              </tr>
              <tr valign="top">
                <td>Robillard et al, 2019 [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td>Internet Interventions (J)</td>
                <td>Mental health</td>
                <td>369</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>Sources include journal articles (J), conference papers (C), or book chapters (BC).</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>According to the type of source, 19 out of the 24 articles (79%) were published in journals [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref37">37</xref>-<xref ref-type="bibr" rid="ref39">39</xref>], whereas 4 (17%) were published in conference proceedings [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref36">36</xref>] and 1 (4%) was a book chapter [<xref ref-type="bibr" rid="ref21">21</xref>]. The publication fields were quite heterogeneous, with 12 out of 24 articles (50%) pertaining to the area of <italic>medical informatics</italic> [<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>], 5 (21%) to <italic>medicine</italic> [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref38">38</xref>], 4 (17%) to <italic>information technology</italic> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>], 2 (8%) to <italic>security and privacy</italic> [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and 1 (4%) to a multidisciplinary source [<xref ref-type="bibr" rid="ref6">6</xref>].</p>
        <p>Based on our defined inclusion criteria, we analyzed articles published between January 2009 and July 2019. None of the selected articles was published between 2009 and 2013. Out of the 24 papers, 4 (17%) were published in 2014 [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>], 4 (17%) in 2015 [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref38">38</xref>], 3 (13%) in 2016 [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], 2 (8%) in 2017 [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>], 7 (29%) in 2018 [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>], and 4 (17%) in the first half of 2019 [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>A wide range of app types was analyzed in the included studies, and some articles analyzed apps in different areas. For instance, in Knorr et al [<xref ref-type="bibr" rid="ref30">30</xref>], both diabetes and blood pressure apps were analyzed. Fitness apps, including self-tracking and physical activity apps, were the most analyzed, appearing in 6 articles (25%) [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Mental health apps, including apps for depression monitoring, were assessed in 5 articles (21%) [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>], and diabetes-related apps appeared in 4 articles (17%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. Other app areas were HIV/AIDS (1/24, 4%) [<xref ref-type="bibr" rid="ref28">28</xref>], headache (1/24, 4%) [<xref ref-type="bibr" rid="ref14">14</xref>], pregnancy and baby growth (2/24, 8%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref27">27</xref>], personal health record management (2/24, 8%) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref31">31</xref>], chronic insomnia (1/24, 4%) [<xref ref-type="bibr" rid="ref25">25</xref>], and smoking cessation (1/24, 4%) [<xref ref-type="bibr" rid="ref15">15</xref>]. Top mHealth apps were assessed in 4 articles (17%) [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>Only 2 articles out of 24 (8%) analyzed certified apps. Huckvale et al [<xref ref-type="bibr" rid="ref38">38</xref>] analyzed 79 apps certified by the United Kingdom’s National Health Service (NHS) and concluded that there were gaps in compliance with data protection principles in these accredited apps. By contrast, Leigh et al analyzed 18 apps for Android and 1 NHS-certified app for iOS [<xref ref-type="bibr" rid="ref25">25</xref>], and the authors found that the NHS-approved app outscored the others when using their evaluation criteria.</p>
        <p>Finally, the number of apps analyzed in each article is disparate, ranging from 10 to 600 apps, with 20 apps being the mode (3/24, 13%) [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. The average number of apps assessed was 92.6 (SD 136.9). Most of the articles (13/24, 54%), however, assessed less than 51 apps [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref36">36</xref>].</p>
      </sec>
      <sec>
        <title>Evaluation Procedure</title>
        <p>A summary of the collected information is shown in <xref ref-type="table" rid="table2">Table 2</xref>. The objects of the assessments and the basis of the assessment criteria are described in the Methods section.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Procedure for evaluation of the apps.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="260"/>
            <col width="150"/>
            <col width="230"/>
            <col width="360"/>
            <thead>
              <tr valign="top">
                <td>Reference</td>
                <td>Area of assessment</td>
                <td>Object of the assessment</td>
                <td>Basis of the assessment criteria (includes legal framework)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Papageorgiou et al, 2018 [<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td>Privacy and security</td>
                <td>In-app information<break/>Static and dynamic analyses<break/>App communications<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Authors<break/>Legal</td>
              </tr>
              <tr valign="top">
                <td>Minen et al, 2018 [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>Privacy</td>
                <td>Static and dynamic analyses<break/>App communications<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Authors</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2019 [<xref ref-type="bibr" rid="ref15">15</xref>]</td>
                <td>Privacy</td>
                <td>In-app information<break/>App communications<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Literature</td>
              </tr>
              <tr valign="top">
                <td>Scott et al, 2015 [<xref ref-type="bibr" rid="ref19">19</xref>]</td>
                <td>Privacy and security</td>
                <td>App properties and behavior<break/>Existence of a privacy policy</td>
                <td>Literature</td>
              </tr>
              <tr valign="top">
                <td>Brüggemann et al, 2016 [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>Privacy</td>
                <td>App properties and behavior<break/>Personal information types<break/>App communications</td>
                <td>Authors<break/>Literature</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>Privacy</td>
                <td>App communications</td>
                <td>Author</td>
              </tr>
              <tr valign="top">
                <td>Hutton et al, 2018 [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td>Privacy</td>
                <td>App properties and behavior<break/>In-app information<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Literature<break/>Legal<break/>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>Privacy</td>
                <td>App properties and behavior<break/>Existence of a privacy policy</td>
                <td>Literature<break/>Legal</td>
              </tr>
              <tr valign="top">
                <td>Sunyaev et al, 2015 [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>Privacy</td>
                <td>Existence of a privacy policy<break/>Content of the privacy policy<break/>Legibility of the privacy policy</td>
                <td>Authors</td>
              </tr>
              <tr valign="top">
                <td>Leigh et al, 2017 [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>Multidimensional</td>
                <td>In-app information<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Legal<break/>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Baumel et al, 2017 [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>Multidimensional</td>
                <td>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Literature</td>
              </tr>
              <tr valign="top">
                <td>Bachiri et al, 2018 [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>Privacy</td>
                <td>App properties and behavior<break/>Existence of a privacy policy</td>
                <td>Literature<break/>Legal<break/>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>de las Aguas Robustillo Cortés et al, 2014 [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>Multidimensional</td>
                <td>App properties and behavior<break/>In-app information</td>
                <td>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Quevedo-Rodríguez and Wagner, 2019 [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>Multidimensional</td>
                <td>App properties and behavior<break/>In-app information<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Knorr et al, 2015 [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>Privacy and security</td>
                <td>Legibility of the privacy policy</td>
                <td>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>Privacy</td>
                <td>App properties and behavior<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Authors<break/>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Bondaronek et al, 2018 [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>Privacy and security</td>
                <td>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>O’Laughlin et al, 2019 [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Privacy</td>
                <td>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Authors</td>
              </tr>
              <tr valign="top">
