<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>N. Heiniger);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Development of a patient-centric eHealth data exchange using distributed ledger technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nico Heiniger</string-name>
          <email>nico.heiniger@protonmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pascal Moriggl</string-name>
          <email>pascal.moriggl@fhnw.ch</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petra Aspiron</string-name>
          <email>petra.asprion@fhnw.ch</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Quy Vo-Reinhard</string-name>
          <email>quy.voreinhard@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Applied Sciences Northwestern Switzerland</institution>
          ,
          <addr-line>Peter Merian - Strasse 86, 4002 Basel</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>dHealth Foundation</institution>
          ,
          <addr-line>Dammstrasse 16, 6300 Zug</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>In Medical Informatics, the growing value of data is driven by advancements in Artificial Intelligence and Machine Learning, aiding Drug Discovery and Patient Outcome prediction. Traditional data collection methods, such as costly and time-consuming clinical trials, are supplemented by the substantial growth of real-world health data obtained from wearables with lifestyle tracking. This study explored the potential of leveraging distributed ledger technology to facilitate data exchange between patients and researchers. The introduction section identified research gaps and stakeholder requirements in this field. Supported through literature analysis, objectives for a prototypical novel application were defined. A prototype using the dHealth network and IPFS was developed and tested with HL7-format blood sample data. The results demonstrate the technical feasibility of patient-researcher data exchange via distributed ledger technology without apparent security or performance limitations.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Medical Informatics</kwd>
        <kwd>Data Exchange</kwd>
        <kwd>Distributed Ledger Technology</kwd>
        <kwd>Real-world Health Data</kwd>
        <kwd>Blockchain</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Usually, behavioral data is collected by tracking users of applications, tools, and websites. Even
though the user has to opt-in and consent to share their data, this is usually the only option to access
the selected service or system. This approach cannot be applied in medical research due to data
sensitivity and not at least data privacy/protection laws (e.g., GDPR). Patients have no benefit from
sharing their data, and even with the motivation of sharing for the greater good, there is no technical
solution to do so [1].</p>
      <p>New medical informatics trends such as precision medicine or clinical decision support systems
heavily depend on health data's amount, quality, access, and availability. At the same time, the volume
of health data generated and collected through various stakeholders and systems is increasing rapidly.
Hospital information systems collect digitized data on patients' diseases and treatments, while
wearables generate longitudinal data such as the patient's heart rate, sleeping rhythm, or eating habits
[2].</p>
      <sec id="sec-1-1">
        <title>1.1. Research gap</title>
        <p>The identified research gap shows a lack of secure and fast connection options between data creators,
data owners (patients), and potential beneficiaries (researchers), that are peer-to-peer based. Despite
the growing importance of real-world data (RWD), and unsolved challenges and risks [3] there is still
a shortage of solutions that allow patients to voluntarily share their data without being dependent on
a single, potentially commercial platform provider. Therefore, it is crucial to explore possible
solutions where patients can share their data directly with specific research organizations without
relying on storing their raw data on a platform outside of their control. This research focuses mainly
on investigating how patients can consent to share data with researchers using for example the
dHealth network, while respecting the needs of the involved stakeholders. The dHealth network was
selected as ecosystem for the prototype due to its open-source nature, tailored design for
healthcarerelated transactions, and its extensive toolbox, which provided a flexible foundation for developing
the required features and functionalities.</p>
        <p>Stakeholders have different requirements for health data based on their needs and position along
the care journey. Besides the general data security attributes such as integrity, confidentiality, and
availability there are specific requirements on patient and research side of the sharing process [4].
