<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v21i10e13585</article-id>
      <article-id pub-id-type="pmid">31593548</article-id>
      <article-id pub-id-type="doi">10.2196/13585</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Towards a Stakeholder-Oriented Blockchain-Based Architecture for Electronic Health Records: Design Science Research Study
</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Clauson</surname>
            <given-names>Kevin</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Zhang</surname>
            <given-names>Peng</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kuo</surname>
            <given-names>Tsung-Ting</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Bestek</surname>
            <given-names>Mate</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Sarbadhikari</surname>
            <given-names>Suptendra</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Beinke</surname>
            <given-names>Jan Heinrich</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Accounting and Information Systems</institution>
            <institution>University of Osnabrueck</institution>
            <addr-line>Katharinenstraße 1</addr-line>
            <addr-line>Osnabrueck, 49069</addr-line>
            <country>Germany</country>
            <phone>49 541 969 6185</phone>
            <email>jan.beinke@uni-osnabrueck.de</email>
          </address>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-7153-8241</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Fitte</surname>
            <given-names>Christian</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-2637-1198</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Teuteberg</surname>
            <given-names>Frank</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-3870-6642</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Accounting and Information Systems</institution>
        <institution>University of Osnabrueck</institution>
        <addr-line>Osnabrueck</addr-line>
        <country>Germany</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Jan Heinrich Beinke <email>jan.beinke@uni-osnabrueck.de</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>10</month>
        <year>2019</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>7</day>
        <month>10</month>
        <year>2019</year>
      </pub-date>
      <volume>21</volume>
      <issue>10</issue>
      <elocation-id>e13585</elocation-id>
      <history>
        <date date-type="received">
          <day>1</day>
          <month>2</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>31</day>
          <month>3</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>27</day>
          <month>4</month>
          <year>2019</year>
        </date>
      </history>
      <copyright-statement>©Jan Heinrich Beinke, Christian Fitte, Frank Teuteberg. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 07.10.2019</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2019/10/e13585" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Data security issues still constitute the main reason for the sluggish dissemination of electronic health records (EHRs). Given that blockchain technology offers the possibility to verify transactions through a decentralized network, it may serve as a solution to secure health-related data. Therefore, we have identified stakeholder-specific requirements and propose a blockchain-based architecture for EHRs, while referring to the already existing scientific discussions on the potential of blockchain for use in EHRs.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aimed to introduce blockchain technology for EHRs, based on identifying stakeholders and systematically eliciting their requirements, and to discuss the key benefits (KBs) and key challenges (KCs) of blockchain technology in the context of EHRs.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The blockchain-based architecture was developed in the framework of the design science research paradigm. The requirements were identified using a structured literature review and interviews with nine health care experts. Subsequently, the proposed architecture was evaluated using 4 workshops with 15 participants.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We identified three major EHR stakeholder groups and 34 respective requirements. On this basis, we developed a five-layer architecture. The subsequent evaluation of the artifact was followed by the discussion of 12 KBs and 12 KCs of a blockchain-based architecture for EHRs. To address the KCs, we derived five recommendations for action for science and practice.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our findings indicate that blockchain technology offers considerable potential to advance EHRs. Improvements to currently available EHR solutions are expected, for instance, in the areas of data security, traceability, and automation by smart contracts. Future research could examine the patient’s acceptance of blockchain-based EHRs and cost-benefit analyses.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>blockchain</kwd>
        <kwd>electronic health records</kwd>
        <kwd>data security</kwd>
        <kwd>information storage and retrieval</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>In the course of digitization, electronic health records (EHRs) have become one of the most important topics within the health care sector, as they are expected to significantly improve intersectoral collaboration and reduce health care expenses [<xref ref-type="bibr" rid="ref1">1</xref>]. Given the fact that in many countries, including Germany, there is no government-regulated EHR system, the number of private providers on the market is rapidly increasing. However, for privacy and security concerns, many patients refrain from using an EHR because they fear that the private provider may sell their health data to make profit [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
      <p>Similar to the health care industry, the financial sector also exchanges highly sensitive customer data. In this context, blockchain technology has recently gained attention as a possible solution to secure sensitive transactions. Blockchain technology offers potential, for instance, in the areas of disintermediation, decentralization, the reduction of necessary trust between business partners, improved protection against data manipulation, and increased automation through smart contracts [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. This leads to the question, whether blockchain technology could also be able to ensure the use of EHRs. Although some authors have already analyzed the general potential of blockchain for the health care sector, a specific suggestion on how this potential can be achieved is currently missing [<xref ref-type="bibr" rid="ref6">6</xref>]. Kuo et al, for instance, investigate the application possibilities in the field of biomedical and health care applications [<xref ref-type="bibr" rid="ref7">7</xref>]. Although this study provides an interesting overview of the potential and challenges of blockchain-based applications, there is a lack of specific possibilities for implementation. In detail, a systematic requirement analysis for the respective field of application is missing. Further contributions present possible blockchain-based architectures for EHRs [<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>]. However, in these contributions, it often remains unclear on which scientific or practical basis the proposed architecture has been developed. Moreover, the requirements and interests of the stakeholder in the health care system are often not taken into account. In contrast to existing blockchain architectures for EHRs, our approach follows a structured scientific development and aims to include the stakeholders’ perspectives. Furthermore, there are contributions that identify the possible advantages and disadvantages of blockchain-based EHRs for different actors [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. However, according to the authors, these are not complete, as not all relevant actors were investigated. Consequently, it can be stated that, to date, there is no contribution that presents a blockchain-based EHR architecture that is based on (1) multimethodically and (2) systematically collected requirements for (3) all relevant stakeholders in the health sector and also elaborates (4) the key benefits (KBs) and (5) key challenges (KCs) of the developed architecture. Similar demands for future research in this context are confirmed by other authors [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. This motivates us to investigate the following research questions (RQs):</p>
      <disp-quote>
        <p>RQ 1: Which stakeholders have an interest in EHRs and what are their specific requirements for an EHR?</p>
      </disp-quote>
      <disp-quote>
        <p>RQ 2: How can these requirements be implemented in a blockchain-based architecture?</p>
      </disp-quote>
      <disp-quote>
        <p>RQ 3: Which key benefits and key challenges does the proposed blockchain-based EHR architecture provide?</p>
      </disp-quote>
      <p>The paper is structured as follows: The methodological framework is presented in the Methods section. On the basis of the design science research (DSR) method, we first identified stakeholders and collected their respective requirements using a systematic literature review and 9 interviews of health care experts. The subsequent evaluation cycle was carried out through 4 workshops with 15 participants in total, for example, health care professionals, information systems experts, and lawyers. The Results section presents the consolidated requirements of the stakeholders, the architecture, which was developed based on the identified requirements, and results from the evaluation cycles. The Discussion section focuses on the KBs and KCs that have been derived from the literature, the expert interviews, and the workshop discussions. Solutions for the identified KCs were proposed in the form of 5 recommendations for action. Limitations of the study have been elaborated, and possible further research perspectives have been pointed out. Our contribution contains interesting findings for science and practice alike, especially for EHR providers. The systematic requirement analysis can be used as a basis for the (further) development of other architectures. Besides, we have shed some light on the effects of the digital transformation on the health care sector. Another benefit of the developed architecture is that it can be prototypically implemented by companies and thus tested in a real context. The insights gained could serve for refinement of the architecture, which again allows for new findings with a different focus, such as acceptance investigations or a cost-benefit analysis.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>To answer the identified RQs, we applied the DSR paradigm that addresses human-relevant problems using innovative artifacts and simultaneously contributes new knowledge for the scientific community [<xref ref-type="bibr" rid="ref13">13</xref>]. Designed artifacts are not only useful but also crucial to understand the problem itself. Thus, DSR is especially suitable to serve as the basis for the development of a blockchain-based EHR architecture. Although we have addressed the major security issues that hamper the diffusion of EHRs, we have involved the stakeholders in the development phase, which fosters their awareness and understanding of the technology.</p>