                <td>Adhikari et al, 2014 [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>Privacy and security</td>
                <td>App properties and behavior<break/>In-app information<break/>Existence of a privacy policy</td>
                <td>Literature</td>
              </tr>
              <tr valign="top">
                <td>Aliasgari et al, 2018 [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>Privacy and security</td>
                <td>App communications</td>
                <td>Legal</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>Privacy and security</td>
                <td>App communications</td>
                <td>Authors<break/>Recommendations or principles</td>
              </tr>
              <tr valign="top">
                <td>Powell el al, 2018 [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>Privacy</td>
                <td>Existence of a privacy policy<break/>Legibility of the privacy policy</td>
                <td>Authors</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2015 [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>Privacy and security</td>
                <td>App properties and behavior<break/>In-app information<break/>Static and dynamic analyses<break/>App communications<break/>Existence of a privacy policy<break/>Content of the privacy policy</td>
                <td>Legal</td>
              </tr>
              <tr valign="top">
                <td>Robillard et al, 2019 [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td>Privacy</td>
                <td>Existence of a privacy policy<break/>Content of the privacy policy<break/>Legibility of the privacy policy</td>
                <td>Authors<break/>Literature</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>Of the 24 articles assessed, 12 (50%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] evaluated only privacy; 8 (33%) evaluated security features, together with privacy [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]; and 4 (17%) conducted a multidimensional assessment [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>], with privacy being only part of the evaluation.</p>
        <p>When considering the object of the assessment, 19 out of the 24 articles (79%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref37">37</xref>-<xref ref-type="bibr" rid="ref39">39</xref>] used the privacy policy as part of the assessment or solely evaluated the privacy policy. App properties and behavior were used for assessment by 10 articles (42%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref38">38</xref>], and 8 papers (33%) used in-app information [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] or app communications [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] for privacy evaluation. Finally, only 2 articles (8%) each used personal information types [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] and static and dynamic analyses [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref30">30</xref>].</p>
        <p>The selected articles used different bases to define criteria to assess privacy of mobile apps. Most of the papers combined some sources to determine the items for assessment. Out of 24 papers, 10 (42%) [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] used the literature to determine the items, while 9 (38%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] were based on the authors’ criteria. Not many of the papers used legal frameworks or regulations—only 3 out of 24 papers (13%) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref35">35</xref>] used the HIPAA and just 2 (8%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] explicitly mentioned the GDPR as a basis for determining the assessment criteria, although none of them checked the GDPR compliance. However, out of 24 articles, 2 (8%) [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] did use the previous European privacy regulation (ie, the 1995 Data Protection Directive). A total of 12 other privacy frameworks, recommendations from certification organizations and standard associations, and privacy principles were used. <xref ref-type="supplementary-material" rid="app5">Multimedia Appendix 5</xref> shows a further analysis regarding the object of the privacy assessment in mHealth apps.</p>
      </sec>
      <sec>
        <title>Evaluation Criteria</title>
        <p>The evaluation criteria are heterogeneous, as were the methods for defining them. Though a very brief summary of the criteria is shown in <xref ref-type="table" rid="table3">Table 3</xref>, they are described in more detail in <xref ref-type="supplementary-material" rid="app6">Multimedia Appendix 6</xref>. The classification items proposed by the different articles to be used for evaluating app privacy are shown in <xref ref-type="table" rid="table4">Table 4</xref>.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Criteria for evaluation of the apps.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="130"/>
            <col width="550"/>
            <col width="320"/>
            <thead>
              <tr valign="top">
                <td>Reference</td>
                <td>Criteria</td>
                <td>Assessment of criteria</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Papageorgiou et al, 2018 [<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td>Privacy policy: consent, user rights (ie, withdraw and portability), data protection officer, data collection, purpose, and transfer<break/>Permission and static analysis<break/>Data transmission: https, SSL (Secure Sockets Layer), and secure transmission</td>
                <td>Number of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Minen et al, 2018 [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>Account functionality<break/>Data storage<break/>Privacy policy: type of information collected, data sharing, protection of minors, data access, and user rights</td>
                <td>Number of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2019 [<xref ref-type="bibr" rid="ref15">15</xref>]</td>
                <td>Privacy policy availability<break/>Uses of data, data transfer, and data collection<break/>Mechanisms for security, how long data will be retained, cookies, user rights (ie, opt-out, consequences of not providing data, deletion, editing, and complaints), and protection of minors<break/>Identity of data controller<break/>Adherence to privacy policy</td>
                <td>Percentage of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Scott et al, 2015 [<xref ref-type="bibr" rid="ref19">19</xref>]</td>
                <td>User registration and authentication<break/>Data storing and sharing<break/>Enable users to update, correct, and delete their data<break/>Data privacy and security measures and existence of privacy policy</td>
                <td>Items 1-3: risk score (1 point if there is a risk);<break/>Items 4-9: safety score (1 point if it is safe)</td>
              </tr>
              <tr valign="top">
                <td>Brüggemann et al, 2016 [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>Information-sharing targets (S), information transfer (T), and information collection (U)<break/>Personal information types (P) and log-in (L)<break/>Connection security (R)</td>
                <td>PrivacyRiskScoreApp = TApp × w(T) + PApp × w(P) + LApp × w(L)+ SApp × w(S) + UApp × w(U) + RApp × w(R)<break/>w = weight</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>Use of SSL and certificate pinning<break/>Information sent and identification of third parties</td>
                <td>Number of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Hutton et al, 2018 [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td>Notice and awareness: data sharing, nature of data, and explanation of security measures<break/>Choice or consent: user-consent control<break/>Access or participation: user access to data<break/>Social disclosure: privacy control</td>
                <td>Most heuristics are valued as 0-2 (0, 1, or 2), though some have slightly different values (ie, 0/1, 0-3, or 0-4)</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>Privacy policy access and updates<break/>Authentication, encryption, and security standards<break/>Access can be granted and revoked</td>
                <td>All six items are valued as 0, 0.5, or 1</td>
              </tr>
              <tr valign="top">
                <td>Sunyaev et al, 2015 [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>Privacy policy availability<break/>Privacy policy features: length, readability, scope, and transparency (ie, sharing, collection, and user controls)</td>
                <td>Number of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Leigh et al, 2017 [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>Data sharing<break/>Confidentiality mechanisms<break/>Privacy policy availability and content (ie, data collection, use of data, and data encryption)</td>
                <td>App privacy features (1-2) and privacy policy (3-8), with 1 point per question</td>
              </tr>
              <tr valign="top">
                <td>Baumel et al, 2017 [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>Data communications, storage, and sharing<break/>Notification of how personal information is kept confidential<break/>Protection of minors<break/>Anonymization</td>
                <td>Eight items: 1 point if the app does not include the item</td>
              </tr>
              <tr valign="top">
                <td>Bachiri et al, 2018 [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>Privacy policy location and updates<break/>Access management: permissions, audit, criteria, and authentication<break/>Security measures<break/>Consideration of the Health Insurance Portability and Accountability Act (HIPAA)</td>
                <td>Number of criteria that are met (35 items)</td>
              </tr>
              <tr valign="top">
