<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>The International Health Data Workshop, June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Prospective research topics towards preserving electronic health records in decentralised content-addressable storage networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Toomas Klementi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kristian Juha Ismo Kankainen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gunnar Piho</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Peeter Ross</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Health Technologies, TalTech</institution>
          ,
          <addr-line>Akadeemia Str 15A, 12618 Tallinn</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Software Science</institution>
          ,
          <addr-line>TalTech, Akadeemia Str 15A, 12618 Tallinn</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>1</volume>
      <fpage>9</fpage>
      <lpage>24</lpage>
      <abstract>
        <p>Data used in the digital economy are increasingly fragmented and scattered across data stores, with little or no interoperability between them. This makes reusing and analysing data dificult. The problem is especially salient in health care, where increasing volumes of data in diferent electronic formats are available. Reusing these healthcare-related data in various scientific analyses and research will bring about enormous benefits for individual patients and society. However, healthcare data re-use potential remains to be fully exploited because of semantic and technical data heterogeneity, mainly unstructured data nature as well as data sensitivity and protection reasons. In this workshop position paper, we present our preliminary results on the possibility to eliminate the barriers between health data silos using decentralised content-addressable storage networks for preserving electronic health records. We propose an innovative reference architecture for moving health data from the control of healthcare institutions to the complete control of data owners. We briefly evaluate the feasibility of the proposed solution by analysing both primary and secondary use scenarios of health data and sketch some preliminary research topics on data security, privacy, integrity, transparency and interoperability for the primary and secondary uses of electronic health records in decentralised content-addressable storage networks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;EHR</kwd>
        <kwd>electronic health record</kwd>
        <kwd>secondary use</kwd>
        <kwd>reference architecture</kwd>
        <kwd>content-addressable storage networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Over the past decades, the healthcare industry has seen the wide adoption and use of electronic
health record (EHR) systems. In 2016, the WHO reported that 27 WHO Member States in Europe
have a national EHR system, 18 of which have legislation governing its use [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This means that
an increasing amount of health data is available in electronic format.
      </p>
      <p>
        Reusing health data could potentially be beneficial not only for providing immediate care for
the patient but also for the greater good of society. PwC [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] was likely one of the first pioneers
to highlight the importance of the secondary use of health data in medicine and bio-informatics.
Routine clinical data are considered precious [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and their secondary use is seen to be beneficial
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for policy-makers, public health oficers, scientists, clinicians, citizens and industry.
      </p>
      <p>
        Although the need for health data reuse is widely recognised, actual progress in that area
has been moderate. The reasons for this are the vendor-specific proprietary database schemes
used by EHR systems, semantic heterogeneity and the sensitive nature of clinical data that
sets legal and ethical restrictions on sharing. As stated in a survey from 2018 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], due to the
semantic heterogeneity of health data, we still do not have a unified approach and use the
divide-and-conquer method instead. The review [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] conducted a year later concludes that no
big-data analytics will happen without optimised data sharing and reuse, which we still lack
despite diferences in interoperability standards in the medical domain. The authors of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
conclude that it is not enough to require data to be shared – sharing must be made easy, feasible
and accessible, too.
      </p>
      <p>As sharing health data is not an easy task, can be costly and may bring about several data
privacy and security risks, the institutions hosting the EHR data are generally not motivated
and in most cases cannot even share the data. Therefore, all the data that have been stored in
EHR systems largely stay inside the boundaries of the institutions that have collected them.
This situation can be described (Figure 1) as the ’health data silo problem’.</p>
      <p>
        The silo problem causes issues both in primary and secondary health data usage. In the
contemporary and mobile world, it is common practice for a patient to visit multiple healthcare
service providers during their lifetime, leaving a digital trace in each of them. This results in
patient data being scattered across numerous data silos. Each of these data silos is incomplete
and may contain inconsistencies. Keeping the fragmented data synchronised between all the
institutions that record EHR data is complex and is often based on national e-health systems like
the one in Estonia [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and those in other countries [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. At the same time, the lack of common
identification schemes makes matching the data in diferent databases impossible. Even if
such a scheme existed, we still face the problem of completeness [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Getting a complete and
comprehensive picture of patient data is challenging. This need is further emphasised as the
focus of health care shifts from medical care towards preventing medical care. The increasing
volumes of information are not created by the healthcare institutions themselves; rather they
are recorded and gathered by various third parties, e.g. wearable devices, patient portals. Data
produced this way are usually stored in third party proprietary databases, thus only increasing
the data silo problem.