      <p>The development of a solution is influenced by the environment and the existing body of knowledge as visualized in <xref rid="figure1" ref-type="fig">Figure 1</xref> [<xref ref-type="bibr" rid="ref14">14</xref>]. Thereby, the relevance of the identified problems represents the connection with the environment, whereas the link to the knowledge base is represented by the recognition of results of relevant works and a rigorous application of research methods [<xref ref-type="bibr" rid="ref15">15</xref>]. The design cycle within the DSR is altering between development and evaluation. In this study, we applied a literature review and 9 qualitative interviews to elaborate the stakeholders’ requirements. On the basis of these results, we developed a concept for a blockchain-based architecture. The intermediate results were evaluated in 4 workshops with 15 health care experts.</p>
      <p>To identify related work, we conducted a structured literature analysis according to vom Brocke et al [<xref ref-type="bibr" rid="ref16">16</xref>]. The search term (Blockchain OR distributed ledger) AND (EHR OR “Electronic Health Record” OR “EPR” OR “Electronic Patient Record” OR PHR OR “Personal Health Record” OR EPA OR EGA OR (Elektronische OR Digitale“ AND Patientenakte OR Gesundheitsakte)) was applied to the information systems and health care databases such as EBSCOhost, Emerald, IEEE Xplore, MEDLINE, ProQuest, PubMed, ScienceDirect, Scopus, Wiley, and Google Scholar.</p>
      <p>On the basis of the outcome of our literature search, we identified all stakeholders who probably use EHRs. Although EHR providers are also key stakeholders, we excluded them from our investigation because their interest rather lies in the requirements of their customers. The remaining stakeholders can be categorized into 3 groups (<xref rid="figure2" ref-type="fig">Figure 2</xref>). Primary stakeholders are directly involved in providing health care, for example, physicians, caregivers and nurses, therapists, pharmacists, clinics and hospitals, laboratories, care services, nursing homes, and the patient themselves [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. The group of secondary stakeholders includes insurances, family and relatives, and employers, whereas the tertiary stakeholder group comprises society, research institutes, public authorities, and the health care industry.</p>
      <p>In the next phase, we collected the respective stakeholders’ requirements for EHRs from the relevant literature. To enrich the scientific perspective, we additionally conducted interviews with 9 health care experts (<xref ref-type="table" rid="table1">Table 1</xref>), who represent the mentioned stakeholder groups in the period from July to October 2018 [<xref ref-type="bibr" rid="ref19">19</xref>]. The interviews were recorded and analyzed individually by the authors. In the Results section, we have consolidated the respective requirements. By means of the outcomes of the 4 subsequent workshops with 15 participants in total, for example, health care professionals, information system experts, and lawyers, we are in a position to evaluate our presented concept [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>Design science research method for concept development (Hevner et al). eHealth: electronic health; EHR: electronic health record.</p>
        </caption>
        <graphic xlink:href="jmir_v21i10e13585_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <fig id="figure2" position="float">
        <label>Figure 2</label>
        <caption>
          <p>Overview of stakeholder groups.</p>
        </caption>
        <graphic xlink:href="jmir_v21i10e13585_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <table-wrap position="float" id="table1">
        <label>Table 1</label>
        <caption>
          <p>Overview of interviewed experts.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="50"/>
          <col width="400"/>
          <col width="400"/>
          <col width="150"/>
          <thead>
            <tr valign="top">
              <td>No</td>
              <td>Description</td>
              <td>Work experience (years)</td>
              <td>Duration (min)</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>E1</td>
              <td>Pharmacist</td>
              <td>22</td>
              <td>40</td>
            </tr>
            <tr valign="top">
              <td>E2</td>
              <td>Health care consultant</td>
              <td>2</td>
              <td>31</td>
            </tr>
            <tr valign="top">
              <td>E3</td>
              <td>Pharmacist</td>
              <td>18</td>
              <td>27</td>
            </tr>
            <tr valign="top">
              <td>E4</td>
              <td>Founder and developer of an electronic health app</td>
              <td>1</td>
              <td>22</td>
            </tr>
            <tr valign="top">
              <td>E5</td>
              <td>Male nurse and case manager</td>
              <td>30</td>
              <td>24</td>
            </tr>
            <tr valign="top">
              <td>E6</td>
              <td>Health care consultant</td>
              <td>7</td>
              <td>36</td>
            </tr>
            <tr valign="top">
              <td>E7</td>
              <td>Managing director of an electronic health record</td>
              <td>7</td>
              <td>24</td>
            </tr>
            <tr valign="top">
              <td>E8</td>
              <td>Nurse</td>
              <td>9</td>
              <td>22</td>
            </tr>
            <tr valign="top">
              <td>E9</td>
              <td>Physician</td>
              <td>10</td>
              <td>32</td>
            </tr>
          </tbody>
        </table>
      </table-wrap>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Requirements</title>
        <p>On the basis of our systematic literature review and the 9 expert interviews, we identified a total of 34 requirements (R) for blockchain-based EHRs (<xref ref-type="table" rid="table2">Table 2</xref>). The requirements were assigned to the 3 stakeholder groups.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Consolidated requirements of stakeholder groups for a blockchain-based electronic health record.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="140"/>
            <col width="350"/>
            <col width="110"/>
            <col width="50"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <thead>
              <tr valign="top">
                <td colspan="2">No and group</td>
                <td>Requirement</td>
                <td>References</td>
                <td>E1</td>
                <td>E2</td>
                <td>E3</td>
                <td>E4</td>
                <td>E5</td>
                <td>E6</td>
                <td>E7</td>
                <td>E8</td>
                <td>E9</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="13">
                  <bold>Primary stakeholders</bold>
                </td>
              </tr>
              <tr valign="top">
                <td rowspan="27"/>
                <td>R1</td>
                <td>Data security<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>—<sup>b</sup></td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R2</td>
                <td>Data privacy<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R3</td>
                <td>Access/permission control, data sovereignty</td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R4</td>
                <td>Identity confirmation<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R5</td>
                <td>Manipulation protection/data integrity<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R6</td>
                <td>Complete health record<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R7</td>
                <td>Performance<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref7">7</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R8</td>
                <td>User friendly design<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R9</td>
                <td>Context-specific information<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R10</td>
                <td>Data and file storing<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R11</td>
                <td>Data and file sharing<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R12</td>
                <td>Interoperable and consistent data standards<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R13</td>
                <td>Intersectoral communication<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R14</td>
                <td>Ensuring trusted relationships<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>R15</td>
                <td>CRUD<sup>c</sup> rights</td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R16</td>
                <td>Verification modus</td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R17</td>
                <td>Emergency pass</td>
                <td>[<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R18</td>
                <td>Medication/care plan</td>
                <td>[<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R19</td>
                <td>Tracking of state transitions<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>]</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R20</td>
                <td>General administrative issues</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R21</td>
                <td>Synchronization to off-chain data<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>]</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R22</td>
                <td>Notification services</td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R23</td>
                <td>Modularity<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R24</td>
                <td>Patient centration</td>
                <td>[<xref ref-type="bibr" rid="ref12">12</xref>]</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R25</td>
                <td>Workflow support<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R26</td>
                <td>Integration into existing systems<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td>R27</td>
                <td>Transfer sheet</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Secondary stakeholders</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td rowspan="3"/>
                <td>R28</td>
                <td>Scalability<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R29</td>
                <td>Invoice management</td>
                <td>—</td>
                <td>x</td>
                <td>x</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>R30</td>
                <td>Modus for relatives</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—x</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Tertiary stakeholders</bold>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td/>
                <td>R31</td>
                <td>Access to consolidated data<sup>a</sup></td>
                <td>[<xref ref-type="bibr" rid="ref10">10</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>R32</td>
                <td>Statistics</td>
                <td>[<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>R33</td>
                <td>Clinical research</td>
                <td>[<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>R34</td>
                <td>Predictive analyses</td>