                <td>de las Aguas Robustillo Cortés et al, 2014 [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>Data transmission and confidentiality<break/>Registration, purpose of use, information disclosure, and social disclosure<break/>Protection of minors and mechanisms to avoid unauthorized access<break/>Information storage</td>
                <td>–1 (does not meet the criterion), 0 (not applicable), or 1 (meets the criterion)</td>
              </tr>
              <tr valign="top">
                <td>Quevedo-Rodríguez and Wagner, 2019 [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>Nature and purpose of the information and data storing<break/>Information about privacy, consent, and security measures<break/>User access<break/>Protection of minors</td>
                <td>Compliance with items: 2 (complies), 1­ (partially complies), or 0 (does not comply)</td>
              </tr>
              <tr valign="top">
                <td>Knorr et al, 2015 [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>Static and dynamic analyses and web connection<break/>Inspection of privacy policies</td>
                <td>General compliance with the items</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>Notification: privacy policy access and updates, cookies, and use of safety standards<break/>Security: authentication, encryption, server protection, and backup copies<break/>Election and access: access can be granted and revoked and access in case of emergency</td>
                <td>Compliance with items: 2 (complies), 1­ (partially complies), or 0 (does not comply)</td>
              </tr>
              <tr valign="top">
                <td>Bondaronek et al, 2018 [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>Privacy information: availability, accessibility, data collecting, data sharing, and data security</td>
                <td>Number of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>O’Laughlin et al, 2019 [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Privacy policy availability, existence of a log-in process, and identification<break/>Data storage and sharing<break/>User access: editing and deletion</td>
                <td>Some of the items received a white, light-grey, or dark-grey score; other items received a white or light-grey score; 1 item received a white, light-grey, or black score</td>
              </tr>
              <tr valign="top">
                <td>Adhikari et al, 2014 [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>User registration and authentication<break/>Data storing and sharing<break/>Enable users to update, correct, and delete their data<break/>Data privacy and security measures and existence of privacy policy</td>
                <td>Items 1-3: risk score (1 point if there is a risk);<break/>Items 4-8: safety score (1 point if it is safe)</td>
              </tr>
              <tr valign="top">
                <td>Aliasgari et al, 2018 [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>SSL configuration<break/>Data transfer and collection<break/>Compliance with the HIPAA</td>
                <td>HIPAA compliance or not: the authors checked if the terms and conditions indicated HIPAA compliance, or they asked the app’s support team</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>Encryption<break/>Data transmission</td>
                <td>Number of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Powell el al, 2018 [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>Privacy policy readability: word count, sentences per paragraph, words per sentence, characters per word, average number of sentences per 100 words, average words with 6 or more characters, Flesch Reading Ease, Flesch-Kincaid Grade Level, Gunning Fog Score, SMOG (Simple Measure of Gobbledygook) Index, Coleman Liau Index, Automated Readability Index, Fry Grade Level, and Raygor Estimate Graph Grade Level</td>
                <td>Average score, median, or range for every item comparing diabetes apps vs mental health apps</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2015 [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>Privacy policy: availability and features<break/>Concordance of privacy policies and data-handling practices<break/>Coverage of privacy policy: data collection, data transfer, anonymization, how long data are retained, use of cookies, user rights (ie, opt-out, consequences of not providing data, data access, and complaints), identification of data controller, and updates</td>
                <td>Percentage of apps that meet the different criteria</td>
              </tr>
              <tr valign="top">
                <td>Robillard et al, 2019 [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td>Collected information (ie, nature and types), use of information, and data sharing<break/>Reasons for disclosing information<break/>User rights: consent, opt-out, and deletion</td>
                <td>Percentage of apps that meet the different criteria</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Items present in the assessment of criteria for each article.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="90"/>
            <col width="30"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <thead>
              <tr valign="top">
                <td>Item</td>
                <td colspan="24">Reference</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>[<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref15">15</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref19">19</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>[<xref ref-type="bibr" rid="ref39">39</xref>]</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Existence of a data controller</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>DPO<sup>a</sup> details are given</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Purposes of the processing are stated</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
              </tr>
              <tr valign="top">
                <td>Legal basis exists</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
              </tr>
              <tr valign="top">
                <td>Recipients of personal data are identified</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
              </tr>
              <tr valign="top">
                <td>International data transfers are disclosed</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Data storage period is stated</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Existence of users’ data rights</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
              </tr>
              <tr valign="top">
                <td>Existence of the right to withdraw consent</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
              </tr>
              <tr valign="top">
                <td>Existence of the right to complain to a supervisory authority</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Obligation to provide data</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Existence of data processing and profiling</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Nature of the collected information is disclosed</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
              </tr>
              <tr valign="top">
                <td>Risks of data collection and management of confidentiality breaches are stated</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Location of the collected information is disclosed</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>User registration is required</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Existence of a privacy policy</td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Privacy policy good practices</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Minimum data needed for app functioning are collected</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Protection of minors and age of verification exists</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>Anonymization takes place</td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>X</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>DPO: data protection officer.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>As seen in <xref ref-type="table" rid="table4">Table 4</xref>, many different items were considered as criteria to assess privacy. We have defined 21 items, but only four of them were taken into account by more than half the selected articles. The identification of the recipients of personal data was used as an evaluation criterion in 16 out of the 24 papers (67%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. The existence of a privacy policy was determined by 13 out of 24 articles (54%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. The stating of the purposes of the data processing was also examined by 13 papers (54%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. Additionally, 13 articles (54%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] determined the existence of subjects’ data rights, though only partially—most of them only considered access and/or data control by the user.</p>
        <p><xref ref-type="table" rid="table4">Table 4</xref> also shows two different ways of assessing privacy. Out of 24 papers, 10 (42%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] checked whether the analyzed apps met the criteria described in the Evaluation Procedure section. Meanwhile, 14 articles out of 24 (58%) [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>] evaluated the different apps according to several criteria.</p>
      </sec>
      <sec>
        <title>Scoring Method</title>