      </p>
      <p>
        We increasingly find ourselves in a situation where the need for a personal data repository
under the owner’s complete and sole control is obvious. These data can then be shared based
on the requirements. Even if we were somehow able to guarantee perfect interoperability,
traditional EHR systems are insuficient to deal with it. Furthermore, the entire rationale of
hosting personal data at the clinical service provider is questionable. Since the data in the
EU, according to the GDPR, legally belongs to the patient [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], why should it be stored at the
hospital in the first place? A similar issue has been highlighted by the NGI DAPSI open call
for data portability organisers [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]: "As users of the internet, we sometimes feel as if our data is
no longer under our own control. When some online service conveniently stores our data for us
without even asking, it often turns out impossible to get it out in one piece later on. That is a rather
hefty problem, if you consider how we do online these days. And it becomes increasingly urgent
if you want to actually stop using a service – for instance because you realise that the company
is seriously violating your privacy, doing business in an unethical way, overcharging you or just
because you run into serious limitations of the service"
      </p>
      <p>
        A more natural solution proposes to keep the master copy of the complete data set close to the
patient. In other words, instead of health institution-controlled EHR data, we propose a holistic,
person-controlled, life-long electronic health record containing health data from various sources
and any other health-related data of the person. Such a personal life-long electronic health
record should be under the complete control of the person, with the ability to share it with
healthcare service providers and other actors, when necessary. The challenges to creating such a
life record are formidable. Since the main requirement is keeping the data private and under the
complete control of the owner, an obvious candidate for such a store would be a local database
on a personal smart device or desktop. Indeed, such solutions have been suggested, for instance,
by the InteropEHRate project [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Although feasible, the proposed solution is far from ideal
because of the risk of data loss in the event said personal device gets broken or lost.
      </p>
      <p>
        Another solution has been proposed by the Solid Project [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The idea is to create a protocol
that lets individuals store their data on the Internet in personal repositories or ’pods’. The
disadvantage of this approach is the dependency on pod providers, over which the owner
of the data has no control. Cloud databases are another candidate for the solution, but in
the global context, it becomes unfeasible because of the enormous technical dificulties and
risks associated with a database of such scale. The question is: who would host such a global
health data cloud database? The latter would likely cause an insurmountable problem in terms
of political agreement. A unique paradigm is needed – a solution that guarantees privacy,
preservation, integrity, scalability and shareability and has no central control. Data silos must
be dissolved, and data must be given back to their legal owners. In other words, the data
owner must be the sole controller of their own data. Decentralised content-addressable storage
networks may ofer the solution we are looking for. To democratise data is a big challenge in
contemporary society [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>The rest of the paper is organised as follows. In Section 2, we provide an overview of
decentralised content-addressable networks. Then, in Section 3, we present the possible
primary and secondary use scenarios of patient EHR data in decentralised content-addressable
networks. Next, in Section 4, we phrase the advantages of using EHR data in decentralised
content-addressable networks. In Section 5, we draft the possible research topics with respect
to patient EHR data in decentralised content-addressable networks. Finally, Section 6 concludes
the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Content-addressable networks</title>
      <p>One way to overcome the silo problem described is to use the nascent technology of decentralised
content-addressable storage. To give an informal description of how it works, consider a paper
shredder that works both ways – not only can it split a document into multiple tiny pieces, but
it can also ’glue’ the document back together given these original pieces. If we have a document
that we want to store securely, we will put it through such a shredder and give each piece to
a diferent person to keep. When we need to retrieve the document, we ask each person to
give us back their piece and run them through the shredder ’backwards’ to retrieve the original
document. This guarantees privacy because no person other than the owner ever sees the full
document, yet together the group acts as a document keeper.</p>
      <p>A decentralised content-addressable network is a peer-to-peer network that operates in a
very similar way – a piece of data that needs to be stored on the network is split into multiple
pieces and each piece is given to a diferent node to store. For additional security, each piece
can be individually encrypted, thus making it impossible for a node to even see the tiny piece
of information it is storing. It is worth noting that nodes on such a network need not be trusted.
The only thing expected of them is that they return the pieces they were given when asked to
do so – that is, they adhere to the protocol. This is something that can be tested, with failing
nodes being excluded from the network.</p>
      <p>The network is decentralised in the sense that it lacks central authority. Each individual node
is completely independent; it is the network as a whole that exposes the desired characteristics.</p>
      <p>
        There are several decentralised content-addressable storage networks currently available.
Examples are IPFS [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], Swarm [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], Storj [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and SIA [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Each of these have their own
specifics; some of them probably cannot be called truly decentralised as they are operated
centrally by private companies, but their fundamental technical operating principles are similar.
      </p>
      <p>
        More precisely, a decentralised content-addressable storage network is a peer-to-peer network
of nodes running open-source software that implements the network protocol. Each node is
assigned an overlay address (as opposed to its underlay address, normally an IP address) from a
certain address space, for instance 256-bit integers, and a metric is defined on the node address
space. Often the Kademlia [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] XOR metric is used, which defines the distance between two
nodes as a result of XOR-ing their overlay addresses and interpreting the result as an unsigned
integer. When a piece of data, such as a file, is uploaded to such a network, it is split into
multiple small chunks and a hash of each chunk is calculated belonging to the same value space
as node overlay addresses. The distance between a chunk and a node can then be defined as the
Kademlia distance between the node address and the hash value of the chunk. The network
stores each chunk at its closest node. The chunk hashes themselves are organised in a Merkle
tree that itself is stored on the network following the same rules as data chunks. The root hash
of the tree becomes the hash of the data (file). Therefore, only the node that uploads the data
sees the full copy; every other node in the network sees only the chunk(s) it stores. Download
happens in the opposite direction – first the chunks comprising the Merkle tree are downloaded,
followed by the download of data chunks and reassembly of the original file. Chunks can
optionally be encrypted before hashing, in which case it is practically impossible for any node
to discover either the content or the owner of the chunk it stores. If the upload/download node
is under the full control of the data owner, the privacy of the data is guaranteed despite being
stored in a network of possibly untrusted nodes.