                <td>[<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>—</td>
                <td>x</td>
                <td>—</td>
                <td>x</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>To avoid multiple entries, requirements that apply to all stakeholder groups, for example, data security and data privacy, are listed once.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>Not applicable.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>CRUD: create, read, update, and delete.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <sec>
          <title>Primary Stakeholders</title>
          <p>The most important EHR concerns of this stakeholder group are connected to data security and data privacy (R1 and R2) [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. Among other things, because of its distributed structure, the use of consensus mechanisms, and cryptographic methods, blockchain technology offers a high potential to counteract these concerns [<xref ref-type="bibr" rid="ref8">8</xref>]. To protect the highly sensitive health data, patients should have full access and permission control and the possibility to precisely designate each actor involved (eg, physicians and relatives) [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. Furthermore, it is essential that they retain data sovereignty, which means that the decision who has access to what data are incumbent on them (R3 and R4) [<xref ref-type="bibr" rid="ref22">22</xref>]. For example, if patients seek a second medical opinion, they might want to avoid that the first diagnosis affects the second physician.</p>
          <p>Nevertheless, an EHR should contain the patients’ complete treatment history to provide involved physicians with the full picture and allow for optimal treatment (R6) [<xref ref-type="bibr" rid="ref21">21</xref>]. Thereby, it is of utmost importance that the relevant information are quickly accessible [<xref ref-type="bibr" rid="ref7">7</xref>] but cannot be manipulated [<xref ref-type="bibr" rid="ref7">7</xref>]. It must be ensured that these data can be updated but not manipulated [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Moreover, all stakeholder groups demand for a user-friendly design and context-specific information to avoid an information overload [<xref ref-type="bibr" rid="ref25">25</xref>].</p>
          <p>To enable intersectoral communication, storing, retrieving, and sharing of files and data turned out to be of high relevance (R10 and R11) [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. These files and data formats should comply with consistent standards (R12) [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>].</p>
          <p>Furthermore, blockchain technology is capable of reducing the necessary trust between the involved actors because transactions support the aforementioned mechanisms (R14) [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. In addition, blockchain technology supports data integrity, as each transaction is recorded (R5) [<xref ref-type="bibr" rid="ref7">7</xref>]. Besides, data protection is of particular importance (R2). This can basically be supported by blockchain technology, but limitations have to be stated here. When analyzing the metadata, conclusions could be drawn about single individuals under certain circumstances [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. For example, long-term monitoring of common diseases and frequently visited health care actors can provide systematic data analyses and allow for useful conclusions. However, as this conflicts with the goals of data protection, the implementation of anonymization mechanisms, such as those currently used by some cryptocurrencies as Zcash, is a suitable option for anonymizing transaction data [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
          <p>Within this context, access control (R3) and identity confirmation (R4) again play a special role. Both could be carried out by the state, as is already the case in current health systems, such as in Estonia. Furthermore, the allocation of create, read, update, and delete (CRUD) rights must be mentioned here [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. In this context, it is indispensable that specific organizational units are granted certain rights, for example, the right to insert new documents into the EHR. However, the performance of the application (R7) must be guaranteed for all transactions carried out to be attractive for the user groups [<xref ref-type="bibr" rid="ref7">7</xref>]. The allocation or modification of, for instance, viewership rights should be tracked accordingly (R19) [<xref ref-type="bibr" rid="ref8">8</xref>]. Before the release of data that have been newly inserted by health care professionals, the content could be checked by the respective patient by means of a <italic>verification mode</italic> (R16) [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref21">21</xref>].</p>
          <p>Particularly, the integration of existing systems (R26; eg, hospital information system, pharmaceutical medication plan, and physicians’ patient administration system) is of importance, as this would require fewer adjustments by all actors involved [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Equally, the integration of existing workflows is requested (R25) [<xref ref-type="bibr" rid="ref29">29</xref>]. In addition, general administrative issues should be covered, for example, the status of sick leave or the current insurance status. (R20). A continuous further development and the associated expansion of the functional scope are also planned and can be implemented in the form of individual modules (R23) [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
          <p>Another functionality that can improve the intersectoral communication is a transfer sheet that contains all relevant information necessary for a patient’s transfer from one institution to another, for example, from a hospital in a nursing home (R27).</p>
          <p>These transfer sheets include information on previous treatments and convey instructions to the next health care actor in charge.</p>
          <p>In this context, there are features, such as the emergency pass, that provide all relevant emergency data (R17; eg, blood group and allergies) and a medication plan, which provides details on dosage, side effects, and drug interactions of the medications to be taken (R18) [<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref28">28</xref>]. Notification services (R22: eg, vaccination plans) and context-specific information (R9), for example, alarm triggering when permissible vital parameters are exceeded, represent further useful enhancements [<xref ref-type="bibr" rid="ref8">8</xref>].</p>
          <p>Interoperability and consistent data standards (R12) as well as automation through smart contracts can also improve intersectoral communication (R13) [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. However, there is often the problem that data are available in various formats and at different storage locations within the health care system, which considerably complicates a smooth communication. To enable a preferably intuitive handling for the patients, the user interface should be designed as user friendly (R8) and patient centric as possible [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref25">25</xref>].</p>
        </sec>
        <sec>
          <title>Secondary Stakeholders</title>
          <p>To ensure the greatest possible support from all relevant actors, the requirements set by the secondary stakeholders also have to be taken into account. For instance, it is necessary for EHR solutions to be scalable, as insurances will probably provide these to all their policyholders. Furthermore, a <italic>relatives mode</italic> would provide a significant added value for patients who cannot maintain files themselves (R30). In addition, health insurance companies could use the system to manage their prescriptions and monitor the compliance and efficacy of therapies.</p>
        </sec>
        <sec>
          <title>Tertiary Stakeholders</title>
          <p>For tertiary stakeholders, interesting possibilities arise from the analysis of anonymized consolidated data (R31) [<xref ref-type="bibr" rid="ref10">10</xref>]. These data could be useful for statistical analyses about specific diseases, the efficiency of therapies (R32), and clinical research (R33) [<xref ref-type="bibr" rid="ref31">31</xref>]. Research institutes and governments could use the data to predict diseases such as flu outbreaks (R34) [<xref ref-type="bibr" rid="ref31">31</xref>]. However, this requires that the data set is as complete and consolidated as possible. It is, for example, also conceivable to monetize (anonymized) data. This means that institutes that seek information would have to pay the respective patients for the permission to use specific data. However, data can only be passed on actively by the user (R3, R11, and R24), and the respective institution has to clearly specify the intended use. In case of infringement, effective penalties (eg, high fines, imprisonment, or exclusion from network) could be imposed depending on the severity of the breach.</p>
        </sec>
      </sec>
      <sec>
        <title>Architecture</title>
        <p>As part of the design science approach (first iteration), we developed an initial concept for blockchain-based EHRs within a workshop on the basis of the multimethodically collected requirements analysis. First, the identified requirements have been incorporated into the development of the concept (<xref rid="figure3" ref-type="fig">Figure 3</xref>).</p>
        <p>Ølnes describes the (bitcoin) blockchain as an information infrastructure that can always be developed further [<xref ref-type="bibr" rid="ref34">34</xref>]. In his argumentation, he refers to the definition of Hanseth and Lyytinen [<xref ref-type="bibr" rid="ref35">35</xref>], who define the concept of information infrastructure as a common, open (and unlimited), heterogeneous, and evolving sociotechnical system consisting of a set of information technology (IT) skills and their users as well as operations and design communities. Blockchain technology offers a multitude of possible variations, for example, adding or removing actors or smart contracts (R3), using the implemented consensus mechanism. This enables that the system can be customized to meet specific needs and requirements. The developed concept (<xref rid="figure3" ref-type="fig">Figure 3</xref>) takes into account 3 basic options of data management: (1) it offers the possibility to interlink or reference already existing data sources; (2) it provides the possibility to store information encrypted in the blockchain; and (3) it allows to store and reference data from different data sources encrypted in the blockchain (R10 and R11). We deliberately avoided a uniform procedure to guarantee access to as many people as possible and have the highest possible flexibility. People living in countries with an appropriate digital health infrastructure are likely to choose option 1 or option 2 (R21). Although the latter offers the advantage that the data are always available, which reduces dependency on other actors, the disadvantage is the direct (encrypted) storage on the blockchain. Owing to the data protection requirements (eg, General Data Protection Regulation) and technical advantages, the authors recommend referencing the data and using the blockchain as an access management solution. This also makes it easier to adequately manage the large amount of data that are generated, for instance, during clinical studies. Patients might be notified about data changes, which they would have to approve or reject (R16).</p>