        <p>Of the 14 articles that assessed apps according to several items, 13 (93%) of them provided a scoring method that enables a comparison of privacy among apps. Only 1 paper (7%) [<xref ref-type="bibr" rid="ref22">22</xref>] did not give a final score, although every item had an associated score; thus, a scoring method could easily be developed. The items were assessed in a binary manner in 6 out of the 14 papers (43%) [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], which produced a score. Out of 14 articles, 7 (50%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>] used a binary assessment with intermediate values: 0, 0.5, or 1; 0, 1, or 2; or –1, 0, or 1 were used. Hutton et al utilized different discrete values depending on the assessed items [<xref ref-type="bibr" rid="ref22">22</xref>]. Bondaronek et al used discrete values—white, light grey, dark grey, and black—to obtain a final score of acceptable, unacceptable, or questionable [<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        <p>Focusing on the articles that developed a scoring method, we have also analyzed whether the scoring was weighted. In that case, all the items would have different weights according to their importance when calculating the final score. Only 2 articles out of 24 (8%) [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref28">28</xref>] proposed a weighted score and 1 article (4%) [<xref ref-type="bibr" rid="ref6">6</xref>] distinguished between “major issues” and “minor issues” but did not produce a final score. A summary is shown in <xref ref-type="table" rid="table5">Table 5</xref>.</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Scoring methods used to assess apps.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="170"/>
            <col width="570"/>
            <col width="260"/>
            <thead>
              <tr valign="top">
                <td>Reference</td>
                <td>Score</td>
                <td>Weighted score</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Papageorgiou et al, 2018 [<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td>No</td>
                <td>No, though there are “major issues” and “minor issues”</td>
              </tr>
              <tr valign="top">
                <td>Minen et al, 2018 [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>No</td>
                <td>N/A<sup>a</sup></td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2019 [<xref ref-type="bibr" rid="ref15">15</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Scott et al, 2015 [<xref ref-type="bibr" rid="ref19">19</xref>]</td>
                <td>Yes. Risk score: 0-3; safety score: 0-6</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Brüggemann et al, 2016 [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>Yes. Connection security (S), information-sharing targets (T), unspecific information transfer (U), information collection (R), and log-in (L) are binary. Personal information type (P) is more elaborated: 13 types are considered and a correction factor is applied.</td>
                <td>Yes, it can be configured by the user</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Hutton et al, 2018 [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td>The paper does not give a score but, rather, explains how different heuristics are implemented. However, it is easy to assign a score to every app with the available information.</td>
                <td>N/A, although it can be calculated (see Scoring Method section above)</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>Yes: 0-6</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Sunyaev et al, 2015 [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Leigh et al, 2017 [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>Yes: 0-8</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Baumel et al, 2017 [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>Yes: 0-8, with 0 points being maximum privacy</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Bachiri et al, 2018 [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>Yes: 0-35</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>de las Aguas Robustillo Cortés et al, 2014 [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>Yes, but it is a general app score, not only for privacy</td>
                <td>Yes, weighted by experts</td>
              </tr>
              <tr valign="top">
                <td>Quevedo-Rodríguez and Wagner, 2019 [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>Yes, but as part of the global app quality</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Knorr et al, 2015 [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Zapata et al, 2014 [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>Yes</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Bondaronek et al, 2018 [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>No, at least for the privacy items</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>O’Laughlin et al, 2019 [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Yes: acceptable, unacceptable, or questionable</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Adhikari et al, 2014 [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>Yes. Risk score: 0-3; safety score: 0-5</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Aliasgari et al, 2018 [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>Yes. Although there is no global score, there are certain scores pertaining to Transport Layer Security (TLS) and Health Insurance Portability and Accountability Act (HIPAA) compliance.</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Mense et al, 2016 [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Powell el al, 2018 [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>Average score, median, and range for every item</td>
                <td>No</td>
              </tr>
              <tr valign="top">
                <td>Huckvale et al, 2015 [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
              <tr valign="top">
                <td>Robillard et al, 2019 [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td>No</td>
                <td>N/A</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table5fn1">
              <p><sup>a</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>General Information</title>
        <p>This review deals with the privacy assessment for mHealth apps. Finding information about the assessment of privacy of mHealth apps is not a trivial task, as the sources are very heterogeneous, including many areas of application. What is obvious is that the interest in privacy has been growing in the scientific community, with special significance in recent years. Despite studying the period from 2009 to 2019, the 24 selected articles were published in 2014 or later.</p>
        <p>Privacy is essential in the health domain, and the app areas are very diverse. Fitness, mental health, and diabetes apps were common in the assessments, but such varied fields as HIV/AIDS, pregnancy, and headaches were considered. Some papers, such as Powell et al, evaluated seemingly unrelated areas, such as mental health and diabetes, at the same time [<xref ref-type="bibr" rid="ref37">37</xref>]. The number of analyzed apps per paper also varied widely, from 10 apps [<xref ref-type="bibr" rid="ref36">36</xref>] to 600 apps [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
      </sec>
      <sec>
        <title>Evaluation Procedure</title>
        <p>The articles presented in this scoping review evaluated privacy in different ways. Some of them analyzed only privacy, whereas others evaluated it together with security or other app functions.</p>
        <p>Several of the articles used the privacy policy to determine information about the app privacy, but researchers should report more detailed information regarding how they assess the privacy of apps to ensure the reliability of their studies. As an example, it is not clear how so much information was obtained by analyzing only the app privacy policies in 3 papers (13%) [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]—perhaps an in-app information assessment was also performed. None of the articles explained how they evaluated privacy policies when considering certain items, such as informing the user about the secondary uses of their data. Some authors even noted that there were difficulties in evaluating privacy policies due to the complexity of the language used in them (eg, “Disagreements between the raters arose primarily from confusion over the apps’ privacy policies, which were often unclear in terms of language and intent” [<xref ref-type="bibr" rid="ref22">22</xref>]), but none of them specified the exact criteria used to evaluate the content of the privacy policies. This could lead to inconsistent results if their assessment framework were to be used by others. Specifying the particular criteria used in the assessment could make the evaluations reproducible.</p>
        <p>The legal framework is another important issue with privacy assessment. The number of mHealth apps has increased considerably [<xref ref-type="bibr" rid="ref8">8</xref>], and important privacy regulations have emerged—not only in the mHealth domain—such as the GDPR [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. However, only 7 out of the 24 articles (29%) used law as a direct source for establishing the assessment criteria—4 of them [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] used the European legislation (ie, the GDPR or the 1995 Data Protection Directive) as a source and 3 [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref35">35</xref>] were based on the HIPAA. Although some authors were skeptical about the applicability of the HIPAA to mHealth apps [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref40">40</xref>], others suggested that the HIPAA might be applicable [<xref ref-type="bibr" rid="ref35">35</xref>]. If articles that used recommendations directly from private and/or public bodies, such as the US Federal Trade Commission or the UK Information Commissioner’s Office, are considered in this category, then the number of articles that contemplated laws goes up to 11 (46%). Additionally, data minimization is one of the main principles regarding processing personal data in the GDPR, meaning that data collection should be limited to processing purposes only. However, only 2 papers (8%) [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] analyzed the types of data collected by an app.</p>