Patient-oriented sharing solutions must prioritize in addition to traditional data security attributes
data privacy and transparency, ensuring rigorous protection of personal health information and
adherence to data protection laws [4]. These systems should be in addition highly usable, catering to
a diverse user base, and emphasizing ease of use and perceived usefulness to promote widespread
adoption [5].</p>
        <p>Researchers on the receiving side of data sharing rely on high-quality data for their studies. With
the integration of patient data, ensuring data integrity and verification becomes paramount. One
approach is distinguishing patient-generated data, acknowledging its potential variability, and
considering third-party validation, such as involving general practitioners in the data validation
process [6]. Data quality also hinges on maintaining data integrity to prevent unauthorized
modifications, which is crucial when accommodating patient-initiated data changes [4]. Moreover,
researchers emphasize system availability to access data promptly, ensuring data preservation and
appropriate removal. Efficient performance, characterized by fast data access, transmission, and
retrieval, further enhances the usability of data sharing for research purposes [4].</p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Method</title>
        <p>The research followed the Design Science Research (DSR) principles outlined by Peffers et al. [7]. A
prototype solution was created to address specific challenges in healthcare research, such as data
integrity or other defined security attributes. The prototype is designed to simulate the functionality
of allowing patients to choose the designated research purpose for their data. This aspect showcases
the prototype's potential to support different research objectives and enhance patient engagement in
the research process. The DSR approach emphasizes iterative design and evaluation cycles. By
following DSR principles, this research aims to advance healthcare research by providing an
applicable solution that addresses the requirements and complexities of data management, achieving
specific security attributes for data, and research purposes in the healthcare domain. In summary, a
technical proof-of-concept prototype is programmed using blood sample data. The prototype is
validated based on a blend of authors' objectives and derived requirements from existing frameworks.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Prototype design</title>
      <p>Two key concerns arise from the perspective of data privacy. Firstly, patients should be able to
determine which individuals or entities can access their data. Additionally, they need to have
confidence in the system's ability to uphold these preferences. Leveraging blockchain technology as
a facilitator for these transactions ensures a very high level of transparency. Given that all
transactions are visible to the public, patients can always ascertain who their data has been shared
with and verify that their privacy settings have been respected.</p>
      <p>Two generic processes for the prototype were outlined – the patient side and the research side.
The patient-side process illustrated in Figure 1 consists of the following steps:</p>
      <sec id="sec-2-1">
        <title>1. Patient aims to send a file to another party.</title>
        <p>2. The file needs to be secured (encrypted).
3. The file needs to be stored somewhere.
4. The keys for file decryption must be sent with.</p>
        <p>5. All is sent to the recipient.</p>
        <p>The research side process is mirroring the recipient steps (Figure 2):
1.
2.
3.
4.
5.
6.</p>
      </sec>
      <sec id="sec-2-2">
        <title>A researcher receives a message.</title>
        <p>The researcher proves the right recipient.</p>
        <p>The researcher retrieves the location and keys needed to access the file.</p>
        <p>The file is downloaded from somewhere.</p>
        <p>The file gets decrypted.</p>
        <p>The file is stored locally in plain text.</p>
        <p>The prototype does not store information in pdf format but adheres to the HL7 standard, an
international standard used to store machine-readable health data. Consequently, the data processed
in Figure 1 and Figure 2 becomes machine-readable and easily transferable between systems or users.
This characteristic enables the solution's scalability, accommodating additional stakeholders, such as
insurance companies, entering the process. These stakeholders would require an interface compatible
with one widely adopted standard.</p>
        <sec id="sec-2-2-1">
          <title>2.1. Requirements</title>
          <p>From a patient or data sender perspective, the main requirement is to ensure data privacy. Since the
patient initiates the data sharing, complying with the needs and requirements of patients is most
important to ensure sufficient participation. On the other end of the sharing process are researchers,
who need the data shared by patients. However, the data will be useless if the shared data sets do not
underline standardization and regulation.</p>
          <p>Therefore, data quality is the second main requirement to ensure the usability of the shared data.
If the first two requirements are fulfilled, but the solution's usability is not guaranteed due to a lack
of performance, neither side will use it. Hence, the third requirement focuses on performance. Based
on the literature, these requirements can be translated into the objectives in Table 1.</p>
          <p>Objectives Literature
(1) The patient can see where their data has been [8]–[10]
sent.