      </p>
      <p>Since data on a decentralised content-addressable network are addressed by their hash, their
integrity is guaranteed. Each node downloading a chunk can easily verify the integrity of
its content by computing the hash. Content addressability also implies immutability – if the
content of a chunk changes, so does its hash, and the network treats it as new data. This creates
a natural versioning scheme where existing data is never overwritten. This versioning happens
without duplication – chunks with unchanged content are never copied because their hash
remains unchanged.</p>
      <p>As nodes are free to join and leave the network at will, the network protocol should include
measures to guarantee suficient redundancy. This can be achieved by several means, but a
simple method is to define the neighborhood of responsibility for each node as a sphere in the
Kademlia address space, with radius r and the node’s overlay address as its center. Each chunk
would be stored not only at its closest node but also on all nodes belonging to the responsibility
neighborhood of its closest node. Given that the churn rate of the network (def) is known, it is
possible to lessen the probability of the loss of a data chunk as a result of churn by selecting
suficiently large r.</p>
      <p>As long as the hash and encryption key (hashkey) are kept secret, data stored on the network
remain under the sole control of the owner. The owner can give access to the data by sharing
the hashkey. In the context of secondary use of health data, it is likely that the owner would not
want to share the complete data, but perhaps a pseudonymised subset. This can be achieved, for
instance, by locally running software that creates a special pseudonymised branch of the full
dataset. By sharing the hashkey to that special branch, the user can share their pseudonymised
data with anybody they wish. This efectively means sharing only a snapshot of the data. Any
future changes to the original data remain private; they will not be visible in the snapshot until
explicitly shared.</p>
      <p>For such a network to be viable, a solid incentivisation scheme for node operators is needed.
The most natural and versatile scheme is financial compensation. Users of the network would
pay a certain amount for their data stored by the network, and node operators would get paid
for their services. Ideally, any user of the network would also be running a node to securely
interact with the network and to ofset the costs of using its services at least partially.</p>
      <p>It is also possible for any user to run a multitude of nodes as an independent revenue source.
Existing implementations of decentralised content-addressable storage networks use either
cryptographic tokens or fiat currency as their incentivisation mechanisms.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Primary and secondary use</title>
      <p>We assume the primary use of health data when the use of data is associated with the health
care and treatment of a person. If this data is used for any generalisations and analyses, we are
talking about the secondary use of data.</p>
      <p>In the primary usage scenario (Figure 2), all personal health data of citizens is stored on
the decentralised content addressable network. The hashkey of the data is known only to the
owner, thus putting the data under the sole control of the patient. During a visit to a hospital,
physician, etc., the patient’s data (either in full or in part) are made available to the service
provider, either by disclosing the hashkey or possibly by exposing the data through an interface
like HL7 FHIR. In the latter case, the hashkey never gets revealed. The service provider can
interact with the data by reading them, modifying them or appending new data to them. When
changes are written back to the storage, a new version branch is created with a diferent hash
value, as described earlier. The patient confirms the changes by remembering this new hash
value. The mechanism also protects the data from modification by unauthorised users should
the hashkey be unintentionally disclosed. The hash of unauthorised modifications would not be
remembered and the changes efectively lost.</p>
      <p>Once the service provider has finished interacting with the data, it will delete them from
its computer system and forget the hashkey. Of course, the service provider can and probably
will record at least part of the data from the interaction with the patient in its own information
system for business or other purposes. This may include personally identifiable data as long as
it complies with legal restrictions. Efectively, the decentralised personal data act as a digital
notebook the patient always carries. It is natural to assume that data contained in such a
notebook is not limited to specific health data but includes all data on the subject gathered from
various sources over the course of their lifetime. Instead of a health record, such data set could
be called the life record of the person.</p>
      <p>
        Secondary use (Figure 2) of data is any use of data outside the primary (original) use [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
Secondary use of clinical data is a fast-growing field towards high-quality health care, improved
healthcare management, reduced healthcare costs, population health management and efective
clinical research [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Smart homes [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], clinical research [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], diagnosis [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], supporting
elderly persons [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] and real-time fraud detection in a medical benefit [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] are some of the few
reported cases in which clinical and health data are reused.
      </p>
      <p>
        However, according to a systematic analysis of literature conducted by Edmondson and
Reimer [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], the four main challenges related to the secondary use of medical data are as follows:
(a) insuficient data quality (completeness, correctness and currency); (b) data processing issues
(extraction and transformation); (c) compliance with data protection requirements; and (d)
limited data generalisation possibilities.
      </p>
      <p>
        A case study [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] conducted in University Medical Center Utrecht (UMCU) in the Netherlands
concludes that a modern technical infrastructure for reusing EHR data requires features for
supporting (1) integrating data sources, (2) data preprocessing, (3) data storage, (4) collaboration
and documentation, (5) integration with various software and tooling packages, (6) repeatability
enhancement, (7) privacy and security enhancement, (8) data processing automation and (9)
applications analysis.