        <p>All processes within the EHRs should be documented on the blockchain to be able to ensure complete traceability in the event of data breaches or legal disputes (R19). In a working paper for the United Research Institute for Social Development, Scott points out that blockchain-based currencies, so-called cryptocurrencies (eg, bitcoin), are a relatively simple way of managing cash holdings in countries with a weakly developed financial infrastructure and safely handling payment transactions on the spot in insecure, informal environments [<xref ref-type="bibr" rid="ref36">36</xref>]. Similarly, the concept offers the possibility of independently maintaining the data (option 2), which is especially valuable for people who live in countries with poor (digital) health infrastructure. The access to the blockchain should be realized through a registration with an appropriately certified institution to prevent aggregation of irrelevant or trivial data (R3). Similar considerations can be found in a study by Ekblaw et al [<xref ref-type="bibr" rid="ref8">8</xref>]. Furthermore, institutions can gain access to aggregated, anonymized data if they provide computer resources through their activities as Miner and thus ensure the network’s trustworthiness (R31). This incentive system is based on a study by Ekblaw et al [<xref ref-type="bibr" rid="ref8">8</xref>]. The functionalities such as the access rights of the other actors to the patient data are defined by smart contracts. Automated contracts between the other players are also possible (R13, R14, and R12). In this way, the entire process can be supported, from admission and diagnosis to treatment and any associated rehabilitation to discharge and final consultation (R25).</p>
        <p>After presenting the first concept in <xref rid="figure3" ref-type="fig">Figure 3</xref> and the discussion with health care experts about the data sources and functionalities, we substantiated the concept into an n-tier architecture. The blockchain-based architecture can be divided into 5 layers as shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>: data layer at the bottom, data access layer, application logic layer, application layer, and presentation layer. In all layers, ethical and legal implications have to be considered.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Electronic health record concept blueprint. Rehab: rehabilitation.</p>
          </caption>
          <graphic xlink:href="jmir_v21i10e13585_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Five-tier architecture. IT: information technology.</p>
          </caption>
          <graphic xlink:href="jmir_v21i10e13585_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <sec>
          <title>Data Layer</title>
          <p>The data are standardized to ensure compatibility (R12) and intersectoral communication (R13). The integration platform provides defined communication patterns and interfaces for structured information and document exchange on the Fast Healthcare Interoperability Resources standard, the standard profiles of the Integrating the Healthcare Enterprise, the HL7 family (Health Level 7), openEHR, and the xDT family. Conformity with International Standard Organization (ISO) 21090 (health informatics — harmonized data types for information interchange) and ISO 13606 (health informatics — EHR communication) must be taken into account. For the generic description of the respective information unit, the semantics of the respective useful and information elements used are stored in the integrated metadata repository. The respective treating actor in the health sector has the possibility to provide data for the respective patient and document changes (R15 and R19).</p>
        </sec>
        <sec>
          <title>Data Access Layer</title>
          <p>Data from different sources are linked to the blockchain to ensure that the patient’s health records are as complete as possible (R8). Access control is important to ensure that the respective actors only have access to the relevant and released data (R3 and R2). In this context, the implementation of a role concept is of great importance. In addition, a precisely designed role concept in conjunction with a regulated access control renders data manipulation (R5) more difficult. Besides, a meta-data repository can support the integration and organization of relevant metadata (R26). For example, the data from the disparate systems can be better related to each other, and discrepancies, gaps, and metrics can be identified and addressed at the data structure level.</p>
        </sec>
        <sec>
          <title>Application Logic Layer</title>
          <p>The application logic layer controls the workflow of the different applications and systems (R25). Thus, data are prepared and made available for different purposes (R9 and R31). This is particularly interesting for the research area and enables various statistical evaluations (R32, R33, and R34).</p>
        </sec>
        <sec>
          <title>Application Layer</title>
          <p>On the basis of the connected data (R23), various services can be set up. A modular concept allows each stakeholder to individually configure their personal dashboards with only relevant data (R9). According to the experts surveyed, this leads, in particular, to added values for emergency passes (R17), medication plans (R18), and transfer sheets (R27). At this point, for example, the invoice management (R28) of health insurance companies can be applied. Furthermore, the opportunity to delegate administration rights to relatives could also be addressed in the form of a <italic>relatives mode</italic> (R30).</p>
        </sec>
        <sec>
          <title>Presentation Layer</title>
          <p>The presentation layer describes how the services are displayed to the end user. The range of functions for a user depends on his role, for example, more comprehensive functions and data are available for emergency physicians than for pharmacies. It is particularly important that the platform can be accessed either using responsive Web applications or native applications on almost all end devices and operating systems (R8). Modern smartphones, in particular, offer interesting functions with additional security measures such as fingerprint sensors and iris scanners (R1 and R3). Thus, information can also be prepared and displayed in a context-specific manner (R9). For example, different information can be displayed for a nurse wearing augmented reality glasses than for a pharmacist who receives additional information about the current medication plan and can thus be informed about drug interactions at an early stage.</p>
        </sec>
      </sec>
      <sec>
        <title>Evaluation</title>
        <p>In our first evaluation cycle, we discussed our initial categorization of the identified stakeholders into 3 stakeholder groups (<xref rid="figure2" ref-type="fig">Figure 2</xref>) with 3 health care professionals and 3 information systems experts. As this categorization turned out to be too rough for the design of the EHR architecture, we refined it by splitting the stakeholders into patients, medical professionals, public authorities, pharmacies, researchers, and health insurances (<xref rid="figure3" ref-type="fig">Figure 3</xref>). In the second evaluation workshop with 2 health care professionals and 3 information system experts, we discussed the databases that should be included in the concept. The participants evaluated the physicians, clinics, pharmacies, and health insurance databases as most important for the EHR architecture (see data layer in <xref rid="figure4" ref-type="fig">Figure 4</xref>). The remaining sources were summarized in other actors.</p>
        <p>A draft of the first concept (<xref rid="figure3" ref-type="fig">Figure 3</xref>) was presented to 5 health care professionals at the third evaluation workshop. Each participant added specific use cases from his profession, which we gradually included in the concept. Owing to the diversity of the use cases, we decided to begin with the 6 aspects of admission, diagnosis, treatment, therapy or rehabilitation, discharge, and counseling. In the final architecture, we reduced the complexity by implementing an application layer that did not include individual use cases but showed exemplary modules of the EHR system.</p>
        <p>At the last evaluation workshop, we presented the final architecture (<xref rid="figure4" ref-type="fig">Figure 4</xref>) to 4 health care professionals, 2 lawyers, and 3 information system professionals. Additional functionalities and several data standards were discussed and incorporated into the architecture concept. Finally, we elaborated the KBs and KCs of the proposed solution.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>After identifying the relevant stakeholders and their 34 respective requirements with the help of a literature review and expert interviews, we developed the first concept for a blockchain-based EHR. The concept was subsequently evaluated with the experts again to build a 5-tier architecture, which is presented in <xref rid="figure4" ref-type="fig">Figure 4</xref>. The development and introduction of blockchain-based EHRs are accompanied by several KBs and KCs. In the following, the KBs are presented before the KCs are critically discussed and possible solutions, in the form of 5 recommendations for action, are proposed.</p>
        <sec>
          <title>Key Benefits</title>
          <p>We identified 12 KBs of a blockchain-based EHR architecture, which we summarized with their respective sources from the literature and expert interviews in <xref ref-type="table" rid="table3">Table 3</xref>. The decentralization of the blockchain is the first KB (KB1) to be mentioned because distributed systems are usually less susceptible to system failures. Thus, there is no single point of failure (KB2). Moreover, the failure of individual nodes does not have significant effects on system security. A further advantage of the blockchain is that it has implemented various mechanisms (eg, consensus mechanism and cryptographic procedures) that render data manipulation difficult (KB3). The blockchain’s relatively high security, ensured among others by the cryptographic algorithms and decentralization, constitutes another benefit (KB4). Furthermore, the blockchain allows the tracking of entries, which makes incorrect treatment decisions traceable (KB5) and increases the patient safety. In addition, it is possible to store the entire treatment history, which significantly increases the scope of information available to the treating actors (KB6) and contributes to a general improvement in treatment quality. Smart contracts can help to automate certain processes (KB7; eg, referrals to specialists, ordering [individualized] medication). In addition, data sovereignty is firmly transferred to the patient (KB8) so that the user is the <italic>master of his own data</italic>. The fact that all relevant data can be made available to the corresponding actors quickly and in a standardized format, significantly increases intersectoral communication (KB9). Furthermore, it is conceivable that service providers process both invoicing and payment transactions directly using the blockchain (KB10). Possible new business models are emerging, for example, through the systematic evaluation of data or brokerage services (KB11). In summary, it can be said that the presented concept offers advantages at various levels, including technical (eg, data security), organizational (eg, intersectoral communication), and economic issues (eg, new business models). All in all, the advantages of blockchain-based EHRs could significantly improve the status quo of patient-oriented treatment (KB12).</p>