(2) The patient can control whom they share [9], [11], [12]
their data with.
(3) The data needs to be in a machine-readable [13], [14]
format.
(3.1) Meta-data is available:
Boeske et al., 2004; Kalra et al., 2017; Loane &amp;</p>
          <p>Wootton, 2002; Van Doornik, 2013
•
•</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>When and where data was created</title>
        <p>
          Clinical setting
(4) Performance:
Access to data should be fast. The numbe
          <xref ref-type="bibr" rid="ref23">r of Ash &amp; Bates, 2005</xref>
          ; Humphreys, 2000; Moriggl et
transactions per second (T
          <xref ref-type="bibr" rid="ref22">PS) should be above al., 2021</xref>
          60.
        </p>
        <p>
          The system should respond to any use
          <xref ref-type="bibr" rid="ref23">r input Engelbrecht et al., 2005</xref>
          ; Galletta et al., 2004; Hier
with acceptable pe
          <xref ref-type="bibr" rid="ref23">rformance. The average et al., 2005</xref>
          loading time should be below 4 seconds.
        </p>
        <sec id="sec-2-3-1">
          <title>2.2. Architecture</title>
          <p>This study builds a proof-of-concept emphasizing security, efficiency, and decentralization.
Blockchain technology forms the foundation of this architecture, renowned for its secure and
decentralized data storage capabilities. Utilizing cryptography to link data blocks, blockchain
technology is exceptionally suitable for handling sensitive health data, providing a tamper-proof
environment and ensuring data integrity [23]–[26]. The blockchain utilized is the Decentralized
Health (dHealth) Network. This blockchain network, designed explicitly for healthcare data, employs
a Proof-of-Stake Plus (PoS+) consensus mechanism. It facilitates secure, efficient health data
transactions and incentivizes participation through its digital currency, DHP, making it a valuable
tool for healthcare data management [27].</p>
          <p>The InterPlanetary File System (IPFS) plays a crucial role in the stack. IPFS revolutionizes data
storage and retrieval by shifting from traditional location-based addressing to content-based
addressing. This method enhances data integrity and efficiency, employing unique hashes for data,
thus avoiding redundancy and ensuring easy access to information [28].</p>
          <p>Health Level Seven (HL7) is incorporated for structured data exchange in healthcare. HL7
standardizes the messaging format, streamlining the communication of patient details, test results,
and other crucial health data, facilitating effective and standardized data exchange within the
healthcare domain [29], [30].</p>
          <p>The development environment includes TypeScript for the backend and React.js for the frontend.
The prototype leverages the existing dHealth SDK2 for account management, transaction creation,
and signing, and Node.js serves as the run-time environment. To ensure data privacy, the prototype
encrypts HL7 files using an AES-256 encryption algorithm and uploads them to the decentralized
IPFS network. This approach ensures data redundancy, availability, and resilience against single
points of failure.
2 https://github.com/dhealthproject/</p>
          <p>On the recipient's side (Figure 4), the prototype enables data retrieval by entering the transaction
hash and providing the recipient's private key (1). Therefore, the recipient needs to notice an
incoming transaction by monitoring their account in the explorer or enabling notifications in the
dHealth wallet, where the transaction hash can be identified. The sender's public and recipient's
private keys are used to decrypt the attached message, containing the IPFS Content Identifier (CID)
and file encryption key. The retrieval and decryption of the encrypted message are done using the
SDK (3). Due to the message encryption being part of the dHealth functionality, only the recipient's
account can decrypt it, allowing access to the file location and its decryption key. The decrypted HL7
file is stored locally on the recipient's machine.</p>
          <p>Overall, the architecture leverages the dHealth network, IPFS, the React.js frontend, and the
provided SDK functions to ensure secure data transmission, privacy, and interoperability in the
healthcare domain.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Evaluation</title>
      <p>The objectives in Table 1 are derived from stakeholder requirements, encompassing data privacy and
patient transparency, data quality for research, and performance measures. Data privacy and quality
3 http://explorer.dhealth.cloud/
objectives are assessed separately from performance objectives because privacy and quality are
assessed qualitatively while performance is assessed quantitatively.</p>
      <sec id="sec-3-1">
        <title>3.1. Data privacy and quality requirements</title>
        <p>The evaluation of the first four objectives of Table 1 has been conducted systematically in a binary
manner, employing a checkbox-like assessment approach. The objectives are considered achieved
when they apply to the prototype, thus highlighting the successful fulfillment of the corresponding
criteria. This methodical evaluation ensures a comprehensive appraisal of the prototype's adherence
to the established objectives.</p>
        <p>1. The patient can see where their data has been sent: The transparency provided by the
applied blockchain technology allows patients to trace and verify the journey of their data.