      </p>
      <p>By default, all personal health data in decentralised content-addressable storage networks
are private, since only the owner knows the hashkey. If the data owner wants to share data,
possibly for profit or charitable or other reasons, it is enough to make the relevant hashkey
known to the third parties. However, it might not always be the case that a person would like
to share identifiable personal data, even though a person has the full right to publish them
according to data legislation.</p>
      <p>For anonymisation, data owners of data in decentralised content-addressable storage networks
may locally run software that deletes identifiable attributes. Therefore, a data-owning person
creates an anonymised version of their health data. This modified version of data constitutes a
separate branch with its unique hashkey, and by sharing this hashkey, the anonymised data can
be published while the original version remains private.</p>
      <p>Data shared in this fashion are cannot be considered readily usable for analysis in a unified
way with the health data of others. However, this interoperability and primarily semantic
interoperability issue is also an issue with the health data in data silos, despite the vast number
of healthcare-related interoperability standards [31] and solutions [32].</p>
      <p>Therefore, an indexing service needs to be created to gather the data shared by their
owners and present them in a harmonious queryable layout. Such an indexing service could be
considered a ’health data Google’.</p>
      <p>An essential aspect of sharing data for secondary use is incentivisation. In the 21st century,
data are the most valuable commodity and people who share them should receive fair
compensation. Likewise, it would be natural for consumers to pay for the data they use. That fee could
then be shared by the owner of the data and the indexing service provider. A variety of business
models and compensation packages can be considered for payment for the secondary use of the
person’s health data , like health insurance, citizen’s income or simply an ordinary purchase
and sale transaction.</p>
      <p>A particular case of the secondary use of health data is the use of these data in a health
emergency. It is possible to imagine each citizen having a specific branch of personal health
data (e.g. patient summary [33]) containing all of the relevant information for an emergency
case. The person might carry the hashkey for said data on a bracelet, on a chip card, in a smart
app or in another form. In the event of an emergency anywhere in the world, these emergency
health data containing information on medications, allergies, etc. will become immediately
available to anybody with access to the hashkey.</p>
      <p>An exciting option is to preserve health data in decentralised content-addressable storage
networks not in personalised form but in anonymised form. For instance, we can use a person’s
age instead of dates and times when recording a health-related event or when conducting a
measurement – if necessary, even to an accuracy of seconds or milliseconds from the time the
person was born. Therefore, in this theoretically possible scenario, all people are born on the 1
January 0001.</p>
      <p>Using a similar distance pattern analogously to the anonymisation of dates and times in
health data, it is also possible to anonymise locations (geographic addresses). Hence, similarly to
the anonymisation of dates and times, in the anonymisation of locations, all persons, according
to anonymised EHR data, are born at location 0.0, and every other location in their EHR data is
a vector from that person’s birth location to a specified location. Consequently, all locations in
the person’s EHR data are anonymised; only by knowing a person’s actual place of birth can
these anonymised locations can be converted to real locations.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Advantages of EHR decentralisation</title>
      <p>In this section, we enumerate the advantages of decentralised content-addressable networks
and the reasons they should be used to preserve people’s EHR data.</p>
      <p>1. Data owners have full and exclusive control of their data. Only the person who knows
the hashkey of the data can access them.
2. All of the health data of a person are stored decentrally in one logical place. Data are
always complete and the problem of data fragmentation is eliminated.
3. Data owners have full control over which data they want to share with third parties.</p>
      <p>Multiple data sharing schemes can be envisioned.
4. Since data are addressed by their hash value, their integrity is guaranteed. Nodes of the
network can easily verify the content of downloaded data by computing their hash and
comparing it to the address.
5. Full versioning history is preserved. Every modification creates a new version of the data
set with a diferent hash value. The old version remains intact and is addressable with
the old value.
6. Data are protected against accidental loss. Decentralised networks ofer suficient
redundancy, minimising the chance of data loss even in the face of a high churn rate (existing
nodes leaving and new nodes joining the network).
7. Data de-duplication. Content addressability means that only a single (logical) copy of the
same data exists on the network.
8. Global reach. Decentralised networks have no geographical limits. To access the data,
only network connectivity and knowledge of the hashkey are needed.
9. Elimination of single point of failure. By design, the failure of a single node or even
multiple nodes has no efect on the function of the network as a whole.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Main challenges and prospective research topics</title>
      <p>
        A huge number of articles in medical informatics related to the secondary use of routine clinical
EHR data are about how to get structured data from unstructured medical texts; how to make
personalised medical data anonymous or pseudonymous or how to get consent to use those
data; how to integrate data from separate data sources to achieve semantic interoperability;
or how to ensure data quality in a secondary analysis. As stated in a survey [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], due to the
semantic heterogeneity of health data, we still do not have a unified approach and use the
divide-and-conquer approach instead. The review [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], conducted a year later concludes that no
big-data analytics will happen without optimised data sharing and reuse, something we still
lack despite various interoperability standards in the medical domain.