        <p>Several articles in our review also analyzed whether communications were secured, and 8 articles (33%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] actually checked if they were. Moreover, 1 article (4%) [<xref ref-type="bibr" rid="ref15">15</xref>] brought to our attention that discrepancies between what the privacy policy states about app data transmission and the real data transmissions are not uncommon. By contrast, Huckvale et al did not observe any discrepancy [<xref ref-type="bibr" rid="ref38">38</xref>]. Nevertheless, future analyses of privacy policies could verify whether developers properly disclose the nature of app communications.</p>
        <p>Although the privacy policy is a common source of data to assess the privacy of apps, there are many challenges to address. The evaluation procedure needs to be straightforward by removing subjective and unclear assessments of privacy. It should also be supported by a legal framework, although that is not the current trend.</p>
      </sec>
      <sec>
        <title>Evaluation Criteria</title>
        <p>The criteria that have been used to assess the privacy of mHealth apps are very diverse. We have identified 21 items but, within each item, there are particularities that depend on the authors’ criteria. Moreover, as previously mentioned, in many cases, the criteria used to assess the items are not explained clearly enough, or they are not easily reproducible. Therefore, the list of different items and how they are evaluated never ends, and it is extremely subjective. Although the evaluations in this review are useful, we suggest a more objective privacy assessment.</p>
        <p>As an example, some articles searched for specific information in the privacy policy, such as whether the user is informed about other uses of their data, whereas other papers looked for this information in the app. We consider that it is possible to miss important information by searching in the wrong place. For instance, 2 articles (8%) [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] checked both elements—the privacy policy and the app—while 6 papers (25%) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>] only checked the app, with no reference to the privacy policy. In 4 papers (17%) [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref34">34</xref>] it was not clear whether it was the app or the privacy policy that was examined. Finally, 3 papers (13%) [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref39">39</xref>] used only the app privacy policy and the terms and conditions.</p>
        <p>One of the main issues created by the subjectivity of the evaluation criteria involves the nature of the items used. Sometimes the criteria are not clear enough. This issue may lead to different results when other users and/or developers assess privacy. New evaluation approaches should put special emphasis on defining clear and objective items to evaluate.</p>
      </sec>
      <sec>
        <title>Scoring Method</title>
        <p>A scoring method or scale to assess app privacy could be a key tool for systematically comparing apps. Many scoring methods were used in the included studies. Most of them are quite simple, with a methodology that consists of assigning a binary value to some defined items, but they have, nonetheless, proven to be effective in assessing privacy by providing a simple approach to comparing apps. A weighted score, which highlights the importance of some items over others, was also explored in 2 papers (8%).</p>
        <p>Despite the promising results derived from the use of a weighted score, further research must be conducted to identify the subjective relevance and importance of the different items perceived by consumers, patients, and experts, in order to assess the privacy of the apps. Further research must also be conducted aimed at defining common legal-based criteria to better assess the privacy of mHealth apps.</p>
      </sec>
      <sec>
        <title>Review Limitations</title>
        <p>This study has several limitations. Relevant studies may have been missed if they were published with a title or abstract in a language other than English, outside of the specified time frame, or in different databases than those that were used. Some studies may not be included due to the keywords chosen for the search string.</p>
        <p>Specifically, for this review, the absence of an existing taxonomy of the privacy components used for the assessment is also a limitation. Although we attempt to compensate for this limitation with our level of expertise and detailed knowledge, charting is still subjective.</p>
        <p>Finally, the different requirements implied by different types of apps shows that not all apps are equally sensitive to privacy risks, which suggests the possibility of analyzing how crucial privacy is according to the type of app. As we did not find any such existing classification system, we set this as a point for future research.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Privacy in mHealth apps has been determined based on an analysis of the app user interface, communications privacy, and privacy policy. Checking privacy in communications is usually very straightforward, with objective criteria for its assessment. When analyzing user interfaces and privacy policies, however, the criteria are very heterogeneous and less objective; this is especially true when analyzing privacy policies, which can lead to irreproducible results. In our opinion, it is very important to develop a more detailed assessment of privacy policies, so that the assessment frameworks may be utilized by subsequent users and lead to coherent results.</p>
        <p>Another important conclusion from this study is that there is a lack of analyses pertaining to the types of personal information collected by the apps. Minimization is one of the principles of the GDPR, so a greater effort should be made to analyze whether apps gather more personal information than is necessary.</p>
        <p>In short, despite great progress made through the scientific community’s awareness about the importance of privacy assessment of mHealth apps, there is still a long way to go. A positive step forward would be the creation of a scale or scoring system based on objective criteria, which would, therefore, be less open to interpretation. Another good development would be the use of a certain legal basis for such a scale and explaining in detail how to apply the evaluation criteria.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews).</p>
        <media xlink:href="mhealth_v8i7e18868_app1.docx" xlink:title="DOCX File , 49 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Search terms and strategies for each database.</p>
        <media xlink:href="mhealth_v8i7e18868_app2.docx" xlink:title="DOCX File , 13 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Charting table used for collecting data from the included studies.</p>
        <media xlink:href="mhealth_v8i7e18868_app3.docx" xlink:title="DOCX File , 20 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Included studies.</p>
        <media xlink:href="mhealth_v8i7e18868_app4.docx" xlink:title="DOCX File , 16 KB"/>
      </supplementary-material>
      <supplementary-material id="app5">
        <label>Multimedia Appendix 5</label>
        <p>Objects of assessment of the apps.</p>
        <media xlink:href="mhealth_v8i7e18868_app5.docx" xlink:title="DOCX File , 24 KB"/>
      </supplementary-material>
      <supplementary-material id="app6">
        <label>Multimedia Appendix 6</label>
        <p>App data extraction details.</p>
        <media xlink:href="mhealth_v8i7e18868_app6.docx" xlink:title="DOCX File , 89 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ACM</term>
          <def>
            <p>Association for Computing Machinery</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">IEEE</term>
          <def>
            <p>Institute of Electrical and Electronics Engineers</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">NHS</term>
          <def>
            <p>National Health Service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">PRISMA ScR</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was funded by the Cátedra Indra Sociedad Digital de la Universidad de Sevilla. EDZ receives funding and is supported by the V Plan Propio de Investigación de la Universidad de Sevilla, Spain.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>JB and JR led the scoping review, contributed to all phases of the study, and wrote the main body of the manuscript. ORR and AC participated in the definition of the review plan, monitored all phases of the review, participated in the decision making, and reviewed the manuscript. EDZ contributed to the data analysis and the discussion of the results and supported the manuscript writing.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sokolovska</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kocarev</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Integrating technical and legal concepts of privacy</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>26543</fpage>
          <lpage>26557</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2018.2836184</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thorarensen</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The processing of health information: Protecting the individual right to privacy through effective legal remedies</article-title>
          <source>Health Technol</source>
          <year>2017</year>