They can view the transaction history and track which research organizations or recipients
have accessed their data.
2. The patient can control whom they share their data with: The prototype includes a user
interface that enables patients to select the desired research organization as the recipient of
their data. This control empowers patients to decide whom to share their health data with,
ensuring privacy and consent.
3. The data is in a machine-readable format: HL7 format ensures that the health data is
structured and machine-readable, meeting the requirement of data accessibility and
interoperability.
3.1. Meta-data is available: The HL7 format includes meta-data such as information on when
and where the data was created and the clinical setting, providing additional context and
details about the health data.
4. Performance: The validation of the performance was very complex within the scope of the
study and is therefore described in the following section.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Performance requirements</title>
        <p>The prototype underwent rigorous examination regarding its performance within a controlled local
environment, executed through command-line interfaces. A dedicated script systematically evaluated
the prototype's performance across various file sizes. This method allowed for meticulous
measurement of processing times, enabling a comprehensive analysis of system behavior and
responsiveness under varying workloads.</p>
        <p>The performance evaluation involved measuring the loading time and execution time of the
prototype. Loading time was measured as the duration from the initial launch of the application to
the point where it became responsive to user input. This metric determined how quickly users could
access and interact with the system. Execution time refers to the interval from the last user input to
the completion of all processing steps within the application. This metric helped assess the efficiency
of the prototype in handling user requests. A range of test scenarios were executed to ensure a
comprehensive evaluation. One hundred test runs were conducted, each with different file sizes.
These scenarios included:
•
•
•</p>
        <sec id="sec-3-2-1">
          <title>A regular blood test HL7 file with a size of 3KB.</title>
          <p>An HL7 file of larger dimensions, measuring 1024KB (1MB).</p>
          <p>An even larger HL7 file of 30720KB (30MB).</p>
          <p>This allowed a thorough assessment of the prototype's performance across a spectrum of data
sizes, providing insights into its scalability and efficiency under varying conditions. The main
components were programmed using TypeScript and Node.js in Visual Studio Code. The file format
was HL7, using AES-256 encryption algorithm. The dHealth network served as blockchain for the
data exchange, while the IPFS network provided distributed data storage. For the regular-sized HL7
file, the average loading time for the patient application over 100 runs was 2.21 seconds, while the
research application had an average loading time of only one millisecond. The execution time for
both applications averaged around 0.25-0.27 seconds. As shown in Table 2, the larger file sizes mainly
impacted the execution time for all stakeholders.</p>
          <p>The maximum transaction fee of 0.05 DHP was identified as a good balance between approval time
and cost. The dHealth network has a maximum transaction throughput of 200 transactions per
second, with each transaction having a fixed size of 82 bytes. The application prototype itself did not
impose any limitations regarding potential bottlenecks as it ran locally and independently. The main
potential bottleneck could be the IPFS network, but no specific upload limits regarding speed or size
were found. The limitations would depend on the hardware specifications of the IPFS node. The
prototype currently utilizes an API (Application Programming Interface) limited to 60 transactions
per second.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Overall results</title>
        <p>The prototype successfully addresses the objectives of patient visibility in data usage and control over
transaction recipients, having machine-readable data and available meta-data. In addition, the
evaluation demonstrates that the prototype, in terms of performance, effectively achieves the
requirement of fast data access with a transaction throughput above 60 TPS and acceptable
performance with an average loading time below 4 seconds.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Limitations</title>
      <p>One of the prototype's main limitations is the data deletion challenge. As blockchain and IPFS are
immutable technologies, once data is stored on these platforms, it becomes difficult to delete or
modify it. This limitation arises from the inherent design principles of these technologies, which
prioritize data immutability and integrity. Deleting sensitive patient data in healthcare is crucial to