      </p>
      <p>Therefore, in our understanding, data formalisation, semantic interoperability,
depersonalising data and ensuring data quality are the main challenges to solve in secondary use, despite
the locations of health data in centralised data silos or decentralised content-addressable
storage networks. However, and we are advocating it, the health data locations’ in decentralised
content-addressable storage networks, under the data owners’ full control and ownership, might
be the most natural and the simplest way of tackling these challenges as well.</p>
      <p>Next, we draft and explain possible research topics on preserving EHR in decentralised
content-addressable storage networks.</p>
      <sec id="sec-5-1">
        <title>R1: Data model</title>
        <p>A recent study shows [34] that approximately 80% of medical data are preserved in free text.
There is likely a good reason for this. Still, for secondary use, we somehow have to get
structured (formalised) data from these unstructured medical texts; therefore it is quite expected
that researchers are looking for ways to parse the necessary data from these texts.</p>
        <p>The question here is how to format the person’s EHR data preserved in the decentralised
content-addressable network so that they can be displayed in various views (including
humanreadable free text), used by multiple systems or transferred to various systems using various
communication protocols. For instance, each hospital and general practitioner the patient visits
during their lifetime most likely does not use the same data communication protocols (e.g.
HL7 v.2.7, CDA or FHIR), the same data reference models (e.g. HL7 RIM or openEHR RM) or
classifiers (SNOMED, LOINC or their diferent versions) or the same language (e.g. English,
Estonian). It would be ideal if the data model did not force the use of any of the aforementioned
formats, but was able to present the data in any of these formats on the fly.</p>
      </sec>
      <sec id="sec-5-2">
        <title>R2: Data quality</title>
        <p>To be able to rapidly answer important clinical questions, the structure of electronic medical
records and health administrative databases and data capture therein needs to be improved [35].
The quality of routine clinical data, such as data availability for variables of clinical interests,
completeness within a clinical visit, missing and duplicate visits, variability of data capture
systems [36], [37],[38],[39],[40],[41], are some of the concrete issues that need improvement.
Therefore, mechanisms must be put in place for how the data are validated both technically and
clinically (similarly the data are validated in clinical laboratories) before they are preserved in
the EHR in a decentralised content-addressable network.</p>
      </sec>
      <sec id="sec-5-3">
        <title>R3: Data interoperability</title>
        <p>By data interoperability, we mean in particular the semantic interoperability of both data and
knowledge [42]. Suppose that we have a simple, universal and human-readable as well as
machine-readable data model for preserving EHR data in a decentralised content-addressable
network. The question now is how to convert and present these data in various existing health
and medical ontologies, taxonomies, terminologies, standards, communication protocols, etc.
and so that the medical meaning is preserved and the semantic interoperability of systems is
achieved on the fly using a federated, non-unified, interoperability approach [43].</p>
      </sec>
      <sec id="sec-5-4">
        <title>R4: Primary use</title>
      </sec>
      <sec id="sec-5-5">
        <title>R5: Secondary use</title>
        <p>Let’s now suppose that we have both the data model and the data interoperability solution so
that when a person visits a hospital or a general practitioner, that patient is able to present their
data to clinicians. This now raises myriad issues. Whether and why clinicians should trust these
data? How does the clinician enter new data into the collection? What happens if a person is
unconscious and needs emergency assistance but is unable to present their data? Which data, if
any, are hospitals and general practitioners preserving in their systems, in addition to patients’
EHR data in a decentralized content-addressable network? And so on.</p>
        <p>The next myriad questions are related to the secondary use of health data. Even if a patient is
able to make a copy of their medical data and publish it for the common good of society, the
question remains as to how all of this works. How can those who need data request data? How
do people know whether someone is interested in their data? How and in what form do people
publish their data? Are we able to trust these data and why? Does it make things simpler or
more complicated? Does it make collecting data for medical research more expensive or reduce
the time and costs? And so on.</p>
      </sec>
      <sec id="sec-5-6">
        <title>R6: Data security and privacy</title>
        <p>In some cases, and especially in the medical domain, we should talk about pseudonymity,
not anonymity. When EHR data are kept in decentralised context-addressable networks, the
person has full control of their data and is able to publish part or all of the data. Still, good
pseudonymisation and/or anonymisation tools and techniques are needed. Furthermore, several
scenarios should be validated to ensure no risk of personal data leakage and that data protection
rules are followed.</p>
      </sec>
      <sec id="sec-5-7">
        <title>R7: Data integrity and transparency</title>
        <p>When using data for any analysis from several data sources, we must ensure data transparency
and integrity in order to trust the results achieved. Therefore, to find and evaluate data,
appropriate data transparency and integrity methods and tools for EHR data in decentralised
content-addressable networks are needed, both in the context of primary and secondary use.</p>
      </sec>
      <sec id="sec-5-8">
        <title>R8: Linked data and machine learning</title>
        <p>In the wider context, it would be interesting to investigate the potential role of decentralised
content-addressable network as the foundation for the Giant Global Graph (GGG) - a term
coined by Tim Berners-Lee in 2007 [44].</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>Despite the exponential increase in the volume of health data available electronically, one of the
main obstacles to its reuse is the siloed architecture of our current data storage infrastructure.
This paper proposes the use of decentralised content-addressable storage networks to dissolve
data silos and give data control back to the data owner, thus facilitating the reuse of personal
health data both for providing immediate care to the patient and for the common good of society.