          <table-wrap position="float" id="table3">
            <label>Table 3</label>
            <caption>
              <p>Key benefits (KB) of a blockchain-based electronic health record architecture.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="60"/>
              <col width="490"/>
              <col width="200"/>
              <col width="250"/>
              <thead>
                <tr valign="top">
                  <td>No</td>
                  <td>Key benefits</td>
                  <td>References</td>
                  <td>Experts</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>KB1</td>
                  <td>Decentralization</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E7</td>
                </tr>
                <tr valign="top">
                  <td>KB2</td>
                  <td>No single point of failure/vulnerability</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>]</td>
                  <td>E7</td>
                </tr>
                <tr valign="top">
                  <td>KB3</td>
                  <td>Tamper proof</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                  <td>E1, E2, E4, E7, E9</td>
                </tr>
                <tr valign="top">
                  <td>KB4</td>
                  <td>Data security</td>
                  <td>[<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                  <td>E2, E4, E7, E9</td>
                </tr>
                <tr valign="top">
                  <td>KB5</td>
                  <td>Traceability of entries</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E1, E2</td>
                </tr>
                <tr valign="top">
                  <td>KB6</td>
                  <td>Overview of all health-related data</td>
                  <td>[<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                  <td>E7, E9</td>
                </tr>
                <tr valign="top">
                  <td>KB7</td>
                  <td>Automation by smart contracts</td>
                  <td>[<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                  <td>—<sup>a</sup></td>
                </tr>
                <tr valign="top">
                  <td>KB8</td>
                  <td>Data sovereignty for patient</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E1, E2, E5, E6, E7, E9</td>
                </tr>
                <tr valign="top">
                  <td>KB9</td>
                  <td>Improved intersectoral collaboration through file and data sharing</td>
                  <td>[<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E1, E2, E3, E4, E5, E7, E8, E9</td>
                </tr>
                <tr valign="top">
                  <td>KB10</td>
                  <td>Integrated payment application</td>
                  <td>[<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E2, E7</td>
                </tr>
                <tr valign="top">
                  <td>KB11</td>
                  <td>New mining business models for data analysis</td>
                  <td>[<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                  <td>E7</td>
                </tr>
                <tr valign="top">
                  <td>KB12</td>
                  <td>Patient-oriented treatment</td>
                  <td>[<xref ref-type="bibr" rid="ref12">12</xref>]</td>
                  <td>E1, E3, E8, E9</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table3fn1">
                <p><sup>a</sup>Not applicable.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Key Challenges</title>
          <p>Despite all advantages, a blockchain-based EHR still faces some major challenges that are summarized with their respective sources from the literature and expert interviews in <xref ref-type="table" rid="table4">Table 4</xref>. The high energy consumption, primarily because of the use of the proof-of-work consensus mechanism, is often cited as a major challenge associated with the use of blockchain technology (KC1). This leads to high transaction costs (KC2) because of both high energy consumption and the required hardware resources (KC3). However, these challenges can primarily be addressed by 2 measures. First, other consensus mechanisms such as proof-of-stake could significantly reduce the electricity consumption; second, regulated access, in the sense of a consortium blockchain, could keep the required hardware investments manageable. Regarding access regulation, however, the question arises as to which organization is responsible (KC4). We currently consider the state or a consortium consisting of different stakeholders to be potential access regulators. Both could equally be considered when it comes to the questions of responsibility and accountability for (further) development as well as the administration of the system (KC5).</p>
          <p>However, the fact that systematic analyses based on metadata offer comprehensive assessment possibilities and allow for conclusions, they have to be seen as a technical challenge at the same time (KC6). Although no satisfactory solution to this problem has yet been found, the cryptocurrency community is currently addressing it, for example, by means of the anonymity mechanism of the cryptocurrency Zcash [<xref ref-type="bibr" rid="ref33">33</xref>]. Another technical aspect that needs to be addressed in the future is the so-called 51% attacks (KC7). However, they are very unlikely in a consortium. Moreover, the processing speed of blockchains is relatively slow compared with conventional databases (KC8). For example, the Bitcoin blockchain needs up to 10 min to write transactions into a new block. However, it is usually not necessary for these data to be available to other participants in real time. In addition, this time delay only affects the writing, not the reading of transaction data. The verification of imported data, which is mandatory for the highest possible data quality and timeliness (KC9), constitutes another major challenge. In principle, the respective user could confirm the entered data again before it is finally written down. However, this could also result in disadvantageous delays or users rejecting or concealing the doctor’s findings. Finally, 2 further challenges can be identified, the primary aim of which is to motivate the involved actors. On the one hand, the added value must be demonstrated to patients and health care professionals, and the necessary (technical) skills in handling such complex applications must be developed (KC10). But the benefits for the remaining stakeholders also have to be demonstrated (KC11). According to the experts, this can best be accomplished by focusing on the expected, significantly more favorable cost structure in the long term, which clearly stands out against the costs of the existing, highly fragmented, and thus relatively cost-intensive IT-system landscape. In particular, automation with smart contracts could also address a high savings potential here.</p>
          <p>As blockchain technology is relatively new, standards are lacking, for example, regarding reference architectures and interfaces to other blockchains (KC12).</p>
          <table-wrap position="float" id="table4">
            <label>Table 4</label>
            <caption>
              <p>Key challenges (KC) of a blockchain-based electronic health record architecture.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="60"/>
              <col width="540"/>
              <col width="250"/>
              <col width="150"/>
              <thead>
                <tr valign="top">
                  <td>No</td>
                  <td>Key challenges</td>
                  <td>References</td>
                  <td>Experts</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>KC1</td>
                  <td>High energy consumption</td>
                  <td>[<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                  <td>—<sup>a</sup></td>
                </tr>
                <tr valign="top">
                  <td>KC2</td>
                  <td>High and unpredictable transactions costs</td>
                  <td>[<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                  <td>E2, E7</td>
                </tr>
                <tr valign="top">
                  <td>KC3</td>
                  <td>Requires high storage, bandwidth and computational power, low scalability</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]</td>
                  <td>E7</td>
                </tr>
                <tr valign="top">
                  <td>KC4</td>
                  <td>Access and authorization issues</td>
                  <td>[<xref ref-type="bibr" rid="ref10">10</xref>]</td>
                  <td>E5, E6, E7</td>
                </tr>
                <tr valign="top">
                  <td>KC5</td>
                  <td>Accountability for development and administration</td>
                  <td>[<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E5, E7</td>
                </tr>
                <tr valign="top">
                  <td>KC6</td>
                  <td>Public availability of transactions</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]</td>
                  <td>E2, E3, E7, E9</td>
                </tr>
                <tr valign="top">
                  <td>KC7</td>
                  <td>51% attack</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                  <td>—</td>
                </tr>
                <tr valign="top">
                  <td>KC8</td>
                  <td>Slow processing speed</td>
                  <td>[<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                  <td>E2, E4, E7</td>
                </tr>
                <tr valign="top">
                  <td>KC9</td>
                  <td>Data imports need verification</td>
                  <td>[<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                  <td>E2, E4, E7, E9</td>
                </tr>
                <tr valign="top">
                  <td>KC10</td>
                  <td>Technical skills of patient and health care professional</td>
                  <td>[<xref ref-type="bibr" rid="ref10">10</xref>]</td>
                  <td>E2, E5, E7, E8, E9</td>
                </tr>
                <tr valign="top">
                  <td>KC11</td>
                  <td>Incentives for provision of computational resources</td>
                  <td>[<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                  <td>E2, E4, E7</td>
                </tr>
                <tr valign="top">
                  <td>KC12</td>
                  <td>Standardization</td>
                  <td>[<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                  <td>E1, E3, E5, E6</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table4fn1">
                <p><sup>a</sup>Not applicable.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
          <p>To address these challenges, we derived 5 recommendations for action for science and practice.</p>
        </sec>
        <sec>
          <title>Recommendation 1</title>