comply with data privacy regulations and individual preferences. However, due to the nature of
blockchain and IPFS, achieving complete data deletion is challenging. It requires additional
mechanisms and considerations beyond the scope of this prototype. Addressing the limitation of data
deletion would necessitate exploring alternative approaches, such as implementing
privacyenhancing techniques like zero-knowledge proofs or utilizing off-chain storage solutions with more
flexible data management capabilities. These approaches could provide more comprehensive control
over data retention and deletion while maintaining the desired level of security and privacy.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This study explores the feasibility of a blockchain-based platform for sharing health data between
patients and researchers. The prototype application demonstrates that combining blockchain
technology and distributed file storage, specifically the IPFS network, enables secure and efficient
data transfer. Patients can select recipients, encrypt files, and upload them to IPFS, sharing the
encrypted IPFS Content Identifier (CID) and encryption key with the recipient. Researchers can
retrieve and decrypt the files, enhancing data value for research projects. Patient autonomy and
compliance with data protection/privacy regulations are emphasized. In order to ensure continuous
quality, (external) audits are recommended. Overall, the study extends existing research by including
research organizations in the data exchange process, affirming the suitability of distributed ledger
and storage systems for healthcare applications.</p>
      <p>The technical feasibility of a blockchain-based platform for health data sharing is confirmed
through the prototype and its evaluation. Future research should explore blockchain options,
encryption methods, and economic considerations while ensuring compliance with evolving privacy
regulations.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Azaria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ekblaw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vieira</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Lippman</surname>
          </string-name>
          , “
          <article-title>MedRec: Using blockchain for medical data access and permission management</article-title>
          ,
          <source>” Proc. - 2016 2nd Int. Conf. Open Big Data, OBD</source>
          <year>2016</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          25-
          <fpage>30</fpage>
          ,
          <year>2016</year>
          , doi: 10.1109/OBD.
          <year>2016</year>
          .
          <volume>11</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>M. J. Kaur</surname>
            ,
            <given-names>V. P.</given-names>
          </string-name>
          <string-name>
            <surname>Mishra</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Maheshwari</surname>
          </string-name>
          ,
          <source>The Convergence of Digital Twin, IoT, and Machine Learning: Transforming Data into Action</source>
          . Springer International Publishing,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Grimberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Asprion</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Miho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Babrak</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Habbabeh</surname>
          </string-name>
          , “
          <article-title>The RealWorld Data Challenges Radar: A Review on the Challenges and Risks regarding the Use of Real-World Data,” Digit</article-title>
          . Biomarkers, vol.
          <volume>5</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>148</fpage>
          -
          <lpage>157</lpage>
          ,
          <year>2021</year>
          , doi: 10.1159/000516178.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Hoerbst</surname>
          </string-name>
          and E. Ammenwerth, “
          <article-title>Electronic health records: A systematic review on quality requirements,” Methods Inf</article-title>
          . Med., vol.
          <volume>49</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>320</fpage>
          -
          <lpage>336</lpage>
          ,
          <year>2010</year>
          , doi: 10.3414/ME10-01-0038.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>E. C.</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Tussyadiah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuomi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stienmetz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Ioannou</surname>
          </string-name>
          , “
          <article-title>Factors influencing users' adoption and use of conversational agents: A systematic review</article-title>
          ,” Psychol. Mark., vol.
          <volume>38</volume>
          , no.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7, pp.