We presented a general description of the underlying principles of such networks and described
how these decentralised content-addressable storage networks can be applied in both primary
and secondary use scenarios. We also presented the possible future research topics to analyse
and resolve before utilising this technology. Although the technology behind decentralised
content-addressable storage networks is still in its infancy, it has the potential to revolutionise
the way in which health information gets stored and shared.</p>
      <p>As health care is increasingly turning away from dealing with the consequences of diseases
and turning to general prevention, this paper also proposes the replacement of the traditional
electronic health record with a more holistic personal electronic life-long health record, stored
securely and privately on decentralised content-addressable networks.</p>
      <sec id="sec-6-1">
        <title>Authors’ contribution</title>
        <p>T.K. designed the idea and wrote the manuscript with support from K.K. All authors contributed
to the final version of the manuscript. G.P. and P.R. supervised the project.</p>
      </sec>
      <sec id="sec-6-2">
        <title>Acknowledgments</title>
        <p>This work in the project ’ICT programme’ was supported by the European Union through the
European Social Fund.
2019, pp. 41–50.
[31] R. L. Richesson, C. O. Lynch, W. Hammond, Developing and promoting data standards for
clinical research, in: Clinical Research Informatics, Springer, 2019, pp. 403–431.
[32] J. N. S Rubí, P. R. L Gondim, Iomt platform for pervasive healthcare data aggregation,
processing, and sharing based on onem2m and openehr, Sensors 19 (2019) 4283.
[33] CEN, EN 17269, Health Informatics: The International Patient Summary, European
Committee for Standardization, 2019.
[34] E. Negro-Calduch, N. Azzopardi-Muscat, R. S. Krishnamurthy, D. Novillo-Ortiz,
Technological progress in electronic health record system optimization: Systematic review
of systematic literature reviews, International journal of medical informatics 152 (2021)
104507.
[35] T. McGuckin, K. Crick, T. W. Myroniuk, B. Setchell, R. O. Yeung, D. Campbell-Scherer,
Understanding challenges of using routinely collected health data to address clinical care gaps:
a case study in alberta, canada, BMJ open quality 11 (2022) e001491. URL: bmjopenquality.
bmj.com/content/11/1/e001491.full. doi:10.1136/bmjoq-2021-001491.
[36] L. M. Kern, S. Malhotra, Y. Barrón, J. Quaresimo, R. Dhopeshwarkar, M. Pichardo, A. M.</p>
        <p>Edwards, R. Kaushal, Accuracy of electronically reported “meaningful use” clinical quality
measures: a cross-sectional study, Annals of internal medicine 158 (2013) 77–83.
[37] A. Wright, A. B. McCoy, T.-T. T. Hickman, D. S. Hilaire, D. Borbolla, W. A. Bowes III, W. G.</p>
        <p>Dixon, D. A. Dorr, M. Krall, S. Malholtra, et al., Problem list completeness in electronic
health records: a multi-site study and assessment of success factors, International journal
of medical informatics 84 (2015) 784–790.
[38] J. M. Madden, M. D. Lakoma, D. Rusinak, C. Y. Lu, S. B. Soumerai, Missing clinical and
behavioral health data in a large electronic health record (ehr) system, Journal of the
American Medical Informatics Association 23 (2016) 1143–1149.
[39] K. Lucyk, K. Tang, H. Quan, Barriers to data quality resulting from the process of coding
health information to administrative data: a qualitative study, BMC health services research
17 (2017) 1–10.
[40] S. L. Feder, Data quality in electronic health records research: quality domains and
assessment methods, Western journal of nursing research 40 (2018) 753–766.
[41] E. C.-H. Wang, A. Wright, Characterizing outpatient problem list completeness and
duplications in the electronic health record, Journal of the American Medical Informatics
Association 27 (2020) 1190–1197.
[42] R. K. Saripalle, S. A. Demurjian, Attaining semantic enterprise interoperability through
ontology architectural patterns, in: Computer Systems and Software Engineering: Concepts,
Methodologies, Tools, and Applications, IGI Global, 2018, pp. 705–740.
[43] D. Chen, G. Doumeingts, F. Vernadat, Architectures for enterprise integration and
interoperability: Past, present and future, Computers in Industry (2008). doi:https:
//doi.org/10.1016/j.compind.2007.12.016, enterprise Integration and
Interoperability in Manufacturing Systems.