          <p>The first recommendation for action is the development of comprehensive standards (KC12). It is conceivable to track and co-design the current standardization attempts such as ISO/TC 307 (blockchain and distributed ledger technologies) and specify this standardization for blockchain-based applications in the health sector. In addition to fundamental topics such as terminology, vulnerabilities, and reference architectures, legal issues such as the legal validity of smart contracts or governance aspects are also of interest. Standardization could thus also help to shape responsibilities for development and administration, especially in the context of IT governance (KC5).</p>
        </sec>
        <sec>
          <title>Recommendation 2</title>
          <p>The authors recommend the formation of a cross-stakeholder consortium that addresses both technical challenges (KC1, KC6, KC7, and KC11) and organizational challenges (KC4 and KC5). This consortium could establish a consortium blockchain (also called hybrid blockchain) and simplify access controls. Furthermore, consortia offer the advantage of forming a concrete entity capable of acting, which can, for example, improve the representation of interests. In principle, the question arises as to who will be involved in the consortium and how this involvement will look like. To this end, the members of the consortium should be elected from all relevant stakeholder groups.</p>
        </sec>
        <sec>
          <title>Recommendation 3</title>
          <p>Researchers and companies should continue to work on advancing blockchain technology. Thereby, encryption mechanisms must protect the data as effectively and efficiently as possible (KC6 and KC8), and consensus mechanisms must work as resource saving as possible (KC1 and KC3) without compromising security. Reducing resource use would strengthen environmental sustainability and reduce long-term financial operating costs in the form of transaction costs (KC2).</p>
        </sec>
        <sec>
          <title>Recommendation 4</title>
          <p>Costs are a decisive factor for every project. As such a project would involve high (financial) costs (KC1, KC2, KC3, and KC11), a further focus should be placed on the development of business models. Perspectives are opened here, for example, in the (anonymized) evaluation of data that can provide interesting insights for the (further) development of drugs, treatments, and therapies.</p>
        </sec>
        <sec>
          <title>Recommendation 5</title>
          <p>The 5th recommendation for action states that users must be empowered and trained to use current information and communication technologies (ICTs; KC10) and learn more about their current state of health (health literacy) to be able to trace findings to some extent and thus reduce false entries in the system (KC9). The authors are aware that probably not both goals can be realized for every user. Nevertheless, the aim should be to inform the user as well as possible about the possibilities of modern ICT and their state of health. At this point, concepts such as digital nurses or digital learning platforms could offer interesting perspectives.</p>
        </sec>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Although the presented blockchain architecture is supposed to take all stakeholders’ requirements into account to provide optimal conditions for a qualitative health care supply, it has its limitations. First, we have not been able to interview representatives of each identified stakeholder group. For example, the specific requirements of insurance companies or research institutes need to be examined more closely. Furthermore, we did not include the opinion of the most important stakeholders in the adaption of EHR, namely the patients. The personal attitude toward technological innovations is highly subjective and depends on age, technological affinity, and pre-experiences. Therefore, quantitative surveys should be conducted to investigate the acceptance of blockchain-based EHRs. The fact that the evaluation of our results will require deep technical and organizational know-how about blockchain technology constitutes another important challenge.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The aim of our analysis was to investigate whether and how blockchain technology can be used for EHRs. To do so, we applied the DSR paradigm. First, we identified 15 stakeholders and categorized them into 3 groups. With the help of a structured literature review and 9 expert interviews, we collected 34 specific requirements for EHRs (RQ1). In the next phase, we drafted the first concept for a blockchain-based architecture. Within 4 iterative evaluation cycles, we developed a 5-tier architecture that takes the identified requirements into account (RQ2). Finally, we discussed KBs and KCs of our proposed solution (RQ3) and derived 5 recommendations for action to address the KCs.</p>
        <p>We conclude that blockchain technology offers considerable potential to improve EHRs. In contrast to currently available EHR solutions, blockchain technology offers improvements, for instance, regarding data security, traceability, and automation by smart contracts. We identified 12 KBs, which can be achieved by using blockchain technology for EHRs.</p>
        <p>Nevertheless, there are still some KCs that need to be overcome (<xref ref-type="table" rid="table4">Table 4</xref>). Future research should address ethical, social, environmental, technological, and economic implications. First of all, research potential can be identified in the investigation of incentive programs for providing computational resources. This is connected to the question which business model would be most suitable to offer a blockchain-based EHR. In this context, cost-benefit analyses should be conducted. Furthermore, issues according to data security/privacy and the attack threat need to be analyzed. Finally, it is crucial that especially patients accept the technology. As discussed above, quantitative acceptance investigations are needed to improve applications and enhance dissemination. We expect new blockchain-based applications to emerge in the health care sector that have the potential to substantially improve existing solutions and thus the quality of health care supply.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">DSR</term>
          <def>
            <p>design science research</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">EHR</term>
          <def>
            <p>electronic health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">ICTs</term>
          <def>
            <p>information and communication technologies</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">ISO</term>
          <def>
            <p>International Standard Organization</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">IT</term>
          <def>
            <p>information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">KB</term>
          <def>
            <p>key benefit</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">KC</term>
          <def>
            <p>key challenge</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">RQ</term>
          <def>
            <p>research question</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The authors would like to thank Ms Imhorst and the reviewers for their constructive and substantial feedback.</p>
      <p>The authors acknowledge the support by Deutsche Forschungsgemeinschaft (DFG) and Open Access Publishing Fund of Osnabrück University.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Häyrinen</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Saranto</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nykänen</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Definition, structure, content, use and impacts of electronic health records: a review of the research literature</article-title>
          <source>Int J Med Inform</source>
          <year>2008</year>
          <month>05</month>
          <volume>77</volume>
          <issue>5</issue>
          <fpage>291</fpage>
          <lpage>304</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2007.09.001</pub-id>
          <pub-id pub-id-type="medline">17951106</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(07)00168-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Ash</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>DW</given-names>
            </name>
            <name name-style="western">
              <surname>Overhage</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Sands</surname>
              <given-names>DZ</given-names>
            </name>
          </person-group>
          <article-title>Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2006</year>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>121</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/16357345"/>
          </comment>
          <pub-id pub-id-type="doi">10.1197/jamia.M2025</pub-id>
          <pub-id pub-id-type="medline">16357345</pub-id>
          <pub-id pub-id-type="pii">M2025</pub-id>
          <pub-id pub-id-type="pmcid">PMC1447551</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Avital</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Beck</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>King</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rossi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Teigland</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Jumping on the Blockchain Bandwagon: Lessons of the Past and Outlook to the Future</article-title>
          <source>Proceedings of the International Conference on Information Systems</source>
          <year>2016</year>
          <conf-name>ICIS'16</conf-name>
          <conf-date>December 11-14, 2016</conf-date>
          <conf-loc>Dublin, Ireland</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rückeshäuser</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Do We Really Want Blockchain-Based Accounting? Decentralized Consensus as Enabler of Management Override of Internal Controls</article-title>
          <source>Proceedings of the 13th International Conference on Wirtschaftsinformatik</source>
          <year>2017</year>
          <conf-name>WI'17</conf-name>
          <conf-date>February 12-15, 2017</conf-date>
          <conf-loc>St. Gallen, Switzerland</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weber</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Riveret</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Governatori</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ponomarev</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Mendling</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Untrusted Business Process Monitoring and Execution Using Blockchain</article-title>
          <source>Proceedings of the International Conference on Business Process Management</source>
          <year>2016</year>
          <conf-name>BPM'16</conf-name>
          <conf-date>September 18-22, 2016</conf-date>
          <conf-loc>Rio de Janeiro, Brazil</conf-loc>
          <fpage>329</fpage>
          <lpage>47</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-319-45348-4_19</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Linn</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Koo</surname>
              <given-names>MB</given-names>
            </name>
          </person-group>
          <article-title>Blockchain for Health Data and Its Potential Use in Health IT and Health Care Related Research</article-title>