          <fpage>1031</fpage>
          -
          <lpage>1051</lpage>
          ,
          <year>2021</year>
          , doi: 10.1002/mar.21491.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>W. Van Doornik</surname>
          </string-name>
          , “
          <article-title>Meaningful use of patient-generated data in EHRs</article-title>
          .,”
          <string-name>
            <surname>J. AHIMA</surname>
          </string-name>
          , vol.
          <volume>84</volume>
          , no.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          10, pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Peffers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tuunanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Rothenberger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          , “
          <article-title>A design science research methodology for information systems research</article-title>
          ,” J.
          <string-name>
            <surname>Manag</surname>
          </string-name>
          . Inf. Syst., vol.
          <volume>24</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>77</lpage>
          ,
          <year>2007</year>
          , doi: 10.2753/MIS0742-1222240302.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>C. C.</surname>
          </string-name>
          <article-title>Aggarwal, Data classification : algorithms and applications</article-title>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Healthc. Inf. Manag.</surname>
          </string-name>
          , vol.
          <volume>21</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>86</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>Med. Informatics</given-names>
            <surname>Assoc</surname>
          </string-name>
          ., vol.
          <volume>14</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          ,
          <year>2007</year>
          , doi: 10.1197/jamia.M2273.Introduction.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>J. G.</given-names>
            <surname>Beun</surname>
          </string-name>
          , “
          <article-title>Electronic healthcare record; a way to empower the patient,”</article-title>
          <string-name>
            <given-names>Int. J.</given-names>
            <surname>Med</surname>
          </string-name>
          . Inform., vol.
          <volume>69</volume>
          , no.
          <issue>2-3</issue>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>196</lpage>
          ,
          <year>2003</year>
          , doi: 10.1016/S1386-
          <volume>5056</volume>
          (
          <issue>03</issue>
          )
          <fpage>00060</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Pratt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Unruh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Civan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Skeels</surname>
          </string-name>
          , “
          <article-title>Personal health information management</article-title>
          ,
          <source>” Commun. ACM</source>
          , vol.
          <volume>49</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>55</lpage>
          ,
          <year>2006</year>
          , [Online]. Available: https://doi.org/10.1145/1107458.1107490.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Dettwiler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Fhnw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Märke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Roth</surname>
          </string-name>
          , “Elektronisches Patientendossier:
          <article-title>Aktuelle Probleme, Potenziale undwie die Institutionen damit umgehen</article-title>
          .,” no.
          <source>September</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>B. L.</given-names>
            <surname>Humphreys</surname>
          </string-name>
          , “
          <article-title>Electronic Health Record Meets Digital Library: A New Environment for Achieving an Old Goal,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Am</surname>
          </string-name>
          . Med. Informatics Assoc., vol.
          <volume>7</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>444</fpage>
          -
          <lpage>452</lpage>
          , Sep.
          <year>2000</year>
          , doi: 10.1136/jamia.
          <year>2000</year>
          .
          <volume>0070444</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Boeske</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Franz</surname>
          </string-name>
          , Goetz, and Haibach, “Managementpaper 'Elektronische Patientenakte.'” Aktionsforum Telematik im Gesundheitswesen, p.
          <fpage>54</fpage>
          ,
          <year>2004</year>
          , [Online]. Available: https://docplayer.org/4231065-
          <string-name>
            <surname>Managementpapier-</surname>
          </string-name>
          elektronische-patientenakte.html.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Telecare</surname>
          </string-name>
          , vol.
          <volume>8</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>71</lpage>
          ,
          <year>2002</year>
          , doi: 10.1258/1357633021937479.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Kalra</surname>
          </string-name>
          et al., “
          <article-title>The European Institute for Innovation through Health Data,”</article-title>
          <string-name>
            <surname>Learn. Heal. Syst.</surname>
          </string-name>
          , vol.
          <volume>1</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2017</year>
          , doi: 10.1002/lrh2.
          <fpage>10008</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Ash</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. W.</given-names>
            <surname>Bates</surname>
          </string-name>
          , “
          <article-title>Factors and forces affecting EHR system adoption: Report of a 2004 ACMI discussion</article-title>
          ,
          <source>” J. Am. Med</source>
          . Informatics Assoc., vol.