[44] Wikipedia, Giant global graph, en.wikipedia.org/wiki/Giant_Global_Graph, 2022. Accessed:
2022-05-23.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>WHO</surname>
          </string-name>
          ,
          <article-title>From innovation to implementation: eHealth in the WHO European Region</article-title>
          , WHO Regional Ofice for Europe,
          <year>2016</year>
          . URL: apps.who.int/iris/handle/10665/326317.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>PWC</surname>
          </string-name>
          ,
          <article-title>Transforming healthcare through secondary use of health data</article-title>
          ,
          <source>PriceWaterhouseCoopers</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Wade</surname>
          </string-name>
          ,
          <article-title>Refining gold from existing data, Current opinion in allergy and clinical immunology 14 (</article-title>
          <year>2014</year>
          )
          <fpage>181</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>W. O.</given-names>
            <surname>Hackl</surname>
          </string-name>
          , E. Ammenwerth, Spirit:
          <article-title>Systematic planning of intelligent reuse of integrated clinical routine data: A conceptual best-practice framework and procedure model</article-title>
          ,
          <source>Methods Inf. Med</source>
          <volume>55</volume>
          (
          <year>2016</year>
          )
          <fpage>114</fpage>
          --
          <lpage>124</lpage>
          . URL: doi.org/10.3414/ME15-01-0045.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Shickel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Tighe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bihorac</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rashidi</surname>
          </string-name>
          ,
          <article-title>Deep ehr: A survey of recent advances in deep learning techniques for electronic health record (ehr) analysis</article-title>
          ,
          <source>IEEE Journal of Biomedical and Health Informatics</source>
          <volume>22</volume>
          (
          <year>2018</year>
          )
          <fpage>1589</fpage>
          -
          <lpage>1604</lpage>
          . URL: doi.org/10.1109/JBHI.
          <year>2017</year>
          .
          <volume>2767063</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Gansel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mary</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. van Belkum</surname>
          </string-name>
          ,
          <article-title>Semantic data interoperability, digital medicine, and e-health in infectious disease management: a review</article-title>
          ,
          <source>Eur J Clin Microbiol Infect Dis</source>
          <volume>38</volume>
          (
          <year>2019</year>
          )
          <fpage>1023</fpage>
          --
          <lpage>1034</lpage>
          . URL: doi.org/10.1007/s10096-019-03501-6.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Hajduk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. E.</given-names>
            <surname>Jamieson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. L.</given-names>
            <surname>Baker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. F.</given-names>
            <surname>Olesen</surname>
          </string-name>
          , T. Lang,
          <article-title>It is not enough that we require data to be shared; we have to make sharing easy, feasible and accessible too!</article-title>
          ,
          <source>BMJ Glob Health</source>
          <volume>4</volume>
          (
          <year>2019</year>
          )
          <fpage>1550</fpage>
          --
          <lpage>1550</lpage>
          . URL: doi.org/10.1136/bmjgh-2019-001550.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Metsallik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Draheim</surname>
          </string-name>
          , G. Piho,
          <article-title>Ten years of the e-health system in estonia</article-title>
          , in: A.
          <string-name>
            <surname>Rutle</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Lamo</surname>
          </string-name>
          , W. MacCaull, L. Iovino (Eds.),
          <source>CEUR Workshop Proceedings</source>
          , volume
          <volume>2336</volume>
          , 3rd International Workshop on (Meta)
          <article-title>Modelling for Healthcare Systems</article-title>
          (MMHS),
          <year>2018</year>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>15</lpage>
          . URL:
          <article-title>ceur-ws</article-title>
          .
          <source>org/</source>
          Vol-
          <volume>2336</volume>
          /MMHS2018_invited.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Oderkirk</surname>
          </string-name>
          ,
          <article-title>Survey results: National health data infrastructure and governance</article-title>
          ,
          <source>OECD Health Working Papers</source>
          (
          <year>2021</year>
          ).
          <article-title>URL: doi</article-title>
          .org/10.1787/55d24b5d-en.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Weiskopf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bakken</surname>
          </string-name>
          , G. Hripcsak,
          <string-name>
            <given-names>C.</given-names>
            <surname>Weng</surname>
          </string-name>
          ,
          <article-title>A data quality assessment guideline for electronic health record data reuse, eGEMs (Generating Evidence &amp; Methods to improve patient outcomes) 5 (</article-title>
          <year>2017</year>
          )
          <fpage>14</fpage>
          -.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>EU</surname>
          </string-name>
          ,
          <string-name>
            <surname>Regulation</surname>
          </string-name>
          (eu)
          <year>2016</year>
          /
          <article-title>679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection regulation) (text with eea relevance)</article-title>
          ,
          <source>Oficial Journal of the European Union</source>
          <volume>119</volume>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>88</lpage>
          . URL:
          <article-title>eur-lex.europa</article-title>
          .eu/eli/reg/2016/679/oj.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>NGI, Guidelines for applicants. DAPSI 3-rd open call for proposals</article-title>
          ,
          <source>Technical Report, DAPSI, Data Portability and Services Incubator</source>
          ,
          <year>2021</year>
          .
          <article-title>URL: dapsi.ngi.eu/wp-content/ uploads/DAPSI-Guidelines-for-Applicants</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>InteropEHRate, Ehr in people's hand across europe, interopehrate</article-title>
          .eu,
          <year>2020</year>
          .
          <article-title>EU's Horizon 2020 research and innovation programme grant agreement No 826106</article-title>
          .