          <source>Proceedings of the OSEHRA Innovation Webinar Series</source>
          <year>2016</year>
          <conf-name>OSEHRA'16</conf-name>
          <conf-date>February 20, 2016</conf-date>
          <conf-loc>Gaithersburg, Maryland</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kuo</surname>
              <given-names>TT</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>HE</given-names>
            </name>
            <name name-style="western">
              <surname>Ohno-Machado</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Blockchain distributed ledger technologies for biomedical and health care applications</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2017</year>
          <month>11</month>
          <day>1</day>
          <volume>24</volume>
          <issue>6</issue>
          <fpage>1211</fpage>
          <lpage>20</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29016974"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocx068</pub-id>
          <pub-id pub-id-type="medline">29016974</pub-id>
          <pub-id pub-id-type="pii">4108087</pub-id>
          <pub-id pub-id-type="pmcid">PMC6080687</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ekblaw</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Azaria</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Halamka</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Lippman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Semantic Scholar</source>
          <year>2016</year>
          <comment>A Case Study for Blockchain in Healthcare: 'MedRec' Prototype for Electronic Health Records and Medical Research Data 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.semanticscholar.org/paper/A-Case-Study-for-Blockchain-in-Healthcare-%3A-%E2%80%9C-%E2%80%9D-for-Ekblaw-Azaria/56e65b469cad2f3ebd560b3a10e7346780f4ab0a">https://www.semanticscholar.org/paper/A-Case-Study-for-Blockchain-in-Healthcare-%3A-%E2%80%9C-%E2%80%9D-for-Ekblaw-Azaria/56e65b469cad2f3ebd560b3a10e7346780f4ab0a</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>da Conceicao</surname>
              <given-names>AF</given-names>
            </name>
            <name name-style="western">
              <surname>da Silva</surname>
              <given-names>FS</given-names>
            </name>
            <name name-style="western">
              <surname>Rocha</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Locoro</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Barguil</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <source>arXiv</source>
          <year>2018</year>
          <comment>Eletronic Health Records using Blockchain Technology 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/pdf/1804.10078">https://arxiv.org/pdf/1804.10078</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roehrs</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>da Costa</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>da Rosa</surname>
              <given-names>RR</given-names>
            </name>
          </person-group>
          <article-title>OmniPHR: a distributed architecture model to integrate personal health records</article-title>
          <source>J Biomed Inform</source>
          <year>2017</year>
          <month>12</month>
          <volume>71</volume>
          <fpage>70</fpage>
          <lpage>81</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(17)30108-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2017.05.012</pub-id>
          <pub-id pub-id-type="medline">28545835</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(17)30108-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ribitzky</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Clair</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Houlding</surname>
              <given-names>DI</given-names>
            </name>
            <name name-style="western">
              <surname>McFarlane</surname>
              <given-names>CT</given-names>
            </name>
            <name name-style="western">
              <surname>Ahier</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gould</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Flannery</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Pupo</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Clauson</surname>
              <given-names>KA</given-names>
            </name>
          </person-group>
          <article-title>Pragmatic, interdisciplinary perspectives on blockchain and distributed ledger technology: paving the future for healthcare</article-title>
          <source>Blockchain Healthc Today</source>
          <year>2018</year>
          <month>03</month>
          <day>23</day>
          <volume>1</volume>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.30953/bhty.v1.24</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lenz</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology use cases in healthcare</article-title>
          <source>Advances in Computers. First Edition</source>
          <year>2018</year>
          <publisher-loc>Cambridge, Massachusetts</publisher-loc>
          <publisher-name>Academic Press</publisher-name>
          <fpage>1</fpage>
          <lpage>41</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hevner</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chatterjee</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Design Research in Information Systems: Theory and Practice</source>
          <year>2010</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hevner</surname>
              <given-names>AR</given-names>
            </name>
          </person-group>
          <article-title>A three cycle view of design science research</article-title>
          <source>Scand J Inf Syst</source>
          <year>2007</year>
          <volume>19</volume>
          <issue>2</issue>
          <fpage>87</fpage>
          <lpage>92</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pdfs.semanticscholar.org/fbd9/8df286a9c03843411725bfd3691669bc6407.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hevner</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>March</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ram</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Design science in information systems research</article-title>
          <source>MIS Q</source>
          <year>2004</year>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>105</lpage>
          <pub-id pub-id-type="doi">10.2307/25148625</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>vom Brocke</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Simons</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Niehaves</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Riemer</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Plattfaut</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Cleven</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process</article-title>
          <source>Proceedings of the 17th European Conference on Information Systems</source>
          <year>2009</year>
          <conf-name>ECIS'09</conf-name>
          <conf-date>June 8-10, 2009</conf-date>
          <conf-loc>Verona, Italy</conf-loc>
          <fpage>2206</fpage>
          <lpage>17</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>George</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Kohnke</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Personal health record systems as boundary objects</article-title>
          <source>Commun Assoc Inf Syst</source>
          <year>2018</year>
          <volume>42</volume>
          <issue>1</issue>
          <fpage>21</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.17705/1CAIS.04202</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tasatanattakool</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Techapanupreeda</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Blockchain: Challenges and Applications</article-title>
          <source>Proceedings of the International Conference on Information Networking</source>
          <year>2018</year>
          <conf-name>ICOIN'18</conf-name>
          <conf-date>January 10-12, 2018</conf-date>
          <conf-loc>Chiang Mai, Thailand</conf-loc>
          <fpage>473</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1109/ICOIN.2018.8343163</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Myers</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Newman</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The qualitative interview in IS research: examining the craft</article-title>
          <source>Inf Organ</source>
          <year>2007</year>
          <month>01</month>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>2</fpage>
          <lpage>26</lpage>
          <pub-id pub-id-type="doi">10.1016/j.infoandorg.2006.11.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Lenz</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenbloom</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>FHIRChain: applying blockchain to securely and scalably share clinical data</article-title>
          <source>Comput Struct Biotechnol J</source>
          <year>2018</year>
          <volume>16</volume>
          <fpage>267</fpage>
          <lpage>78</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2001-0370(18)30037-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.csbj.2018.07.004</pub-id>
          <pub-id pub-id-type="medline">30108685</pub-id>
          <pub-id pub-id-type="pii">S2001-0370(18)30037-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC6082774</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A Design of Blockchain-Based Architecture for the Security of Electronic Health Record (EHR) Systems</article-title>
          <source>Proceedings of the International Conference on Cloud Computing Technology and Science</source>
          <year>2018</year>
          <conf-name>CloudCom'18</conf-name>
          <conf-date>December 10-13, 2018</conf-date>
          <conf-loc>Nicosia, Cyprus</conf-loc>
          <pub-id pub-id-type="doi">10.1109/CloudCom2018.2018.00058</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gazzarata</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Gazzarata</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Giacomini</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A standardized SOA based solution to guarantee the secure access to EHR</article-title>
          <source>Procedia Comput Sci</source>
          <year>2015</year>
          <volume>64</volume>
          <fpage>1124</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2015.08.582</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Badr</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gomaa</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Abd-Elrahman</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Multi-tier blockchain framework for IOT-EHRS systems</article-title>
          <source>Procedia Comput Sci</source>
          <year>2018</year>
          <volume>141</volume>
          <fpage>159</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2018.10.162</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mertz</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>(Block) chain reaction: a blockchain revolution sweeps into health care, offering the possibility for a much-needed data solution</article-title>
          <source>IEEE Pulse</source>
          <year>2018</year>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>4</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1109/MPUL.2018.2814879</pub-id>