          <volume>12</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>8</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2005</year>
          , doi: 10.1197/jamia.M1684.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Moriggl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Asprion</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneider</surname>
          </string-name>
          , “
          <article-title>Blockchain Technologies Towards Data PrivacyHyperledger Sawtooth as Unit of Analysis,” in Studies in Systems, Decision and Control</article-title>
          , Cham: Springer,
          <year>2021</year>
          , pp.
          <fpage>299</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Engelbrecht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Geissbuhler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lovis</surname>
          </string-name>
          , and G. Mihalas, “
          <article-title>Connecting medical Informatics and Bio-Informatics,”</article-title>
          <source>Stud. Heal. Technol. Informatics</source>
          , Vol.
          <volume>116</volume>
          , vol.
          <volume>116</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>1027</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>D. B. Hier</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Rothschild</surname>
          </string-name>
          , A. LeMaistre, and J. Keeler, “
          <article-title>Differing faculty and housestaff acceptance of an electronic health record,”</article-title>
          <string-name>
            <given-names>Int. J.</given-names>
            <surname>Med</surname>
          </string-name>
          . Inform., vol.
          <volume>74</volume>
          , no.
          <issue>7-8</issue>
          , pp.
          <fpage>657</fpage>
          -
          <lpage>662</lpage>
          ,
          <year>2005</year>
          , doi: 10.1016/j.ijmedinf.
          <year>2005</year>
          .
          <volume>03</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Assoc. Inf. Syst.</surname>
          </string-name>
          , vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>28</lpage>
          , Jan.
          <year>2004</year>
          , doi: 10.17705/1jais.
          <fpage>00044</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Swan</surname>
          </string-name>
          ,
          <article-title>Blockchain for a New Economy</article-title>
          . Cambridge: O'
          <string-name>
            <surname>Reilly</surname>
          </string-name>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Haber</surname>
          </string-name>
          and
          <string-name>
            <given-names>W. S.</given-names>
            <surname>Stornetta</surname>
          </string-name>
          , “
          <article-title>How to Time-Stamp a Digital Document BT - Advances in Cryptology-</article-title>
          CRYPTO'
          <volume>90</volume>
          ,” pp.
          <fpage>437</fpage>
          -
          <lpage>455</lpage>
          ,
          <year>1991</year>
          , [Online]. Available: https://link.springer.com/content/pdf/10.1007/3-540-38424-3_
          <fpage>32</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Sunyaev</surname>
          </string-name>
          , Internet Computing:
          <article-title>Principles of Distributed Systems and Emerging Internet-Based Technologies</article-title>
          .
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Lantz</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Cawrey</surname>
          </string-name>
          , Mastering Blockchain:
          <article-title>Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications</article-title>
          , vol.
          <volume>1</volume>
          .
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Foundation</surname>
          </string-name>
          , “dHealth Network,”
          <year>2021</year>
          . [Online]. Available: https://uploadsssl.webflow.com/62434be6096bbb00e80dbf0d/6253e75695e36ce5aa800dd8_
          <fpage>WhitepaperdHealth</fpage>
          -Network.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Benet</surname>
          </string-name>
          , “IPFS - Content
          <string-name>
            <surname>Addressed</surname>
          </string-name>
          , Versioned, P2P File System,” no.
          <issue>Draft 3</issue>
          ,
          <year>2014</year>
          , [Online].
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>Available: http://arxiv.org/abs/1407.3561.</mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Klauber</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Geraedts</surname>
          </string-name>
          ,
          <source>Krankenhaus-Report</source>
          <year>2010</year>
          , vol.
          <volume>39</volume>
          , no.
          <issue>01</issue>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Benson</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Grieve</surname>
          </string-name>
          , Principles of Health Interoperability, vol.
          <volume>53</volume>
          , no.
          <issue>9</issue>
          . Cham: Springer International Publishing,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>