          <month>3</month>
          <day>7</day>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>401</fpage>
          <lpage>413</lpage>
          <pub-id pub-id-type="doi">10.1007/s12553-017-0184-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abed</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chavan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The challenges of institutional distance: Data privacy issues in cloud computing</article-title>
          <source>Sci Technol Soc</source>
          <year>2018</year>
          <month>12</month>
          <day>16</day>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>161</fpage>
          <lpage>181</lpage>
          <pub-id pub-id-type="doi">10.1177/0971721818806088</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mukkamala</surname>
              <given-names>RR</given-names>
            </name>
            <name name-style="western">
              <surname>Vatrapu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ordieres-Meré</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Accelerating health data sharing: A solution based on the Internet of Things and distributed ledger technologies</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>06</month>
          <day>06</day>
          <volume>21</volume>
          <issue>6</issue>
          <fpage>e13583</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/6/e13583/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13583</pub-id>
          <pub-id pub-id-type="medline">31172963</pub-id>
          <pub-id pub-id-type="pii">v21i6e13583</pub-id>
          <pub-id pub-id-type="pmcid">PMC6592507</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Regola</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chawla</surname>
              <given-names>NV</given-names>
            </name>
          </person-group>
          <article-title>Storing and using health data in a virtual private cloud</article-title>
          <source>J Med Internet Res</source>
          <year>2013</year>
          <month>03</month>
          <day>13</day>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>e63</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2013/3/e63/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2076</pub-id>
          <pub-id pub-id-type="medline">23485880</pub-id>
          <pub-id pub-id-type="pii">v15i3e63</pub-id>
          <pub-id pub-id-type="pmcid">PMC3636251</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Papageorgiou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Strigkos</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Politou</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alepis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Solanas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Patsakis</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy analysis of mobile health applications: The alarming state of practice</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>9390</fpage>
          <lpage>9403</lpage>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2018.2799522</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Demetzou</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Data Protection Impact Assessment: A tool for accountability and the unclarified concept of ‘high risk’ in the General Data Protection Regulation</article-title>
          <source>Comput Law Secur Rev</source>
          <year>2019</year>
          <month>11</month>
          <volume>35</volume>
          <issue>6</issue>
          <fpage>105342</fpage>
          <pub-id pub-id-type="doi">10.1016/j.clsr.2019.105342</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kao</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Liebovitz</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Consumer mobile health apps: Current state, barriers, and future directions</article-title>
          <source>PM R</source>
          <year>2017</year>
          <month>05</month>
          <volume>9</volume>
          <issue>5S</issue>
          <fpage>S106</fpage>
          <lpage>S115</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pmrj.2017.02.018</pub-id>
          <pub-id pub-id-type="medline">28527495</pub-id>
          <pub-id pub-id-type="pii">S1934-1482(17)30382-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <source>mHealth App Economics 2017: Current Status and Future Trends in Mobile Health. 7th edition</source>
          <year>2017</year>
          <month>11</month>
          <access-date>2020-03-24</access-date>
          <publisher-loc>Berlin, Germany</publisher-loc>
          <publisher-name>Research2Guidance</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://research2guidance.com/product/mhealth-economics-2017-current-status-and-future-trends-in-mobile-health/">https://research2guidance.com/product/mhealth-economics-2017-current-status-and-future-trends-in-mobile-health/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Exploring the far side of mobile health: Information security and privacy of mobile health apps on iOS and Android</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2015</year>
          <month>01</month>
          <day>19</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>e8</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2015/1/e8/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.3672</pub-id>
          <pub-id pub-id-type="medline">25599627</pub-id>
          <pub-id pub-id-type="pii">v3i1e8</pub-id>
          <pub-id pub-id-type="pmcid">PMC4319144</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Giunti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kool</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera Romero</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro Zubiete</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Exploring the specific needs of persons with multiple sclerosis for mHealth solutions for physical activity: Mixed-methods study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>02</month>
          <day>09</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>e37</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/2/e37/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.8996</pub-id>
          <pub-id pub-id-type="medline">29426814</pub-id>
          <pub-id pub-id-type="pii">v6i2e37</pub-id>
          <pub-id pub-id-type="pmcid">PMC5889817</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krebs</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Duncan</surname>
              <given-names>DT</given-names>
            </name>
          </person-group>
          <article-title>Health app use among US mobile phone owners: A national survey</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2015</year>
          <month>11</month>
          <day>04</day>
          <volume>3</volume>
          <issue>4</issue>
          <fpage>e101</fpage>
          <pub-id pub-id-type="doi">10.2196/mhealth.4924</pub-id>
          <pub-id pub-id-type="medline">26537656</pub-id>
          <pub-id pub-id-type="pii">v3i4e101</pub-id>
          <pub-id pub-id-type="pmcid">PMC4704953</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>BinDhim</surname>
              <given-names>NF</given-names>
            </name>
            <name name-style="western">
              <surname>Trevena</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Health-related smartphone apps: Regulations, safety, privacy and quality</article-title>
          <source>BMJ Innov</source>
          <year>2015</year>
          <month>03</month>
          <day>05</day>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>43</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1136/bmjinnov-2014-000019</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Minen</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Stieglitz</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Sciortino</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Privacy issues in smartphone applications: An analysis of headache/migraine applications</article-title>
          <source>Headache</source>
          <year>2018</year>
          <month>07</month>
          <volume>58</volume>
          <issue>7</issue>
          <fpage>1014</fpage>
          <lpage>1027</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29974470"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/head.13341</pub-id>
          <pub-id pub-id-type="medline">29974470</pub-id>
          <pub-id pub-id-type="pmcid">PMC6347475</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huckvale</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Larsen</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Assessment of the data sharing and privacy practices of smartphone apps for depression and smoking cessation</article-title>
          <source>JAMA Netw Open</source>
          <year>2019</year>
          <month>04</month>
          <day>05</day>
          <volume>2</volume>
          <issue>4</issue>
          <fpage>e192542</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://jamanetwork.com/journals/jamanetworkopen/fullarticle/10.1001/jamanetworkopen.2019.2542"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamanetworkopen.2019.2542</pub-id>
          <pub-id pub-id-type="medline">31002321</pub-id>
          <pub-id pub-id-type="pii">2730782</pub-id>
          <pub-id pub-id-type="pmcid">PMC6481440</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arksey</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>O'Malley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Scoping studies: Towards a methodological framework</article-title>
          <source>Int J Soc Res Methodol</source>
          <year>2005</year>