          <pub-id pub-id-type="medline">29757744</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saitwal</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Walji</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Assessing performance of an electronic health record (EHR) using cognitive task analysis</article-title>
          <source>Int J Med Inform</source>
          <year>2010</year>
          <month>07</month>
          <volume>79</volume>
          <issue>7</issue>
          <fpage>501</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2010.04.001</pub-id>
          <pub-id pub-id-type="medline">20452274</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(10)00074-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Künzi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Koster</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Petkovic</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Adlassnig</surname>
              <given-names>KP</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Masic</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Mantas</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Emergency access to protected health records</article-title>
          <source>Medical Informatics in a United and Healthy Europe</source>
          <year>2009</year>
          <publisher-loc>Amsterdam</publisher-loc>
          <publisher-name>IOS Press</publisher-name>
          <fpage>705</fpage>
          <lpage>9</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bossen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jensen</surname>
              <given-names>LG</given-names>
            </name>
            <name name-style="western">
              <surname>Udsen</surname>
              <given-names>FW</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of a comprehensive EHR based on the DeLone and McLean model for IS success: approach, results, and success factors</article-title>
          <source>Int J Med Inform</source>
          <year>2013</year>
          <month>10</month>
          <volume>82</volume>
          <issue>10</issue>
          <fpage>940</fpage>
          <lpage>53</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2013.05.010</pub-id>
          <pub-id pub-id-type="medline">23827768</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(13)00128-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fragidis</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Chatzoglou</surname>
              <given-names>PD</given-names>
            </name>
          </person-group>
          <article-title>Implementation of a nationwide electronic health record (EHR): the international experience in 13 countries</article-title>
          <source>Int J Health Care Qual Assur</source>
          <year>2018</year>
          <month>03</month>
          <day>12</day>
          <volume>31</volume>
          <issue>2</issue>
          <fpage>116</fpage>
          <lpage>30</lpage>
          <pub-id pub-id-type="doi">10.1108/IJHCQA-09-2016-0136</pub-id>
          <pub-id pub-id-type="medline">29504871</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peterson</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Deeduvanu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kanjamala</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Boles</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>Office of the National Coordinator for Health Information Technology</source>
          <year>2016</year>
          <comment>A Blockchain-Based Approach to Health Information Exchange Networks 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthit.gov/sites/default/files/12-55-blockchain-based-approach-final.pdf">https://www.healthit.gov/sites/default/files/12-55-blockchain-based-approach-final.pdf</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Haas</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <source>Bertelsmann Stiftung</source>
          <year>2017</year>
          <comment>Elektronische Patientenakten 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bertelsmann-stiftung.de/fileadmin/files/BSt/Publikationen/GrauePublikationen/VV_eEPA_Expertise_final.pdf">https://www.bertelsmann-stiftung.de/fileadmin/files/BSt/Publikationen/GrauePublikationen/VV_eEPA_Expertise_final.pdf</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weiskopf</surname>
              <given-names>NG</given-names>
            </name>
            <name name-style="western">
              <surname>Weng</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Methods and dimensions of electronic health record data quality assessment: enabling reuse for clinical research</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2013</year>
          <month>01</month>
          <day>1</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>144</fpage>
          <lpage>51</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22733976"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2011-000681</pub-id>
          <pub-id pub-id-type="medline">22733976</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2011-000681</pub-id>
          <pub-id pub-id-type="pmcid">PMC3555312</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marnau</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung</article-title>
          <source>Proceedings of the 47th Annual Meeting of the Gesellschaft für Informatik</source>
          <year>2017</year>
          <conf-name>INFORMATICS'17</conf-name>
          <conf-date>September 25-29, 2017</conf-date>
          <conf-loc>Chemnitz, Germany</conf-loc>
          <pub-id pub-id-type="doi">10.18420/in2017_105</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hopwood</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bowe</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hornby</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wilcox</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <source>This script - GitHub</source>
          <year>2019</year>
          <comment>Zcash Protocol Specification 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://raw.githubusercontent.com/zcash/zips/master/protocol/protocol.pdf">https://raw.githubusercontent.com/zcash/zips/master/protocol/protocol.pdf</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ølnes</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Beyond Bitcoin Enabling Smart Government Using Blockchain Technology</article-title>
          <source>Proceedings of the International Conference on Electronic Government</source>
          <year>2016</year>
          <conf-name>EGOV'16</conf-name>
          <conf-date>September 4-7, 2016</conf-date>
          <conf-loc>Petersburg, Russia</conf-loc>
          <fpage>253</fpage>
          <lpage>64</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-319-44421-5_20</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hanseth</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Lyytinen</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Design theory for dynamic complexity in information infrastructures: the case of building internet</article-title>
          <source>J Inf Technol</source>
          <year>2010</year>
          <month>03</month>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>19</lpage>
          <pub-id pub-id-type="doi">10.1057/jit.2009.19</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <source>EconStor</source>
          <year>2016</year>
          <comment>How Can Cryptocurrency and Blockchain Technology Play a Role in Building Social and Solidarity Finance? 
          <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.econstor.eu/bitstream/10419/148750/1/861287290.pdf">https://www.econstor.eu/bitstream/10419/148750/1/861287290.pdf</ext-link></comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dagher</surname>
              <given-names>GG</given-names>
            </name>
            <name name-style="western">
              <surname>Mohler</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Milojkovic</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Marella</surname>
              <given-names>PB</given-names>
            </name>
          </person-group>
          <article-title>Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology</article-title>
          <source>Sustain Cities Soc</source>
          <year>2018</year>
          <month>05</month>
          <volume>39</volume>
          <fpage>283</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.1016/j.scs.2018.02.014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shabani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based platforms for genomic data sharing: a de-centralized approach in response to the governance problems?</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>01</month>
          <day>1</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>76</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1093/jamia/ocy149</pub-id>
          <pub-id pub-id-type="medline">30496430</pub-id>
          <pub-id pub-id-type="pii">5211361</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thwin</surname>
              <given-names>TT</given-names>
            </name>
            <name name-style="western">
              <surname>Vasupongayya</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Blockchain Based Secret-Data Sharing Model for Personal Health Record System</article-title>
          <source>Proceedings of the 5th International Conference on Advanced Informatics: Concept Theory and Applications</source>
          <year>2018</year>
          <conf-name>ICAICTA'18</conf-name>
          <conf-date>August 14-17, 2018</conf-date>
          <conf-loc>Krabi, Thailand</conf-loc>
          <fpage>196</fpage>
          <lpage>201</lpage>
          <pub-id pub-id-type="doi">10.1109/ICAICTA.2018.8541296</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Croman</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Decker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Eyal</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Gencer</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Juels</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kosba</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Saxena</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sirer</surname>
              <given-names>EG</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wattenhofer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>On Scaling Decentralized Blockchains</article-title>
          <source>Proceedings of the International Conference on Financial Cryptography and Data Security</source>
          <year>2016</year>
          <conf-name>FC'16</conf-name>
          <conf-date>February 22-26, 2016</conf-date>
          <conf-loc>Christ Church, Barbados</conf-loc>
          <fpage>106</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-662-53357-4_8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kosba</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wen</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Papamanthou</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts</article-title>
          <source>Proceedings of the Symposium on Security and Privacy</source>
          <year>2016</year>
          <conf-name>SP'16</conf-name>
          <conf-date>May 22-26, 2016</conf-date>
          <conf-loc>San Jose, CA, USA</conf-loc>
          <fpage>839</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1109/SP.2016.55</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