          <string-name>
            <surname>Accessed</surname>
          </string-name>
          :
          <fpage>2022</fpage>
          -03- 24.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Solid</surname>
          </string-name>
          ,
          <article-title>Your data, your choice. advancing web standards to empower people, solidproject</article-title>
          .org,
          <year>2021</year>
          . Accessed:
          <fpage>2022</fpage>
          -03-24.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>Harari</surname>
          </string-name>
          ,
          <article-title>Why fascism is so tempting - and how your data could power it, ted</article-title>
          .com/talks/yuval_noah_
          <article-title>harari_why_fascism_is_so_tempting_and_how_your_data_ could_power_it, 2018</article-title>
          . Accessed:
          <fpage>2022</fpage>
          -03-24.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Ipfs</surname>
          </string-name>
          ,
          <article-title>Ipfs powers the distributed web, ipfs</article-title>
          .io,
          <year>2022</year>
          . Accessed:
          <fpage>2022</fpage>
          -03-24.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Swarm</surname>
          </string-name>
          ,
          <article-title>Swarm is a decentralised storage and communication system for a sovereign digital society, ethswarm</article-title>
          .org,
          <year>2022</year>
          . Accessed:
          <fpage>2022</fpage>
          -03-24.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Storj</surname>
          </string-name>
          ,
          <article-title>Decentralized cloud object storage for developers, storj</article-title>
          .io,
          <year>2022</year>
          . Accessed:
          <fpage>2022</fpage>
          -03- 24.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Sia</surname>
          </string-name>
          ,
          <article-title>Decentralized storage for the post-cloud world, sia</article-title>
          .tech,
          <year>2022</year>
          . Accessed:
          <fpage>2022</fpage>
          -03-24.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>D. M. Petar Maymounkov</surname>
          </string-name>
          ,
          <article-title>Kademlia: A peer-to-peer information system based on the xor metric</article-title>
          , https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf,
          <year>2002</year>
          . Accessed:
          <fpage>2022</fpage>
          -03-24.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Canham</surname>
          </string-name>
          ,
          <article-title>Long-term management of data and secondary use</article-title>
          , in: S. Piantadosi,
          <string-name>
            <surname>C. L.</surname>
          </string-name>
          Meinert (Eds.),
          <source>Principles and Practice of Clinical Trials</source>
          , Springer International Publishing,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          . URL: doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -52677-5_
          <fpage>286</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Meystre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lovis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bürkle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Tognola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Budrionis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. U.</given-names>
            <surname>Lehmann</surname>
          </string-name>
          ,
          <article-title>Clinical data reuse or secondary use: current status and potential future progress</article-title>
          ,
          <source>Yearbook of medical informatics 26</source>
          (
          <year>2017</year>
          )
          <fpage>38</fpage>
          -
          <lpage>52</lpage>
          . URL: doi.org/10.15265/IY-2017-007.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>L. M. G.</given-names>
            <surname>Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ampatzoglou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Avgeriou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Y.</given-names>
            <surname>Nakagawa</surname>
          </string-name>
          ,
          <article-title>A reference architecture for healthcare supportive home systems</article-title>
          ,
          <source>in: 2015 IEEE 28th International Symposium on Computer-Based Medical Systems</source>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>358</fpage>
          -
          <lpage>359</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Patrick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Barach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Besiso</surname>
          </string-name>
          ,
          <article-title>Information technology infrastructure, management, and implementation: the rise of the emergent clinical information system and the chief medical information oficer</article-title>
          ,
          <source>in: Surgical Patient Care</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>247</fpage>
          -
          <lpage>262</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>McKeeby</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Cofey</surname>
          </string-name>
          ,
          <article-title>The importance</article-title>
          and
          <article-title>use of electronic health records in clinical research, Principles and practice of clinical research (</article-title>
          <year>2018</year>
          )
          <fpage>687</fpage>
          -
          <lpage>702</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ehtesham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Safdari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mansourian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tahmasebian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mohammadzadeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pourshahidi</surname>
          </string-name>
          ,
          <article-title>Developing a new intelligent system for the diagnosis of oral medicine with case-based reasoning approach</article-title>
          , Oral diseases
          <volume>25</volume>
          (
          <year>2019</year>
          )
          <fpage>1555</fpage>
          -
          <lpage>1563</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sousa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Arieira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Queirós</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Martins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. P.</given-names>
            <surname>Rocha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Duarte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Neves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Damasceno</surname>
          </string-name>
          ,
          <article-title>Social platform</article-title>
          ,
          <source>in: World Conference on Information Systems and Technologies</source>
          , Springer,
          <year>2018</year>
          , pp.
          <fpage>1162</fpage>
          -
          <lpage>1168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>I.</given-names>
            <surname>Matloob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khan</surname>
          </string-name>
          , H. ur
          <string-name>
            <surname>Rahman</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Hussain</surname>
          </string-name>
          ,
          <article-title>Medical health benefit management system for real-time notification of fraud using historical medical records</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>10</volume>
          (
          <year>2020</year>
          )
          <fpage>5144</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Edmondson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Reimer</surname>
          </string-name>
          ,
          <article-title>Challenges frequently encountered in the secondary use of electronic medical record data for research</article-title>
          ,
          <source>Comput Inform Nurs</source>
          <volume>38</volume>
          (
          <year>2020</year>
          )
          <fpage>338</fpage>
          -
          <lpage>348</lpage>
          . URL: doi.org/10.1097/CIN.0000000000000609.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Menger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Spruit</surname>
          </string-name>
          , J. de Bruin,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kelder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Scheepers</surname>
          </string-name>
          ,
          <article-title>Supporting reuse of ehr data in healthcare organizations: The cared research infrastructure framework</article-title>
          , in: HEALTHINF,
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>