Search Articles

View query in Help articles search

Search Results (1 to 10 of 241 Results)

Download search results: CSV END BibTex RIS


Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Observational Study

Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Observational Study

App needs to work well App not working App requires redownloading Biometric authentication Log-in and password issues App data security App not working App registration process Backup option needed in case app fails Cell signal issues Concerns over alignment of app with privacy standards Patient data privacy Reliability of app technology Speed of ECGc transmission Technology failure User log-in and password issues Wi-Fi signal issues App data security App not working Backup option needed in case app fails Cell

Katelyn J Cullen, Hassan Mir, Madhu K Natarajan, Marija Corovic, Karen Mosleh, Jacob Crawshaw, Mathew Mercuri, Hassan Masoom, JD Schwalm

JMIR Mhealth Uhealth 2025;13:e60173

School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites

School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites

Under the Family Educational Rights and Privacy Act, schools can legally provide identifiable student information to contractors to perform school personnel functions [18]. Large language models can analyze a large amount of student online activity (ie, emails, web searches, direct messages, or private social media browsing and posting) if school administrators give that level of access to student data to online surveillance companies.

Alison O'Daffer, Wendy Liu, Cinnamon S Bloss

J Med Internet Res 2025;27:e71998

Responsible Governance of Tribal Public Health Data: Data Sharing Ethics and Common Challenges in the US Public Health System

Responsible Governance of Tribal Public Health Data: Data Sharing Ethics and Common Challenges in the US Public Health System

Even with limited access to local, state, and federal public health data systems, tribal public health authorities were able to carry out significant actions to protect the health of their communities during the COVID-19 pandemic and protect individuals most at risk of infection while respecting their privacy rights, pursuant to the Health Information Portability and Accountability Act (HIPAA) [6].

Alec J Calac, Luis R Gasca, William H Swain

J Med Internet Res 2025;27:e77249

Managerial Challenges in Digital Health: Bibliometric and Network Analysis

Managerial Challenges in Digital Health: Bibliometric and Network Analysis

Cluster 1 included many papers that used the technology acceptance model (TAM), along with papers addressing information privacy (Table 5). Top 3 papers from cluster 1 according to their degree centrality. a Last updated on February 26, 2024. This content analysis was strengthened by an independent keyword analysis (Table 6).

Quentin Garçon, Benjamin Cabanes, Cédric Denis-Rémis

J Med Internet Res 2025;27:e57980

Rectifying Genocidal Data Stewardship: A Commentary on Ethical and Legal Obligations for Sharing Data With Tribal Entities

Rectifying Genocidal Data Stewardship: A Commentary on Ethical and Legal Obligations for Sharing Data With Tribal Entities

We use the phrase data science broadly as encompassing interdisciplinary quantitative and qualitative approaches for managing data (eg, storage, access, and knowledge generation) that requires consideration for ethics, privacy, security, and downstream effects [4].

Oliver Bear Don't Walk IV, Lauren W Yowelunh McLester-Davis, Susan Brown Trinidad

J Med Internet Res 2025;27:e77946

A System Model and Requirements for Transformation to Human-Centric Digital Health

A System Model and Requirements for Transformation to Human-Centric Digital Health

Privacy is a vague, emotional, and contextual concept with social and technical dimensions [44]. It is dynamic because people’s privacy expectations and needs vary situationally. Privacy is also one of the human rights. The UNDHR expresses that “No one shall be subject to arbitrary interference with his privacy” [35]. Autonomy and privacy are closely interconnected. According to Citron [45], without personal autonomy, there is hardly personal privacy, and privacy ensures dignity.

Pekka Ruotsalainen, Bernd Blobel

J Med Internet Res 2025;27:e68661

Ensuring General Data Protection Regulation Compliance and Security in a Clinical Data Warehouse From a University Hospital: Implementation Study

Ensuring General Data Protection Regulation Compliance and Security in a Clinical Data Warehouse From a University Hospital: Implementation Study

The aim of the GDPR is to protect citizens’ privacy in the context of widespread digitization while facilitating the circulation of data. It emphasizes transparency in processing health data and enhances patients’ control over their use, which are widely regarded as positive steps. However, the recent literature underscores several challenges in applying GDPR to the reuse of health data for research.

Christine Riou, Mohamed El Azzouzi, Anne Hespel, Emeric Guillou, Gouenou Coatrieux, Marc Cuggia

JMIR Med Inform 2025;13:e63754

Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study

Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study

Ethical, privacy, and regulatory constraints preclude the transfer of PHI across the public domain through widely used proprietary LLM services (eg, Chat GPT, Gemini, and Claude) that can generate automated responses for MQA. However, significant health care resources (ie, utilization fees and institutional agreements) would be required to ensure the protection of PHI while accessing the largest state-of-the-art models such as GPT4 via a private cloud service provider (eg, Microsoft Azure Open AI).

Denise Lee, Akhil Vaid, Kartikeya M Menon, Robert Freeman, David S Matteson, Michael L Marin, Girish N Nadkarni

JMIR Form Res 2025;9:e64544

Dying in Darkness: Deviations From Data Sharing Ethics in the US Public Health System and the Data Genocide of American Indian and Alaska Native Communities

Dying in Darkness: Deviations From Data Sharing Ethics in the US Public Health System and the Data Genocide of American Indian and Alaska Native Communities

Legal, relational, and technical barriers can impede access to the data that enable public health agencies to act for the benefit of their communities. [1-3] Most of these barriers are at least indirectly associated with a need to protect the privacy of data subjects. Public health data custodians are acutely aware of these risks, but sometimes zealous overprotection of individuals’ privacy can harm communities [4].

Cason D Schmit, Meghan Curry O’Connell, Sarah Shewbrooks, Charles Abourezk, Fallon J Cochlin, Megan Doerr, Hye-Chung Kum

J Med Internet Res 2025;27:e70983

Participant Evaluation of Blockchain-Enhanced Women’s Health Research Apps: Mixed Methods Experimental Study

Participant Evaluation of Blockchain-Enhanced Women’s Health Research Apps: Mixed Methods Experimental Study

As these large datasets or “big data” grow in scope, they also become more susceptible and vulnerable to privacy risks (eg, data breaches, privacy violations, and unauthorized access) that can cause undue harm to participants, organizations, and society [5].

Madelena Y Ng, Jodi Halpern, Olivia Shane, Tina Teng, Michael Nguyễn, Casey Ryan Alt, Anaïs Barthe Leite, Sean Moss-Pultz, Courtney R Lyles, Coye Cheshire

JMIR Mhealth Uhealth 2025;13:e65747