          <month>02</month>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1080/1364557032000119616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Lillie</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zarin</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Colquhoun</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Levac</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>MDJ</given-names>
            </name>
            <name name-style="western">
              <surname>Horsley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Weeks</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hempel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McGowan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hartling</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Aldcroft</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Garritty</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lewin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Godfrey</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Macdonald</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Langlois</surname>
              <given-names>EV</given-names>
            </name>
            <name name-style="western">
              <surname>Soares-Weiser</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Moriarty</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tunçalp</surname>
              <given-names>Ö</given-names>
            </name>
            <name name-style="western">
              <surname>Straus</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>PRISMA extension for Scoping Reviews (PRISMA-ScR): Checklist and explanation</article-title>
          <source>Ann Intern Med</source>
          <year>2018</year>
          <month>10</month>
          <day>02</day>
          <volume>169</volume>
          <issue>7</issue>
          <fpage>467</fpage>
          <lpage>473</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.acpjournals.org/doi/full/10.7326/M18-0850?url_ver=Z39.88-2003&#38;rfr_id=ori%3Arid%3Acrossref.org&#38;rfr_dat=cr_pub++0pubmed&#38;"/>
          </comment>
          <pub-id pub-id-type="doi">10.7326/M18-0850</pub-id>
          <pub-id pub-id-type="medline">30178033</pub-id>
          <pub-id pub-id-type="pii">2700389</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McHugh</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Interrater reliability: The kappa statistic</article-title>
          <source>Biochem Med</source>
          <year>2012</year>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>276</fpage>
          <lpage>282</lpage>
          <pub-id pub-id-type="doi">10.11613/BM.2012.031</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Richards</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Adhikari</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A review and comparative analysis of security risks and safety measures of mobile health apps</article-title>
          <source>Australas J Inf Syst</source>
          <year>2015</year>
          <month>11</month>
          <day>22</day>
          <volume>19</volume>
          <fpage>1</fpage>
          <lpage>18</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journal.acs.org.au/index.php/ajis/article/view/1210/678"/>
          </comment>
          <pub-id pub-id-type="doi">10.3127/ajis.v19i0.1210</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brüggemann</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hansen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Schiffner</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Serna</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ikonomou</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Rannenberg</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>An information privacy risk index for mHealth apps</article-title>
          <source>Privacy Technologies and Policy. APF 2016. Lecture Notes in Computer Science, vol 9857</source>
          <year>2016</year>
          <month>9</month>
          <day>3</day>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mense</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Steger</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sulek</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jukic-Sunaric</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mészáros</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Analyzing privacy risks of mHealth applications</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2016</year>
          <volume>221</volume>
          <fpage>41</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="medline">27071873</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hutton</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Price</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>McCormick</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bandara</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Hatzakis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Meadows</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nuseibeh</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Assessing the privacy of mHealth apps for self-tracking: Heuristic evaluation approach</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>10</month>
          <day>22</day>
          <volume>6</volume>
          <issue>10</issue>
          <fpage>e185</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/10/e185/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9217</pub-id>
          <pub-id pub-id-type="medline">30348623</pub-id>
          <pub-id pub-id-type="pii">v6i10e185</pub-id>
          <pub-id pub-id-type="pmcid">PMC6231850</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zapata</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández Niñirola</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Assessing the privacy policies in mobile personal health records</article-title>
          <source>Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2014)</source>
          <year>2014</year>
          <conf-name>36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2014)</conf-name>
          <conf-date>August 26-30, 2014</conf-date>
          <conf-loc>Chicago, IL</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>4956</fpage>
          <lpage>4959</lpage>
          <pub-id pub-id-type="doi">10.1109/EMBC.2014.6944736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>PL</given-names>
            </name>
            <name name-style="western">
              <surname>Mandl</surname>
              <given-names>KD</given-names>
            </name>
          </person-group>
          <article-title>Availability and quality of mobile health app privacy policies</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2015</year>
          <month>04</month>
          <volume>22</volume>
          <issue>e1</issue>
          <fpage>e28</fpage>
          <lpage>e33</lpage>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2013-002605</pub-id>
          <pub-id pub-id-type="medline">25147247</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2013-002605</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leigh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ouyang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mimnagh</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Effective? Engaging? Secure? Applying the ORCHA-24 framework to evaluate apps for chronic insomnia disorder</article-title>
          <source>Evid Based Ment Health</source>
          <year>2017</year>
          <month>11</month>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>e20</fpage>
          <pub-id pub-id-type="doi">10.1136/eb-2017-102751</pub-id>
          <pub-id pub-id-type="medline">28947676</pub-id>
          <pub-id pub-id-type="pii">eb-2017-102751</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baumel</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Faber</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mathur</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Kane</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Muench</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Enlight: A comprehensive quality and therapeutic potential evaluation tool for mobile and web-based eHealth interventions</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>03</month>
          <day>21</day>
          <volume>19</volume>
          <issue>3</issue>
          <fpage>e82</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/3/e82/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.7270</pub-id>
          <pub-id pub-id-type="medline">28325712</pub-id>
          <pub-id pub-id-type="pii">v19i3e82</pub-id>
          <pub-id pub-id-type="pmcid">PMC5380814</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bachiri</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Idri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the privacy policies of mobile personal health records for pregnancy monitoring</article-title>
          <source>J Med Syst</source>
          <year>2018</year>
          <month>06</month>
          <day>29</day>
          <volume>42</volume>
          <issue>8</issue>
          <fpage>144</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-018-1002-x</pub-id>
          <pub-id pub-id-type="medline">29959535</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-018-1002-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de las Aguas Robustillo Cortés</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cantudo Cuenca</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Morillo Verdugo</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Calvo Cidoncha</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>High quantity but limited quality in healthcare applications intended for HIV-infected patients</article-title>
          <source>Telemed J E Health</source>
          <year>2014</year>
          <month>08</month>
          <volume>20</volume>
          <issue>8</issue>
          <fpage>729</fpage>
          <lpage>735</lpage>
          <pub-id pub-id-type="doi">10.1089/tmj.2013.0262</pub-id>
          <pub-id pub-id-type="medline">24849001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Quevedo Rodríguez</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wägner</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Mobile phone applications for diabetes management: A systematic review</article-title>
          <source>Endocrinol Diabetes Nutr</source>
          <year>2019</year>
          <month>05</month>
          <volume>66</volume>
          <issue>5</issue>
          <fpage>330</fpage>
          <lpage>337</lpage>
          <pub-id pub-id-type="doi">10.1016/j.endinu.2018.11.005</pub-id>
          <pub-id pub-id-type="medline">30745121</pub-id>
          <pub-id pub-id-type="pii">S2530-0164(19)30002-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Knorr</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Aspinall</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wolters</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>On the privacy, security and safety of blood pressure and diabetes apps</article-title>
          <source>Proceedings of the IFIP (International Federation for Information Processing) International Conference on ICT (Information and Communications Technology) Systems Security and Privacy Protection</source>
          <year>2015</year>
          <month>5</month>
          <day>9</day>
          <conf-name>IFIP (International Federation for Information Processing) International Conference on ICT (Information and Communications Technology) Systems Security and Privacy Protection</conf-name>
          <conf-date>May 26-28, 2015</conf-date>
          <conf-loc>Hamburg, Germany</conf-loc>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>571</fpage>
          <lpage>584</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-319-18467-8_38</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cruz Zapata</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández Niñirola</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy and security in mobile personal health records for Android and iOS [Article in Spanish]</article-title>
          <source>RISTI (Revista Ibérica de Sistemas e Tecnologias de Informação)</source>
          <year>2014</year>
          <month>6</month>
          <day>1</day>
          <access-date>2020-06-16</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.scielo.mec.pt/pdf/rist/n13/n13a04.pdf">http://www.scielo.mec.pt/pdf/rist/n13/n13a04.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bondaronek</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Alkhaldi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Slee</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hamilton</surname>
              <given-names>FL</given-names>
            </name>
            <name name-style="western">
              <surname>Murray</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Quality of publicly available physical activity apps: Review and content analysis</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>03</month>
          <day>21</day>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>e53</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/3/e53/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9069</pub-id>
          <pub-id pub-id-type="medline">29563080</pub-id>
          <pub-id pub-id-type="pii">v6i3e53</pub-id>
          <pub-id pub-id-type="pmcid">PMC5885062</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Loughlin</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Neary</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Adkins</surname>
              <given-names>EC</given-names>
            </name>
            <name name-style="western">
              <surname>Schueller</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>Reviewing the data security and privacy policies of mobile apps for depression</article-title>
          <source>Internet Interv</source>
          <year>2019</year>
          <month>03</month>
          <volume>15</volume>
          <fpage>110</fpage>
          <lpage>115</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2214-7829(18)30046-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.invent.2018.12.001</pub-id>
          <pub-id pub-id-type="medline">30792962</pub-id>
          <pub-id pub-id-type="pii">S2214-7829(18)30046-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC6371412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Adhikari</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Richards</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy issues related to the use of mobile health apps</article-title>
          <source>Proceedings of the 25th Australasian Conference on Information Systems</source>
          <year>2014</year>
          <month>12</month>
          <conf-name>25th Australasian Conference on Information Systems</conf-name>
          <conf-date>December 8-10, 2014</conf-date>
          <conf-loc>Auckland, New Zealand</conf-loc>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://openrepository.aut.ac.nz/bitstream/handle/10292/8117/acis20140_submission_12.pdf?sequence=1&#38;isAllowed=y"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aliasgari</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Black</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Yadav</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Security vulnerabilities in mobile health applications</article-title>
          <source>Proceedings of the IEEE Conference on Applications, Information &#38; Network Security</source>
          <year>2018</year>
          <month>11</month>
          <conf-name>IEEE Conference on Applications, Information and Network Security</conf-name>
          <conf-date>November 21-22, 2018</conf-date>
          <conf-loc>Langkawi, Malaysia</conf-loc>
          <pub-id pub-id-type="doi">10.1109/ains.2018.8631464</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mense</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Urbauer</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Sauermann</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wahl</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Simulation environment for testing security and privacy of mobile health apps</article-title>
          <source>Proceedings of the Symposium on Modeling and Simulation in Medicine</source>
          <year>2016</year>
          <month>04</month>
          <day>3</day>
          <conf-name>Symposium on Modeling and Simulation in Medicine</conf-name>
          <conf-date>April 3-6, 2016</conf-date>
          <conf-loc>Pasadena, CA</conf-loc>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.22360/springsim.2016.msm.008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The complexity of mental health app privacy policies: A potential barrier to privacy</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>07</month>
          <day>30</day>
          <volume>6</volume>
          <issue>7</issue>
          <fpage>e158</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/7/e158/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9871</pub-id>
          <pub-id pub-id-type="medline">30061090</pub-id>
          <pub-id pub-id-type="pii">v6i7e158</pub-id>
          <pub-id pub-id-type="pmcid">PMC6090172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huckvale</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Prieto</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Tilney</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Benghozi</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Car</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Unaddressed privacy risks in accredited health and wellness apps: A cross-sectional systematic assessment</article-title>
          <source>BMC Med</source>
          <year>2015</year>
          <month>09</month>
          <day>07</day>
          <volume>13</volume>
          <fpage>214</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-015-0444-y"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-015-0444-y</pub-id>
          <pub-id pub-id-type="medline">26404673</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-015-0444-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC4582624</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Robillard</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Sporn</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ta</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nadler</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Availability, readability, and content of privacy policies and terms of agreements of mental health apps</article-title>
          <source>Internet Interv</source>
          <year>2019</year>
          <month>09</month>
          <volume>17</volume>
          <fpage>100243</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6430038/pdf/main.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.invent.2019.100243</pub-id>
          <pub-id pub-id-type="medline">30949436</pub-id>
          <pub-id pub-id-type="pii">S2214-7829(18)30016-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC6430038</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Naveed</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gunter</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Nahrstedt</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Security concerns in Android mHealth apps</article-title>
          <source>Proceedings of the American Medical Informatics Association 2014 Annual Symposium (AMIA 2014)</source>
          <year>2014</year>
          <conf-name>American Medical Informatics Association 2014 Annual Symposium (AMIA 2014)</conf-name>
          <conf-date>November 15-19, 2014</conf-date>
          <conf-loc>Washington, DC</conf-loc>
          <fpage>645</fpage>
          <lpage>654</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4419898/pdf/1969977.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
